Exam Details

  • Exam Code
    :S90-18A
  • Exam Name
    :Fundamental SOA Security
  • Certification
    :SOACP
  • Vendor
    :SOA
  • Total Questions
    :98 Q&As
  • Last Updated
    :May 12, 2024

SOA SOACP S90-18A Questions & Answers

  • Question 41:

    Service A contains a service capability that runs a complex mathematical function, which results in runtime failure if invalid input values are supplied by a service consumer. Security needs to be added so that it can be verified that message content received by Service A has not been altered since the message was sent by a legitimate service consumer. Which pattern needs to be applied to fulfill this security requirement?

    A. Data Confidentiality

    B. Data Origin Authentication

    C. Direct Authentication

    D. Brokered Authentication

  • Question 42:

    Security policies that extend the technical service contract must be standardized within a given service inventory. This statement is in accordance with which service-orientation principle?

    A. Service Abstraction

    B. Service Reusability

    C. Service Composability

    D. None of the above

  • Question 43:

    A service that was previously using a shared identity store is now given its own dedicated identity store instead.

    What are the likely impacts (positive or negative) that will result from this change?

    A. The service's autonomy is increased.

    B. The operational responsibility is increased due to the need to keep the dedicated identity store in synch with a parent identity store.

    C. The potential to apply the Service Abstraction principle is increased.

    D. The service will no longer be dependent on a certificate authority.

  • Question 44:

    When using a single sign-on mechanism, security contexts are .

    A. discarded within seconds after creation

    B. stored in a UDDI repository for auditing purposes

    C. combined together at runtime

    D. None of the above.

  • Question 45:

    The Data Confidentiality pattern is applied to all of the services in a service inventory. As a result, all message data must be encrypted.

    A. True

    B. False

  • Question 46:

    With SAML, the element is used by the relying party to confirm that a given message came from the subject specified in the assertion.

    A. subject confirmation

    B. token

    C. sign-on

    D. claim

  • Question 47:

    There are two XML documents that contain identical XML elements and data values. However, one XML document has more whitespace characters than the other. A message digest for each of these documents is created.

    Which of the following statements regarding these message digests is true?

    A. they are the same

    B. they are different

    C. two separate message digests cannot be created because the documents contain the same XML elements

    D. only hashing digests can be created for XML documents, not message digests

  • Question 48:

    The application of the Service Composability principle can be supported by the application of the Brokered Authentication pattern.

    A. True

    B. False

  • Question 49:

    Which of the following is the primary technology used for the application of the Data Origin Authentication pattern?

    A. SAML claims

    B. symmetric encryption

    C. security tokens

    D. None of the above

  • Question 50:

    Service A is an agnostic service that currently uses message-layer security implemented by symmetric encryption. However, because Service A has recently been successfully attacked, it has been decided that asymmetric encryption needs to be used instead. The nature of the messages exchanged by Service A requires that only some parts of the message data need to be encrypted. Although it is agreed that asymmetric encryption is required, architects are concerned that it will adversely affect the service's runtime performance.

    Which of the following approaches will fulfill these security requirements with the least amount of performance degradation?

    A. An authentication broker needs to be introduced with a dedicated identity store.

    B. Only the required parts of the message need to be encrypted instead of encrypting the entire message.

    C. The Direct Authentication pattern needs to be applied so that no intermediary is involved between Service A and its service consumers.

    D. Certificates need to be issued by a registered certificate authority.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only SOA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your S90-18A exam preparations and SOA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.