View Mode
Q: 11
Service A is part of a large service composition. Following an attack, Service A becomes non- responsive. Which of the following attacks could be responsible for Service A's non-responsiveness?
Options
Q: 12
A malicious active intermediary intercepts a message sent between two services. What concerns are raised by such an attack?
Options
Q: 13
Within a certain service activity, two services are using certificates in order to guarantee the integrity of messages. With every message exchange, certificates are sent and received. These certificates are checked against an external Certificate Authority (CA) in order to verify whether or not they have been revoked. The current security architecture is suffering from increased latency resulting from the extra communication required with the CA. How can this problem be addressed without compromising message integrity?
Options
Q: 14
Security policies defined using WS-SecurityPolicy can be used to convey which of the following requirements to a service consumer?
Options
Q: 15
Architects responsible for a domain service inventory are being asked to make some of their services available to service consumers from outside the organization. However, they are reluctant to do so and consult you to help define a security architecture that will keep all of the existing services within the domain service inventory hidden within a private network. Which of the following is a valid approach for fulfilling this requirement?
Options
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE