Web Technologies
Android
Angular
BootStrap
ECMAScript
HTML
Image Processing
JavaScript
MVC
Onsen UI
React JS
SOAP UI
Vue.js
Cloud/DevOps Technologies
Amazon EC2
Ansible
Augmented Reality
AWS
Azure
Big Data
Cache Teachniques
Cassandra
Commercial Insurance
Cloud
CD
CI
Data Handling
Data using R
Data Science
DevOps
Gradle
Hadoop
HBase
HDFS
Hive
IOT
Jenkins
Machine Learning
MangoDB
NGINX
SOAP UI
Latest Technologies
5G Network
Agile
Android
Arduino
Augmented Reality
Commercial Insurance
C#
C++
Cyber Security
Data Handling
Data using R
Data Science
DBMS
Design-Pattern
Fortify
Ethical Hacking
Framework
GIT
GIT Slack
Image Processing
Java
Jenkins
Jira
JUnit
Kibana
Linux
MangoDB
Oracle
PHP
Python
QTP
R Language
Regression Analysis
Robotic
Salesforce
SAP
Selenium
Service Discovery
Service Now
Spark SQL
Testing
TOGAF
Research Method
Virtual Reality
Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions and answers in Web Services Security
Home
Questions
Web Services Security
0
votes
SSL provides direct support for role-based authorization.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
ssl-services
0
votes
Signing and encrypting messages are used to ensure:
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
signing
encyption
0
votes
HTTP, FTP, SMTP are included in which layer of the Web service protocol stack?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
http
ftp
smtp
0
votes
Service description is handled by _____________________.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
service-description
web-securtiy
0
votes
Which of the following facilitates the encoding of messages in a common XML format?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
encoding-mechanism
xml-format
0
votes
Access control for services, resources, devices are based on the _________ of the requester.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
web-services
web-resources
web-devices
0
votes
Which among the following enhances WS-Security to facilitate a mechanism for issuing, renewing, and validating security tokens?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
ws-security
0
votes
WS-Security headers include mechanisms for:
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
ws-security
0
votes
A part of UDDI that acts as an interface between Web service applications.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
uddi
web-service
0
votes
IPSec is usually implemented at the operating system level.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
ipsec
operating-system
0
votes
HTTP encompasses in-built support for Basic and Digest authentication
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
http-authentication
0
votes
The major security issue to be considered for Web services:
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
web-service
security-service
0
votes
Which of the following are authentication mechanisms for the application level?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
authentication-mechanism
application-authentication
0
votes
Strong authentication schemes along with message time stamp and sequence numbering can be used as a countermeasure against ________________.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
time-stamp
authentication
0
votes
The three major roles in the Web service architecture.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
web-service-architecture
web-service-security
0
votes
An XML based framework for describing, discovering and integrating Web services.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
xml-framework
web-service
0
votes
How many predominant roles are defined in the Web service architecture
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
web-service-architecture
0
votes
SOAP Digital Signatures exploits _____________________ to digitally sign SOAP messages.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
soap-digital-signature
0
votes
Authentication and authorization information from the requester is usually represented in the form of ‘_______’.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
authentication
authorization
request-handler
0
votes
The Web services protocol for creating and sharing security context:
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
web-service-protocol
0
votes
HTTP is an _________ layer protocol.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
http-layer-protocol
web-security
0
votes
Which of the following is not an OASIS standard for Web service security?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
oasis-standard
web-service-security
0
votes
Kerberos is a protocol used for ___________.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
kerberos-protocol
web-security-protocol
0
votes
Which of the following operates in tunnel mode?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
tunnel-mode
web-securty
0
votes
Which of the following is a authentication mechanism for the application level?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
authentication-mechanism
0
votes
Which among the following is a software system designed to support interoperable machine-to-machine interaction over a network?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
software-system
machine-interaction
0
votes
To exchange information between computers, requests are encoded in ________ and sent via ___________.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
web-service-security
information-encoding
0
votes
Which of the following is a standard format to describe a Web service?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
web-service
0
votes
Web services are language and platform independent.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
web-service-security
0
votes
SOAP stands for?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
(
23.1k
points)
soap
To see more, click for all the
questions in this category
.
...