Arcitura Education S90.19 Exam
Advanced SOA Security (Page 2 )

Updated On: 7-Feb-2026

Which of the following types of attack always affect the availability of a service?

  1. Exception generation attack
  2. SQL injection attack
  3. XPath injection attack
  4. None of the above

Answer(s): D



The use of XML schemas for data validation helps avoid several types of data-centric threats.

  1. True
  2. False

Answer(s): A



The use of session keys and symmetric cryptography results in:

  1. Increased performance degradation
  2. Increased reliability degradation
  3. Reduced message sizes
  4. None of the above

Answer(s): D



An alternative to using a ___________ is to use a __________.

  1. Public key, private key
  2. Digital signature, symmetric key
  3. Public key, key agreement security session
  4. Digital signature, asymmetric key

Answer(s): C



Service A's logic has been implemented using managed code. An attacker sends an XML bomb to Service A . As a result, Service A's memory consumption started increasing at an alarming rate and then decreased back to normal. The service was not affected by this attack and quickly recovered.
Which of the following attacks were potentially avoided?

  1. XML parser attack
  2. Buffer overrun attack
  3. Insufficient authorization attack
  4. Denial of service

Answer(s): A,D






Post your Comments and Discuss Arcitura Education S90.19 exam prep with other Community members:

Join the S90.19 Discussion