Arcitura Education Fundamental SOA Security S90.18 Exam Questions

Page: 1 / 14
Total 98 questions
Question 1

The owner of a service inventory reports that the public key related to a certain private key has been lost. There is a concern that this was the result of a security breach. A security specialist recommends contacting the certificate authority in order to add the corresponding certificate to the certificate authority's Certificate Revocation List (CRL). However, the certificate authority responds by indicating that this is not necessary. Which of the following answers explains this response?



Answer : C


Question 2

Service A hashes a message, resulting in message digest X. Service A encrypts message digest X with its private key, resulting in cipher text X1. Service A sends the message and X1 to Service B. Service B hashes the message, resulting in message digest Y. Service B decrypts X1 with Service A's public key, recovering message digest X1. Service B compares X and Y and finds them not to be equal. This proves that;



Answer : D


Question 3

Service A is a utility service that has been designed to receive and send non-confidential messages. Service A provides access to a legacy application. Since the launch of Service A . the overall usage volumes have increased beyond expectations. Upon a review of the access logs, it is discovered that most of the requests came from unauthorized service consumers. The application of the Direct Authentication and Data Confidentiality patterns will prevent this from happening in the future.



Answer : B


Question 4

A task service needs to access three entity services as part of a service composition. The task service needs to authenticate itself every time it accesses one of the three entity services. Because the task service must authenticate itself three times to complete its task, the current service composition design is considered inefficient. How can it be improved while continuing to fulfill the authentication requirements?



Answer : B


Question 5

By applying the Data Origin Authentication pattern together with the Brokered Authentication pattern, you guarantee confidential message exchanges by a service consumer that needs to repeatedly authenticate itself with a set of services within the same service composition.



Answer : B


Question 6

Service A requires self-signed digital certificates from all of its service consumers. The service and its service consumers both belong to the same organization. You are presented with a new requirement to only allow access to those service consumers with certificates that have not expired. How can this requirement be addressed with minimal impacts on the current security architecture?



Answer : A


Question 7

SAML can be used for the application of the Brokered Authentication pattern.



Answer : A


Page:    1 / 14   
Total 98 questions