Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

S90.18 Questions and Answers

Note! Following S90.18 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

S90.18 Questions and Answers

Question # 6

Which of the following approaches represents a valid means of utilizing generic security logic?

A.

When required, generic security logic can be embedded within a service. The close proximity to the service logic maximizes the chances that the security logic will be consistently executed without interference from attackers.

B.

When required, generic security logic can be abstracted into a separate utility service. This allows for reuse.

C.

When required, generic security logic can be abstracted into a service agent. This allows for reuse and the security logic can be executed in response to runtime events.

D.

All of the above.

Full Access
Question # 7

The Data Confidentiality pattern is applied to all of the services in a service inventory. As a result, all message data must be encrypted.

A.

True

B.

False

Full Access
Question # 8

Responses issued by Certificate Revocation Lists (CRLs) and Online Certificate Status Protocol (OCSP) services need to be ___________ and ___________ so that it can be determined whether these responses were sent by a trusted certificate authority or a malicious program pretending to be a certificate authority.

A.

encrypted, verified

B.

signed, verified

C.

encrypted, decrypted

D.

signed, decrypted

Full Access
Question # 9

Digital signatures use encryption and hashing.

A.

True

B.

False

Full Access
Question # 10

Security specialists at an organization require that messages exchanged between two services are kept private. There is an added requirement to check if the messages were tampered with. The application of which of the following patterns fulfills these requirements?

A.

Data Confidentiality

B.

Data Origin Authentication

C.

Direct Authentication

D.

Brokered Authentication

Full Access
Question # 11

The owner of a service inventory reports that the public key related to a certain private key has been lost. There is a concern that this was the result of a security breach. A security specialist recommends contacting the certificate authority in order to add the corresponding certificate to the certificate authority's Certificate Revocation List (CRL). However, the certificate authority responds by indicating that this is not necessary. Which of the following answers explains this response?

A.

The certificate authority needs to issue a new public key instead.

B.

The certificate authority requires that the existing public key needs to be changed within the existing certificate.

C.

Public keys cannot get lost because they are already publically available.

D.

None of the above

Full Access
Question # 12

The application of the Service Composability principle can be supported by the application of the Brokered Authentication pattern.

A.

True

B.

False

Full Access
Question # 13

Using transport-layer security, an active intermediary that takes possession of a message can compromise:

A.

message confidentiality

B.

message confidentiality and message integrity

C.

message integrity

D.

None of the above.

Full Access
Question # 14

A service that issues a SAML assertion is called a Policy Decision Point (PDP) while a service that accepts a SAML assertion is called a SAML authority.

A.

True

B.

False

Full Access