The application of the Brokered Authentication pattern is best suited for a scenario whereby a service consumer does not need to re-authenticate itself with multiple services.
A. True
B. False
The SAML and WS-Security industry standards can be applied to the same service composition architecture.
A. True
B. False
The use of XML-Encryption supports the application of the Service Abstraction principle because the actual message remains hidden from the attacker.
A. True
B. False
Service A sends a message to Service B which reads the values in the message header to determine whether to forward the message to Service C or Service D. Because of recent attacks on Services C and D, it has been decided to protect the body content of messages using some form of encryption. However, certain restrictions within the design of Service B will not permit it to be changed to support the encryption and decryption of messages. Only Services A, C and D can support message encryption and decryption.
Which of the following approaches fulfill these security requirements without changing the role of Service B?
A. Transport-layer security is implemented between all services.
B. Message-layer security is implemented between all services.
C. Service B is removed. Instead, the routing logic is added to Service A.
D. None of the above
The requirement to defer security related state data at runtime relates directly to the application of which service-orientation principle?
A. Service Loose Coupling
B. Service Autonomy
C. Service Abstraction
D. None of the above.
The application of the Data Origin Authentication pattern only provides message integrity.
A. True
B. False
Service A relies on a shared identity store. Service B has its own identity store. Service C also has its own identity store, but must also access the shared identity store used by Service A.
Which service has the least reduction in autonomy as a result of its relationship with identity store mechanism(s)?
A. Service A
B. Service B
C. Service C
D. The autonomy of all services is affected equally
Which of the following is not a hashing algorithm?
A. MD5
B. X.509
C. SHA-1
D. SHA-256
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only SOA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your S90-18A exam preparations and SOA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.