Exam Details

  • Exam Code
    :S90-18A
  • Exam Name
    :Fundamental SOA Security
  • Certification
    :SOACP
  • Vendor
    :SOA
  • Total Questions
    :98 Q&As
  • Last Updated
    :May 12, 2024

SOA SOACP S90-18A Questions & Answers

  • Question 21:

    The Brokered Authentication pattern needs to be used in conjunction with the Data Confidentiality and Data Origin Authentication patterns in order to ensure that claims held in security tokens remain secure and that the security tokens are actually issued by a valid authentication broker.

    What is wrong with this statement?

    A. The Brokered Authentication pattern, the Data Origin Authentication pattern and the Data Confidentiality pattern cannot be used together.

    B. Only the Brokered Authentication pattern and the Data Confidentiality pattern need to be applied together in order to ensure that claims held in security tokens remain secure.

    C. The statement is correct if the Brokered Authentication pattern is substituted for the Direct Authentication pattern.

    D. There is nothing wrong with this statement.

  • Question 22:

    A hash is created as a result of carrying out a digest function. The hash is subsequently used together with XML canonicalization functions to match message documents in order to prove integrity and authenticity.

    A. True

    B. False

  • Question 23:

    XML canonicalization is the process of standardizing the syntax of XML documents that are to be digitally signed. This way, when the digital signature is verified, it reproduces the same message digest for assessing message integrity.

    A. True

    B. False

  • Question 24:

    Symmetric and asymmetric encryption keys are always created in pairs.

    A. True

    B. False

  • Question 25:

    A certificate authority is generally responsible for

    A. authenticating the identity of an entity requesting a certificate

    B. publishing information about revoked certificates

    C. receiving notifications about the loss of private keys

    D. signing certificates that bind a public key to authenticate identity information about the key holder

  • Question 26:

    The X.509 token can be used to express a security token that provides an X.509 digital certificate.

    A. text-based

    B. UDDI-based

    C. binary

    D. None of the above.

  • Question 27:

    In order to keep a service-oriented architectural model in constant alignment with the business it can be helpful for the security architecture to be and .

    A. fragmented, decentralized

    B. vendor-diverse, coupled

    C. abstracted, centralized

    D. vendor-specific, centralized

  • Question 28:

    The Direct Authentication pattern is best suited for point-to-point communication, while the Brokered Authentication pattern is best suited for service composition where a service consumer needs to re-authenticate itself with multiple services.

    A. True

    B. False

  • Question 29:

    The communication between two services operating within the same organization needs to be protected using message-layer security. These services are only used within the organizational boundary. The question is raised as to whether to use self-signed certificates or certificates signed by a certificate authority. A security specialist states that only certificates signed by an external certificate authority can be used to fulfill this security requirement.

    Is this correct?

    A. Yes

    B. No

  • Question 30:

    You are required to design an authorization mechanism for a REST service. The service provides functionality by providing access to different resources, some of which are local to the service while others are located on remote servers. You are required to restrict access to the service based on which resource is requested and which HTTP method has been specified by the service consumer.

    By doing so, which combination of action control rules needs to be used?

    A. identity and environment

    B. environment and resource

    C. resource and action

    D. action and identity

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only SOA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your S90-18A exam preparations and SOA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.