Arcitura Education S90.18 Exam Questions
Fundamental SOA Security (Page 3 )

Updated On: 16-Feb-2026

Service A sends a message to Service B which reads the values in the message header to determine whether to forward the message to Service C or Service D. Because of recent attacks on Services C and D, it has been decided to protect the body content of messages using some form of encryption. However, certain restrictions within the design of Service B will not permit it to be changed to support the encryption and decryption of messages. Only Services A, C and D can support message encryption and decryption.
Which of the following approaches fulfill these security requirements without changing the role of Service B?

  1. Transport-layer security is implemented between all services.
  2. Message-layer security is implemented between all services.
  3. Service B is removed. Instead, the routing logic is added to Service A.
  4. None of the above

Answer(s): B



The application of the Brokered Authentication pattern is best suited for a scenario whereby a service consumer does not need to re-authenticate itself with multiple services.

  1. True
  2. False

Answer(s): B



The SAML and WS-Security industry standards can be applied to the same service composition architecture.

  1. True
  2. False

Answer(s): A



As a requirement for accessing Service B, Service A needs to encrypt its request message. Service B decrypts the message, makes some changes, encrypts the message, and then forwards it to Service

  1. However, the message does not make it to Service C. Instead, a runtime error is raised by a service agent that does not support encryption. This service agent only requires access to the message header in order to route the message to the appropriate instance of Service C. It is therefore decided that the header part of the message will not be encrypted.
    Which of the following can be used to address this requirement?
  2. certificate authority
  3. SAML
  4. non-repudiation
  5. None of the above

Answer(s): D



Digital signatures use encryption and hashing.

  1. True
  2. False

Answer(s): A






Post your Comments and Discuss Arcitura Education S90.18 exam dumps with other Community members:

Join the S90.18 Discussion