A valid signature issued by a certificate authority provides a guarantee that:
A. the certificate authority can be trusted
B. the certificate is not expired
C. the certificate is being used for an authorized purpose
D. None of the above.
A hashing function always returns for the same input data.
A. a different transformation
B. a different digest
C. the same transformation
D. the same digest
Using message-layer security, if a service agent takes possession of a message, it can forward the message to another service.
A. True
B. False
The application of the pattern can eliminate the need for . However, the application of this pattern can also introduce increased dependency on that can result in a single point of failure for multiple services.
A. Data Origin Authentication, distributed tokens, a single token
B. Direct Authentication, multiple identity stores, a central identity store
C. Brokered Authentication, distributed tokens, a central token
D. None of the above
The Direct Authentication pattern has been applied to a set of services so that they can authenticate service consumers. These services use a shared identity management system. This results in a security architecture that reduces the potential for applying the Service Autonomy principle.
A. True
B. False
A service is forced to use a non-standardized service contract that expresses security policies that were derived from underlying legacy resources.
This inhibits the application of which of the following service-orientation principles?
A. Service Statelessness
B. Service Loose Coupling
C. Service Authenticity
D. Standardized Service Contract
Service A hashes a message, resulting in message digest X. Service A encrypts message digest X with its private key, resulting in cipher text X1. Service A sends the message and X1 to Service B. Service B hashes the message, resulting in message digest Y. Service B decrypts X1 with Service A's public key, recovering message digest X1. Service B compares X and Y and finds them not to be equal. This proves that;
A. the message was altered
B. only Service A sent this particular message
C. public key cryptography was used
D. Allof the above
SAML can be used for the application of the Brokered Authentication pattern.
A. True
B. False
Which of the following SOA characteristics relate to the use of security mechanisms that support the reuse of services as part of multiple service compositions?
A. technology-driven
B. standards-neutral
C. enterprise-centric
D. composition-centric
The application of the Service Composability principle dictates that services acting as composition members be designed to establish and propagate a security context to other composition members, while services acting as composition controllers be designed so that they are prepared to join a security context already in progress rather than carrying out authentication themselves.
A. True
B. False
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only SOA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your S90-18A exam preparations and SOA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.