Exam Details

  • Exam Code
    :S90-18A
  • Exam Name
    :Fundamental SOA Security
  • Certification
    :SOACP
  • Vendor
    :SOA
  • Total Questions
    :98 Q&As
  • Last Updated
    :May 12, 2024

SOA SOACP S90-18A Questions & Answers

  • Question 81:

    The services within a domain service inventory provide access to confidential data retrieved from a shared database. These services need to be accessible from outside the domain service inventory.

    Which of the following design options will preserve the confidentiality of the data when the services are accessed from outside the service inventory?

    A. The Direct Authentication pattern is applied to the database used by the services that need to be externally accessed.

    B. A dedicated database is created to store the confidential data. This database will only be used by the services that need to be externally accessed.

    C. The messages exchanged by the services are designed to include security tokens.

    D. None of above

  • Question 82:

    The more the security architecture is across services, the more the service composition architecture.

    A. standardized, flexible

    B. centralized, vendor-neutral

    C. standardized, vendor-centric

    D. centralized, inflexible

  • Question 83:

    Which of the following security mechanisms can provide centralized security measures for all services within a service inventory?

    A. public key infrastructure

    B. single sign-on

    C. hashed certificate repository

    D. identity management system

  • Question 84:

    A service contract includes a security policy that exposes specific details of the service's underlying implementation.

    This is an example of the application of which service- orientation principle?

    A. Service Abstraction

    B. Service Loose Coupling

    C. Standardized Service Contract

    D. None of the above.

  • Question 85:

    The owner of a service inventory reports that the public key related to a certain private key has been lost. There is a concern that this was the result of a security breach. A security specialist recommends contacting the certificate authority in order to add the corresponding certificate to the certificate authority's Certificate Revocation List (CRL). However, the certificate authority responds by indicating that this is not necessary.

    Which of the following answers explains this response?

    A. The certificate authority needs to issue a new public key instead.

    B. The certificate authority requires that the existing public key needs to be changed within the existing certificate.

    C. Public keys cannot get lost because they are alreadypublicallyavailable.

    D. None of the above

  • Question 86:

    A task service needs to access three entity services as part of a service composition. The task service needs to authenticate itself every time it accesses one of the three entity services. Because the task service must authenticate itself three times to complete its task, the current service composition design is considered inefficient.

    How can it be improved while continuing to fulfill the authentication requirements?

    A. Increase the network bandwidth between the task service and the entity services.

    B. Use a single sign-on mechanism.

    C. Remove the authentication requirements within the service composition, thereby reducing the message size and making communication faster.

    D. None of the above

  • Question 87:

    Service A and Service B belong to Organization A and Service C belongs to Organization B. Service A sends confidential messages to Service B, which forwards these messages to Service C. The message sent to Service C is intercepted by a load balancing service agent that determines which instance of Service C to route the message to. This entire message path needs to be encrypted in order to ensure message confidentiality from when the message is first sent by Service A until it is received by an instance of Service C. Organization A doesn't trust any intermediaries that may exist in between Service B and Service C and also doesn't want to share any keys with Organization B. Furthermore, there is a requirement to minimize any adverse effects on performance.

    Which of the following approaches fulfills these requirements?

    A. Use message-layer security by adding symmetric encryption between Services A, B and C This way,message content is not available to any intermediaries between Services B and C

    B. Because Service A and Service B exist within the same organizational boundary, use transport- layer security to provide message confidentiality. Use message-layer security via asymmetric encryption between Service B and Service C.

    C. Use transport-layer security between Service B and Service C and use message-layer security via asymmetric encryptionbetween Service A and Service B. This way. all the services are secured while at the same time minimizing the performance degradation between Service B and Service C

    D. None of the above.

  • Question 88:

    Digital signatures use encryption and hashing.

    A. True

    B. False

  • Question 89:

    The manager of an IT department decides to split up an existing enterprise service inventory into two

    domain service inventories.

    The public key used previously in the enterprise service inventory can continue to be used in one of the

    domain service inventories.

    A. True

    B. False

  • Question 90:

    As a requirement for accessing Service B, Service A needs to encrypt its request message. Service B decrypts the message, makes some changes, encrypts the message, and then forwards it to Service C. However, the message does not make it to Service C. Instead, a runtime error is raised by a service agent that does not support encryption. This service agent only requires access to the message header in order to route the message to the appropriate instance of Service C. It is therefore decided that the header part of the message will not be encrypted.

    Which of the following can be used to address this requirement?

    A. certificate authority

    B. SAML

    C. non-repudiation

    D. None of the above

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only SOA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your S90-18A exam preparations and SOA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.