SOA S90.18A Questions & Answers

Full Version: 98 Q&A


Latest S90.18A Exam Questions and Practice Tests 2024 - Killexams.com

Latest S90.18A Practice Tests with Actual Questions


Get Complete pool of questions with Premium PDF and Test Engine


Exam Code : S90.18A
Exam Name : Fundamental SOA Security
Vendor Name :
"SOA"








SOA


S90.18A


Fundamental SOA Security


https://killexams.com/pass4sure/exam-detail/S90.18A



Question: 85

One of the primary industry standards used for the application of the Data Confidentiality pattern is:


  1. XML-Encryption

  2. Canonical XML

  3. XML-Signature

  4. SAML




Answer: A



Question: 86

Which of the following design options can help reduce the amount of runtime processing required by security logic within a service composition?


  1. Increase the usage of XML-Encryption and XML-Signature.

  2. Use a single sign-on mechanism.

  3. Introduce an identity store that is shared by the services within the service composition.

  4. Ensure that non-repudiation is constantly guaranteed.




Answer: B



Question: 87

A project team is planning to create a secure service composition that consists of services from two different domain service inventories. The security mechanisms for each service inventory are based on different vendor technologies that adhere to the same industry standards and the same design standards. What is wrong with this service composition architecture?


  1. Because different vendor security technologies were used, services from different domain service inventories will be using incompatible security credentials.

  2. Security mechanisms have a fixed limitation that prevents their usage across service inventory boundaries.

  3. Vendor technologies do not adhere to industry standards. Only industry technologies adhere to industry standards.

  4. None of the above




Answer: D



Question: 88

Online Certificate Status Protocol (OCSP) based services provide online certificate revocation checking. However, these types of services can introduce network latency because only one certificate can be checked at a time.


  1. True

  2. False




Answer: A



Question: 89

Atypical SAML assertion will contain at least one of the following subject statements:


  1. authorization decision statement

  2. authentication statement

  3. attribute statement

  4. certificate authority issuer statement




Answer: A, B, C



Question: 90

Service A hashes a message using algorithm X. which creates message digest X1. Service B uses a different algorithm Y to create message digest Y1 of the same message. Which of the following statements are true regarding the comparison of X1 and Y1?


  1. They have fixed sizes

  2. They can be swapped

  3. They do not match

  4. They are based on the same hashing algorithm




Answer: A, C



Question: 91

Security specialists at an organization require that messages exchanged between two services are kept private. There is an added requirement to check if the messages were


tampered with. The application of which of the following patterns fulfills these requirements?


  1. Data Confidentiality

  2. Data Origin Authentication

  3. Direct Authentication

  4. Brokered Authentication




Answer: A, B



Question: 92

Username and X.509 token profiles can be combined so that a single message can contain a username token that is digitally signed.


  1. True

  2. False




Answer: A



Question: 93

Service A is owned by Organization A. Service A sends a message containing confidential data to Service B, which is owned by Organization B. Service B sends the message to Service C, which is also owned by Organization B. Organization A trusts Organization B, which means there is no requirement to protect messages from intermediaries and after a message is received by Service B (and as long as the message remains within the boundary of Organization B), there is no requirement to keep the message data confidential. Which of the following approaches will fulfill these security requirements with the least amount of performance degradation?


  1. Messages exchanged between Service A and Service B are encrypted using XML- Encryption.

  2. The communication channel between Service A and Service B is encrypted using a transport- layer security technology.

  3. SAML security tokens are used so that Service B can authenticate Service A.

  4. An authentication broker is introduced between Service A and Service B.




Answer: B



Question: 94


You are required to design security mechanisms to enable secure message exchanges between different domain service inventories within the same organization. This needs to be documented in the design specification for which type of service-oriented architecture?


  1. service architecture

  2. service composition architecture

  3. service inventory architecture

  4. service-oriented enterprise architecture




Answer: D



Question: 95

Which of the following approaches represents a valid means of utilizing generic security logic?


  1. When required, generic security logic can be embedded within a service. The close proximity to the service logic maximizes the chances that the security logic will be consistently executed without interference from attackers.

  2. When required, generic security logic can be abstracted into a separate utility service. This allows for reuse.

  3. When required, generic security logic can be abstracted into a service agent. This allows for reuse and the security logic can be executed in response to runtime events.

  4. All of the above.




Answer: D



Question: 96

Which of the following tasks directly relates to the application of the Service Loose Coupling principle?


  1. Creating one security policy that is shared by multiple services.

  2. Creating one security policy that is specific to one service.

  3. Creating multiple security policies that are specific to one service.

  4. All of the above.

    Answer:
    D
    Question:
    97


Service A hashes a message, resulting in message digest X. Service A encrypts the message digest X with its private key, resulting ir ciphertext X1. Service A sends the message and X1 to Service B. Service B hashes the message, resulting in message digest

Y. Service B decrypts X1 with Service A's public key, recovering message digest X. Service B compares Y with X and finds them to be equal. This proves that:


  1. the message was not altered

  2. only Service A sent this particular message

  3. public key cryptography was used

  4. Allof the above




Answer: D



Question: 98

A typical SAML assertion will contain at least one of the following subject statements:


  1. authorization decision statement

  2. authentication statement

  3. attribute statement

  4. certificate authority issuer statement




Answer: A, B, C


User: Emilio*****

Recently, I purchased the s90.18a exam practice tests package deal from Killexams.com and studied it thoroughly. Last week, I passed the s90.18a and received my certification. The Killexams.com exam simulator was an excellent tool to prepare for the exam, boosting my confidence and helping me easily pass the certification exam. I am quite encouraged by this experience.
User: Edward*****

When I requested my brother for advice regarding my S90.18A exam, he informed me to buckle up because I was in for a high-quality journey. He gave me the killexams.com address and assured me that it would ensure that I clean my S90.18A exam with suitable marks. I took his recommendation and signed up, and I am so satisfied that I did it because my S90.18A exam went tremendously well, and I passed with the correct score. It was like a dream come true, so thanks to killexams.com.
User: Sabiba*****

I am very happy with the S90.18A Questions and Answers provided by Killexams.com. It helped me a lot in the exam center, and I can come for different SOA certifications as well.
User: Nastia*****

Thanks to my friend who introduced me to killexams.com, I was able to overcome my fear and anxiety about the S90.18A exam. I was not ready to comprehend the points well, but killexams.com questions and answers helped me by providing appropriate question and answer references. I was able to answer 87 questions in 80 minutes and passed the exam. killexams.com turned out to be my actual companion during my S90.18A exam preparation.
User: Agatha*****

I can confidently say that Killexams provides the best S90.18A exam training I have ever come across. I passed the exam without any pressure, issues, or frustration, thanks to their valid questions. Their money-back guarantee also works, but it was not necessary as their material made it easy to pass. I plan to use Killexams for my future certification tests.

Features of iPass4sure S90.18A Exam

  • Files: PDF / Test Engine
  • Premium Access
  • Online Test Engine
  • Instant download Access
  • Comprehensive Q&A
  • Success Rate
  • Real Questions
  • Updated Regularly
  • Portable Files
  • Unlimited Download
  • 100% Secured
  • Confidentiality: 100%
  • Success Guarantee: 100%
  • Any Hidden Cost: $0.00
  • Auto Recharge: No
  • Updates Intimation: by Email
  • Technical Support: Free
  • PDF Compatibility: Windows, Android, iOS, Linux
  • Test Engine Compatibility: Mac / Windows / Android / iOS / Linux

Premium PDF with 98 Q&A

Get Full Version

All SOA Exams

SOA Exams

Certification and Entry Test Exams

Complete exam list