Arcitura Education Fundamental SOA Security S90.18 Exam Questions in PDF

Free Arcitura Education S90.18 Dumps Questions (page: 2)

As a requirement for accessing Service B, Service A needs to encrypt its request message. Service B decrypts the message, makes some changes, encrypts the message, and then forwards it to Service

  1. However, the message does not make it to Service C. Instead, a runtime error is raised by a service agent that does not support encryption. This service agent only requires access to the message header in order to route the message to the appropriate instance of Service C. It is therefore decided that the header part of the message will not be encrypted.
    Which of the following can be used to address this requirement?
  2. certificate authority
  3. SAML
  4. non-repudiation
  5. None of the above

Answer(s): D



Digital signatures use encryption and hashing.

  1. True
  2. False

Answer(s): A



The manager of an IT department decides to split up an existing enterprise service inventory into two domain service inventories. The public key used previously in the enterprise service inventory can continue to be used in one of the domain service inventories.

  1. True
  2. False

Answer(s): A



A task service needs to access three entity services as part of a service composition. The task service needs to authenticate itself every time it accesses one of the three entity services. Because the task service must authenticate itself three times to complete its task, the current service composition design is considered inefficient. How can it be improved while continuing to fulfill the authentication requirements?

  1. Increase the network bandwidth between the task service and the entity services.
  2. Use a single sign-on mechanism.
  3. Remove the authentication requirements within the service composition, thereby reducing the message size and making communication faster.
  4. None of the above

Answer(s): B



Service A and Service B belong to Organization A and Service C belongs to Organization B. Service A sends confidential messages to Service B, which forwards these messages to Service C. The message sent to Service C is intercepted by a load balancing service agent that determines which instance of Service C to route the message to. This entire message path needs to be encrypted in order to ensure message confidentiality from when the message is first sent by Service A until it is received by an instance of Service C. Organization A doesn't trust any intermediaries that may exist in between Service B and Service C and also doesn't want to share any keys with Organization B. Furthermore, there is a requirement to minimize any adverse effects on performance.
Which of the following approaches fulfills these requirements?

  1. Use message-layer security by adding symmetric encryption between Services A, B and C. This way, message content is not available to any intermediaries between Services B and C.
  2. Because Service A and Service B exist within the same organizational boundary, use transport-layer security to provide message confidentiality. Use message-layer security via asymmetric encryption between Service B and Service C.
  3. Use transport-layer security between Service B and Service C and use message-layer security via asymmetric encryption between Service A and Service B. This way. all the services are secured while at the same time minimizing the performance degradation between Service B and Service
  4. None of the above.

Answer(s): B



The owner of a service inventory reports that the public key related to a certain private key has been lost. There is a concern that this was the result of a security breach. A security specialist recommends contacting the certificate authority in order to add the corresponding certificate to the certificate authority's Certificate Revocation List (CRL). However, the certificate authority responds by indicating that this is not necessary.
Which of the following answers explains this response?

  1. The certificate authority needs to issue a new public key instead.
  2. The certificate authority requires that the existing public key needs to be changed within the existing certificate.
  3. Public keys cannot get lost because they are already publically available.
  4. None of the above

Answer(s): C



A service contract includes a security policy that exposes specific details of the service's underlying implementation. This is an example of the application of which service-orientation principle?

  1. Service Abstraction
  2. Service Loose Coupling
  3. Standardized Service Contract
  4. None of the above.

Answer(s): D



Which of the following security mechanisms can provide centralized security measures for all services within a service inventory?

  1. public key infrastructure
  2. single sign-on
  3. hashed certificate repository
  4. identity management system

Answer(s): A,B,D



Share your comments for Arcitura Education S90.18 exam with other users:

J
John
10/12/2023 12:30:00 PM

great material

D
Dinesh
8/1/2023 2:26:00 PM

could you please upload sap c_arsor_2302 questions? it will be very much helpful.

L
LBert
6/19/2023 10:23:00 AM

vraag 20c: rsa veilig voor symmtrische cryptografie? antwoord c is toch fout. rsa is voor asymmetrische cryptogafie??

G
g
12/22/2023 1:51:00 PM

so far good

M
Milos
8/4/2023 9:33:00 AM

question 31 has obviously wrong answers. tls and ssl are used to encrypt data at transit, not at rest.

D
Diksha
9/25/2023 2:32:00 AM

pls provide dump for 1z0-1080-23 planning exams

H
H
7/17/2023 4:28:00 AM

could you please upload the exam?

A
Anonymous
9/14/2023 4:47:00 AM

please upload this

N
Naveena
1/13/2024 9:55:00 AM

good material

W
WildWilly
1/19/2024 10:43:00 AM

lets see if this is good stuff...

L
Lavanya
11/2/2023 1:53:00 AM

useful information

M
Moussa
12/12/2023 5:52:00 AM

intéressant

M
Madan
6/22/2023 9:22:00 AM

thank you for making the interactive questions

V
Vavz
11/2/2023 6:51:00 AM

questions are accurate

S
Su
11/23/2023 4:34:00 AM

i need questions/dumps for this exam.

L
LuvSN
7/16/2023 11:19:00 AM

i need this exam, when will it be uploaded

M
Mihai
7/19/2023 12:03:00 PM

i need the dumps !

W
Wafa
11/13/2023 3:06:00 AM

very helpful

A
Alokit
7/3/2023 2:13:00 PM

good source

S
Show-Stopper
7/27/2022 11:19:00 PM

my 3rd test and passed on first try. hats off to this brain dumps site.

M
Michelle
6/23/2023 4:06:00 AM

please upload it

L
Lele
11/20/2023 11:55:00 AM

does anybody know if are these real exam questions?

G
Girish Jain
10/9/2023 12:01:00 PM

are these questions similar to actual questions in the exam? because they seem to be too easy

P
Phil
12/8/2022 11:16:00 PM

i have a lot of experience but what comes in the exam is totally different from the practical day to day tasks. so i thought i would rather rely on these brain dumps rather failing the exam.

B
BV
6/8/2023 4:35:00 AM

good questions

K
krishna
12/19/2023 2:05:00 AM

valied exam dumps. they were very helpful and i got a pretty good score. i am very grateful for this service and exam questions

P
Pie
9/3/2023 4:56:00 AM

will it help?

L
Lucio
10/6/2023 1:45:00 PM

very useful to verify knowledge before exam

A
Ajay
5/17/2023 4:54:00 AM

good stuffs

T
TestPD1
8/10/2023 12:19:00 PM

question 17 : responses arent b and c ?

N
Nhlanhla
12/13/2023 5:26:00 AM

just passed the exam on my first try using these dumps.

R
Rizwan
1/6/2024 2:18:00 AM

very helpful

Y
Yady
5/24/2023 10:40:00 PM

these questions look good.

K
Kettie
10/12/2023 1:18:00 AM

this is very helpful content

AI Tutor 👋 I’m here to help!