Download Advanced SOA Security.S90.19.Pass4Success.2026-01-25.57q.vcex

Vendor: Arcitura Education
Exam Code: S90.19
Exam Name: Advanced SOA Security
Date: Jan 25, 2026
File Size: 34 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

ProfExam Discount

Demo Questions

Question 1
Which of the following types of attack always affect the availability of a service?
  1. Exception generation attack
  2. SQL injection attack
  3. XPath injection attack
  4. None of the above
Correct answer: D
Question 2
The use of XML schemas for data validation helps avoid several types of data-centric threats.
  1. True
  2. False
Correct answer: A
Question 3
The use of session keys and symmetric cryptography results in:
  1. Increased performance degradation
  2. Increased reliability degradation
  3. Reduced message sizes
  4. None of the above
Correct answer: D
Question 4
An alternative to using a ___________ is to use a __________.
  1. Public key, private key
  2. Digital signature, symmetric key
  3. Public key, key agreement security session
  4. Digital signature, asymmetric key
Correct answer: C
Question 5
Service A is a Web service with an implementation that uses managed code. To perform a graphics-related operation, this managed code needs to access a graphics function that exist as unmanaged code. A malicious service consumer sends a message to Service A containing a very large numeric value. This value is forwarded by Service A' s logic to the graphics function. As a result, the service crashes and becomes unavailable. The service consumer successfully executed which attack?
  1. Buffer overrun attack
  2. Exception generation attack
  3. XML parser attack
  4. None of the above
Correct answer: A
Question 6
Service A retrieves data from third-party services that reside outside the organizational boundary. The quality of the data provided by these third-party services is not guaranteed. Service A contains exception shielding logic that checks all outgoing messages. It is discovered that service consumers are still sometimes receiving malicious content from Service A . Because digital signatures are being used, it is confirmed that Service A is, in fact, the sender of these messages and that the messages are not being altered by any intermediaries. Why do messages from Service A continue to contain malicious content?
  1. Messages received from third-party services are the likely source of the malicious content.
  2. Digital signatures alone are not sufficient. They need to be used in conjunction with asymmetric encryption in order to ensure that no intermediary can alter messages.
  3. Exception shielding logic needs to be used in conjunction with asymmetric encryption in order to guarantee that malicious content is not spread to service consumers.
  4. None of the above.
Correct answer: A
Question 7
When applying the Exception Shielding pattern, which of the following are valid options for implementing exception shielding logic?
  1. as part of the core service logic
  2. within a service agent
  3. within a utility service
  4. All of the above.
Correct answer: D
Question 8
A malicious passive intermediary intercepts messages sent between two services. Which of the following is the primary security concern raised by this situation?
  1. The integrity of the message can be affected.
  2. The confidentiality of the message can be affected.
  3. The reliability of the message can be affected.
  4. The availability of the message can be affected.
Correct answer: B
Question 9
Designing security policies with ____________ is an extension of the ___________SOA characteristic that supports interoperability and avoids_____________.
  1. industry standards, business-driven, vendor lock-out
  2. industry standards, vendor-neutral, vendor lock-in
  3. design standards, composition-centric, vendor lock-in
  4. design standards, enterprise-centric, vendor lock-in
Correct answer: B
Question 10
SAML assertions are smaller than certificates and they do not require access to any remote system for verification purposes.
  1. True
  2. False
Correct answer: B
Question 11
The Service Perimeter Guard pattern has been applied to help avoid denial of service attacks for a service inventory. As a result, services within the service inventory are only accessible via a perimeter service However, denial of service attacks continue to succeed and services within the service inventory become unavailable to external service consumers. What is the likely cause of this?
  1. The application of the Service Perimeter Guard pattern needs to be combined with the application of the Message Screening pattern in order to mitigate denial of service attacks.
  2. The perimeter service itself is the victim of denial of service attacks. As a result, none of the services inside the service inventory can be accessed by external service consumers.
  3. The Trusted Subsystem pattern should have been applied so that each service has a dedicated trusted subsystem.
  4. The Service Perimeter Guard pattern does not help avoid denial of service attacks.
Correct answer: B
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!