Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpt65

S90.19 Questions and Answers

Note! Following S90.19 Exam is Retired now. Please select the alternative replacement for your Exam Certification.

S90.19 Questions and Answers

Question # 6

A security architecture needs to be created in order to guarantee that messages that are sent to Service A must comply to a security policy that is published as part of Service A's service contract. The application of which of the following patterns will fulfill this requirement?

A.

Message Screening

B.

Brokered Authentication

C.

Exception Shielding

D.

None of the above

Full Access
Question # 7

The use of XML schemas for data validation helps avoid several types of data-centric threats.

A.

True

B.

False

Full Access
Question # 8

Service A is a Web service that accesses the Student table in a shared database in order to store XML-based student records. When invoked, the GetStudent operation of Service A uses a StudentID value to retrieve the record of a single student by executing an XPath query. An attacker sends a malicious message that manipulates the XPath query to return all the student records. Which of the following attacks was carried out?

A.

XML parser attack

B.

SQL injection attack

C.

XPath injection attack

D.

None of the above

Full Access
Question # 9

Which of the following types of WS-SecurityPolicy assertions is required in order to determine whether derived keys are needed for a key agreement security session?

A.

protection assertions

B.

token assertions

C.

security binding assertions

D.

None of the above.

Full Access
Question # 10

Service A is an agnostic service that is part of a complex service composition that relies on the use of several intermediaries for message routing purposes. Due to a recent malicious intermediary attack, public key cryptography and digital signatures have been added to Service A. Subsequently, the attacks stop. However, legitimate service consumers are experiencing latency when interacting with services from this complex service composition. Following an investigation, it is discovered that Service A has increased its system resource consumption in order to perform its new security-related functions. How can you improve Service A’s performance without compromising its security requirements and without introducing new security mechanisms?

A.

Use symmetric encryption in combination with the Service Perimeter Guard pattern and SAML tokens.

B.

Use key agreement security sessions by deriving different keys from a session key for signing as well as encryption.

C.

Use base 64 encoded certificates in order to provide integrity and confidentiality.

D.

None of the above.

Full Access
Question # 11

Service A contains reporting logic that collects statistical data from different sources in order to produce a report document. One of the sources is a Web service that exists outside of the organizational boundary. Some of Service A's service consumers are encountering slow response times and periods of unavailability when invoking Service A. While investigating the cause, it has been discovered that some of the messages received from the external Web service contain excessive data and links to files (that are not XML schemas or policies). What can be done to address this issue?

A.

define cardinality in message schemas

B.

correlate request and response messages across different services

C.

use precompiled XPath expressions

D.

avoid downloading XML schemas at runtime

Full Access
Question # 12

The Trusted Subsystem pattern is applied to a service that provides access to a database. Select the answer that best explains why this service is still at risk of being subjected to an insufficient authorization attack.

A.

Attackers can steal confidential data by monitoring the network traffic that occurs between the service and the database.

B.

Because the Service Perimeter Guard pattern was also not applied, the database is not protected by a firewall.

C.

If an attacker gains access to the security credentials used by the service to access the database, the attacker can access the database directly.

D.

None of the above.

Full Access