S90.18 無料問題集「SOA Fundamental SOA Security」

Which of the following approaches represents a valid means of utilizing generic security
logic?

The requirement to defer security related state data at runtime relates directly to the
application of which service-orientation principle?

A set of services within a service inventory were originally each designed with a dedicated
identity store. To reduce the need for service consumers to repeatedly authenticate
themselves when having to access multiple services, a new ___________ has been added
along with a____________.

The receiver of a message decrypts an encrypted message digest using the public key of
the sender that corresponds to the private key. The receiver then matches it against the
digest of the original message. If the decrypted digest and the newly calculated digest
match, then what does it prove?

正解:A、B 解答を投票する
The Data Confidentiality pattern can be applied using which of the following security
mechanisms?

正解:C、D 解答を投票する
The SAML and WS-Security industry standards can be applied to the same service
composition architecture.

Service A requires certificates signed by a trusted certificate authority. The certificate
authority publishes a Certificate Revocation List (CRL) on a frequent basis. As a result,
some of the service consumers that were previously authorized to access Service A will not
be able to after new CRLs are issued. How can this security requirement be enforced?

The sender-vouches SAML subject confirmation method is best suited for a service
consumer that does not need to interact with more than one service for a given task.

The manager of an IT department decides to split up an existing enterprise service
inventory into two domain service inventories. The public key used previously in the
enterprise service inventory can continue to be used in one of the domain service
inventories.

The services within a domain service inventory provide access to confidential data
retrieved from a shared database. These services need to be accessible from outside the
domain service inventory. Which of the following design options will preserve the
confidentiality of the data when the services are accessed from outside the service
inventory?

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡