Arcitura S90.18
Q: 1
Service A contains a service capability that runs a complex mathematical function, which results in
runtime failure if invalid input values are supplied by a service consumer. Security needs to be added
so that it can be verified that message content received by Service A has not been altered since the
message was sent by a legitimate service consumer. Which pattern needs to be applied to fulfill this
security requirement?
Options
Q: 2
Using transport-layer security, an active intermediary that takes possession of a message can
compromise:
Options
Q: 3
In order to express the order in which a message is signed and encrypted, the _________ industry
standard can be used.
Options
Q: 4
A service that was previously using a shared identity store is now given its own dedicated identity
store instead. What are the likely impacts (positive or negative) that will result from this change?
Options
Q: 5
Service A hashes a message, resulting in message digest X. Service A encrypts the message digest X
with its private key, resulting ir ciphertext X1. Service A sends the message and X1 to Service B .
Service B hashes the message, resulting in message digest Y. Service B decrypts X1 with Service A's
public key, recovering message digest X. Service B compares Y with X and finds them to be equal.
This proves that:
Options
Q: 6
The more _____________ the security architecture is across services, the more ____________the
service composition architecture.
Options
Q: 7
Service A relies on a shared identity store. Service B has its own identity store. Service C also has its
own identity store, but must also access the shared identity store used by Service A . Which service
has the least reduction in autonomy as a result of its relationship with identity store mechanism(s)?
Options
Q: 8
The communication between two services operating within the same organization needs to be
protected using message-layer security. These services are only used within the organizational
boundary. The question is raised as to whether to use self-signed certificates or certificates signed by
a certificate authority. A security specialist states that only certificates signed by an external
certificate authority can be used to fulfill this security requirement. Is this correct?
Options
Q: 9
Username and X.509 token profiles can be combined so that a single message can contain a
username token that is digitally signed.
Options
Q: 10
When working with SAML, a Security Token Service (STS) and a Service Provider refer to the same
service.
Options
Question 1 of 10