S90.18 無料問題集「SOA Fundamental SOA Security」
A set of services within a service inventory were originally each designed with a dedicated
identity store. To reduce the need for service consumers to repeatedly authenticate
themselves when having to access multiple services, a new ___________ has been added
along with a____________.
identity store. To reduce the need for service consumers to repeatedly authenticate
themselves when having to access multiple services, a new ___________ has been added
along with a____________.
正解:C
解答を投票する
The receiver of a message decrypts an encrypted message digest using the public key of
the sender that corresponds to the private key. The receiver then matches it against the
digest of the original message. If the decrypted digest and the newly calculated digest
match, then what does it prove?
the sender that corresponds to the private key. The receiver then matches it against the
digest of the original message. If the decrypted digest and the newly calculated digest
match, then what does it prove?
正解:A、B
解答を投票する
Service A requires certificates signed by a trusted certificate authority. The certificate
authority publishes a Certificate Revocation List (CRL) on a frequent basis. As a result,
some of the service consumers that were previously authorized to access Service A will not
be able to after new CRLs are issued. How can this security requirement be enforced?
authority publishes a Certificate Revocation List (CRL) on a frequent basis. As a result,
some of the service consumers that were previously authorized to access Service A will not
be able to after new CRLs are issued. How can this security requirement be enforced?
正解:D
解答を投票する
The services within a domain service inventory provide access to confidential data
retrieved from a shared database. These services need to be accessible from outside the
domain service inventory. Which of the following design options will preserve the
confidentiality of the data when the services are accessed from outside the service
inventory?
retrieved from a shared database. These services need to be accessible from outside the
domain service inventory. Which of the following design options will preserve the
confidentiality of the data when the services are accessed from outside the service
inventory?
正解:C
解答を投票する