Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Ask a Question
Top 100+ questions in Web Services Security
Home
Questions
Web Services Security
0
votes
Q: SSL provides direct support for role-based authorization.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
ssl-services
0
votes
Q: Signing and encrypting messages are used to ensure:
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
signing
encyption
0
votes
Q: HTTP, FTP, SMTP are included in which layer of the Web service protocol stack?
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
http
ftp
smtp
0
votes
Q: Service description is handled by _____________________.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
service-description
web-securtiy
0
votes
Q: Which of the following facilitates the encoding of messages in a common XML format?
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
encoding-mechanism
xml-format
0
votes
Q: Access control for services, resources, devices are based on the _________ of the requester.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-services
web-resources
web-devices
0
votes
Q: Which among the following enhances WS-Security to facilitate a mechanism for issuing, renewing, and validating security tokens?
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
ws-security
0
votes
Q: WS-Security headers include mechanisms for:
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
ws-security
0
votes
Q: A part of UDDI that acts as an interface between Web service applications.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
uddi
web-service
0
votes
Q: IPSec is usually implemented at the operating system level.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
ipsec
operating-system
0
votes
Q: HTTP encompasses in-built support for Basic and Digest authentication
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
http-authentication
0
votes
Q: The major security issue to be considered for Web services:
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-service
security-service
0
votes
Q: Which of the following are authentication mechanisms for the application level?
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
authentication-mechanism
application-authentication
0
votes
Q: Strong authentication schemes along with message time stamp and sequence numbering can be used as a countermeasure against ________________.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
time-stamp
authentication
0
votes
Q: The three major roles in the Web service architecture.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-service-architecture
web-service-security
0
votes
Q: An XML based framework for describing, discovering and integrating Web services.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
xml-framework
web-service
0
votes
Q: How many predominant roles are defined in the Web service architecture
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-service-architecture
0
votes
Q: SOAP Digital Signatures exploits _____________________ to digitally sign SOAP messages.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
soap-digital-signature
0
votes
Q: Authentication and authorization information from the requester is usually represented in the form of ‘_______’.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
authentication
authorization
request-handler
0
votes
Q: The Web services protocol for creating and sharing security context:
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-service-protocol
0
votes
Q: HTTP is an _________ layer protocol.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
http-layer-protocol
web-security
0
votes
Q: Which of the following is not an OASIS standard for Web service security?
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
oasis-standard
web-service-security
0
votes
Q: Kerberos is a protocol used for ___________.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
kerberos-protocol
web-security-protocol
0
votes
Q: Which of the following operates in tunnel mode?
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
tunnel-mode
web-securty
0
votes
Q: Which of the following is a authentication mechanism for the application level?
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
authentication-mechanism
0
votes
Q: Which among the following is a software system designed to support interoperable machine-to-machine interaction over a network?
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
software-system
machine-interaction
0
votes
Q: To exchange information between computers, requests are encoded in ________ and sent via ___________.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-service-security
information-encoding
0
votes
Q: Which of the following is a standard format to describe a Web service?
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-service
0
votes
Q: Web services are language and platform independent.
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-service-security
0
votes
Q: SOAP stands for?
asked
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
soap
To see more, click for the
full list of questions
or
popular tags
.
...