S90.18 無料問題集「SOA Fundamental SOA Security」

A service consumer submits a message with security credentials to an authentication
broker, which authenticates the credentials against a central identity store. The
authentication broker then responds with a token that the service consumer can use to
access Services A, B, and C (none of which have their own identity store). This scenario
demonstrates the application of which pattern?

A service that was previously using a shared identity store is now given its own dedicated
identity store instead. What are the likely impacts (positive or negative) that will result from
this change?

正解:B、D 解答を投票する
Service A hashes a message using algorithm X.
which creates message digest X1. Service
B uses a different algorithm Y to create message digest Y1 of the same message. Which of
the following statements are true regarding the comparison of X1 and Y1?

正解:B、C 解答を投票する
The more _____________ the security architecture is across services, the more
____________the service composition architecture.

The services in a service inventory have all been built with compatible security
technologies and mechanisms. Now, security policies are being introduced for the first
time. How can security policies become part of the service inventory and its services while
adhering to the application of the Standardized Service Contract principle?

With SAML, the _____________ element is used by the relying party to confirm that a
given message came from the subject specified in the assertion.

A set of SAML tokens has been used as a result of the application of the Brokered
Authentication pattern within a particular service inventory. Because SAML assertions
normally contain a signature, the security specialist is confident that the integrity of
messages will be maintained. What's wrong with this assumption?

You are required to design an authorization mechanism for a REST service. The service
provides functionality by providing access to different resources, some of which are local to
the service while others are located on remote servers. You are required to restrict access
to the service based on which resource is requested and which HTTP method has been
specified by the service consumer. By doing so, which combination of action control rules
needs to be used?

The sender-vouches SAML subject confirmation method is best suited for a service
consumer that does not need to interact with more than one service for a given task.

The application of the Data Origin Authentication pattern only provides message integrity.

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡