New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

S90.18 Leak Questions

Page: 2 / 4
Total 98 questions

Fundamental SOA Security Questions and Answers

Question 5

The Data Origin Authentication pattern is applied to services throughout a service inventory. As a result, if malicious service intermediaries change data within messages exchanged by these services, such changes will be detected.

Options:

A.

True

B.

False

Question 6

Service A is owned by Organization A. Service A sends a message containing confidential data to Service B, which is owned by Organization B. Service B sends the message to Service C, which is also owned by Organization B. Organization A trusts Organization B, which means there is no requirement to protect messages from intermediaries and after a message is received by Service B (and as long as the message remains within the boundary of Organization B), there is no requirement to keep the message data confidential. Which of the following approaches will fulfill these security requirements with the least amount of performance degradation?

Options:

A.

Messages exchanged between Service A and Service B are encrypted using XML-Encryption.

B.

The communication channel between Service A and Service B is encrypted using a transport-layer security technology.

C.

SAML security tokens are used so that Service B can authenticate Service A.

D.

An authentication broker is introduced between Service A and Service B.

Question 7

Losing a ______________ does not compromise the identity of the key owner, whereas losing a ___________ does compromise the identity of the key owner.

Options:

A.

private key, public key

B.

validated certificate, revoked certificate

C.

security policy, SAML token

D.

None of the above

Question 8

The X.509 token can be used to express a ______________ security token that provides an X.509 digital certificate.

Options:

A.

text-based

B.

UDDI-based

C.

binary

D.

None of the above.

Page: 2 / 4
Total 98 questions