The Service Perimeter Guard pattern has been applied to help avoid denial of service attacks for a service inventory. As a result, services within the service inventory are only accessible via a perimeter service However, denial of service attacks continue to succeed and services within the service inventory become unavailable to external service consumers. What is the likely cause of this?
A. The Service Perimeter Guard pattern does not help avoid denial of service attacks.
B. The Trusted Subsystem pattern should have been applied so that each service has a dedicated trusted subsystem.
C. The perimeter service itself is the victim of denial of service attacks. As a result, none of the services inside the service inventory can be accessed by external service consumers.
D. The application of the Service Perimeter Guard pattern needs to be combined with the application of the Message Screening pattern in order to mitigate denial of service attacks.
正解:C
質問 2:
A certain service becomes a victim of an insufficient authorization attack. This service acts as a trusted subsystem for an entire service inventory. Which of the following are under threat as a result of this attack?
A. The core service logic
B. The underlying resources accessed by the service
C. All of the above.
D. Other services in the service inventory
正解:C
質問 3:
A malicious passive intermediary intercepts messages sent between two services. Which of the following is the primary security concern raised by this situation?
A. The confidentiality of the message can be affected.
B. The availability of the message can be affected.
C. The integrity of the message can be affected.
D. The reliability of the message can be affected.
正解:A
質問 4:
The application of the Trusted Subsystem pattern can help centralize access to services.
A. False
B. True
正解:B
質問 5:
A security architecture needs to be created in order to guarantee that messages that are sent to Service A must comply to a security policy that is published as part of Service A's service contract. The application of which of the following patterns will fulfill this requirement?
A. Exception Shielding
B. Message Screening
C. Brokered Authentication
D. None of the above
正解:D
平川** -
この問題集使って合格しました。
問題集を一周したら模擬試験にひたすら試験日まで取り組みました。本当に役に立ちました。
ありがとうございました。