A malicious passive intermediary intercepts messages sent between two services. Which of the following is the primary security concern raised by this situation?
Answer : B
The use of derived keys is based on symmetric encryption. This is similar to asymmetric encryption because different keys can be derived from a session key and used separately for encryption and decryption.
Answer : B
Service A's logic has been implemented using managed code. An attacker sends an XML
Answer : A,D
SAML assertions are smaller than certificates and they do not require access to any remote system for verification purposes.
Answer : B
When applying the Exception Shielding pattern, which of the following are valid options for implementing exception shielding logic?
Answer : D
Service A retrieves data from third-party services that reside outside the organizational boundary. The quality of the data provided by these third-party services is not guaranteed.
Service A contains exception shielding logic that checks all outgoing messages. It is discovered that service consumers are still sometimes receiving malicious content from
Answer : A
The exception shielding logic resulting from the application of the Exception Shielding pattern can be centralized by applying which additional pattern?
Answer : C
An XML bomb attack and an XML external entity attack are both considered types of XML parser attacks.
Answer : A
How can the use of pre-compiled XPath expressions help avoid attacks?
Answer : B
An alternative to using a ___________ is to use a __________.
Answer : C
The Exception Shielding pattern can be applied together with the Trusted Subsystem pattern.
Answer : A
Service A contains a comprehensive message screening routine that can consume a lot of system resources. Service consumers are reporting that sometimes Service A becomes non-responsive, especially after it receives a message containing a large amount of content. This may be an indication of which types of attacks?
Answer : AB
A malicious active intermediary intercepts a message sent between two services. What concerns are raised by such an attack?
Answer : D
The Service Perimeter Guard pattern is applied to position a perimeter service outside of the firewall. The firewall only permits the perimeter service to access services within a specific service inventory. Which of the following statements describes a valid problem with this security architecture?
Answer : D
As an SOA security specialist you are being asked to educate an IT team about how to best design security policies for a given set of services. Which of the following recommendations are valid?
Answer : ACD
Have any questions or issues ? Please dont hesitate to contact us