S90.18 無料問題集「SOA Fundamental SOA Security」

The services in a service inventory have all been built with compatible security
technologies and mechanisms. Now, security policies are being introduced for the first
time. How can security policies become part of the service inventory and its services while
adhering to the application of the Standardized Service Contract principle?

By applying the Data Origin Authentication pattern together with the Brokered
Authentication pattern, you guarantee confidential message exchanges by a service
consumer that needs to repeatedly authenticate itself with a set of services within the same
service composition.

The manager of an IT department decides to split up an existing enterprise service
inventory into two domain service inventories. The public key used previously in the
enterprise service inventory can continue to be used in one of the domain service
inventories.

Which of the following tasks directly relates to the application of the Service Loose
Coupling principle?

As a requirement for accessing Service B, Service A needs to encrypt its request message.
Service B decrypts the message, makes some changes, encrypts the message, and then
forwards it to Service C.
However, the message does not make it to Service C.
Instead, a runtime error is raised by a service agent that does not support encryption. This service
agent only requires access to the message header in order to route the message to the
appropriate instance of Service C.
It is therefore decided that the header part of the message will not be encrypted. Which of the following can be used to address this
requirement?

Which of the following are valid reasons for a certificate to be revoked:

正解:A、B、C 解答を投票する
In order to express the order in which a message is signed and encrypted, the _________
industry standard can be used.

Which of the following is the primary technology used for the application of the Data Origin
Authentication pattern?

Which of the following approaches represents a valid means of utilizing generic security
logic?

You are responsible for designing Service A, which must compose Services B and C.
You are able to apply the necessary security mechanisms to ensure that messages exchanged
by Service A comply with your security requirements. However, you are not given access to
the design specifications for Services B and C.
Based on the information that is published
about Services B and C, you cannot guarantee that these services will provide the same
level of security as Service A.
This limitation was placed upon you as a result of the
application of which service-orientation principle?

弊社を連絡する

我々は12時間以内ですべてのお問い合わせを答えます。

オンラインサポート時間:( UTC+9 ) 9:00-24:00
月曜日から土曜日まで

サポート:現在連絡