Login
Remember
Register
Ask a Question
Recent questions and answers in Web Services Security
0
votes
1
answer
SSL provides direct support for role-based authorization.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
ssl-services
0
votes
1
answer
Signing and encrypting messages are used to ensure:
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
signing
encyption
0
votes
1
answer
HTTP, FTP, SMTP are included in which layer of the Web service protocol stack?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
http
ftp
smtp
0
votes
1
answer
Service description is handled by _____________________.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
service-description
web-securtiy
0
votes
1
answer
Which of the following facilitates the encoding of messages in a common XML format?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
encoding-mechanism
xml-format
0
votes
1
answer
Access control for services, resources, devices are based on the _________ of the requester.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-services
web-resources
web-devices
0
votes
1
answer
Which among the following enhances WS-Security to facilitate a mechanism for issuing, renewing, and validating security tokens?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
ws-security
0
votes
1
answer
WS-Security headers include mechanisms for:
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
ws-security
0
votes
1
answer
A part of UDDI that acts as an interface between Web service applications.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
uddi
web-service
0
votes
1
answer
IPSec is usually implemented at the operating system level.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
ipsec
operating-system
0
votes
1
answer
HTTP encompasses in-built support for Basic and Digest authentication
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
http-authentication
0
votes
1
answer
The major security issue to be considered for Web services:
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-service
security-service
0
votes
1
answer
Which of the following are authentication mechanisms for the application level?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
authentication-mechanism
application-authentication
0
votes
1
answer
Strong authentication schemes along with message time stamp and sequence numbering can be used as a countermeasure against ________________.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
time-stamp
authentication
0
votes
1
answer
The three major roles in the Web service architecture.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-service-architecture
web-service-security
0
votes
1
answer
An XML based framework for describing, discovering and integrating Web services.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
xml-framework
web-service
0
votes
1
answer
How many predominant roles are defined in the Web service architecture
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-service-architecture
0
votes
1
answer
SOAP Digital Signatures exploits _____________________ to digitally sign SOAP messages.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
soap-digital-signature
0
votes
1
answer
Authentication and authorization information from the requester is usually represented in the form of ‘_______’.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
authentication
authorization
request-handler
0
votes
1
answer
The Web services protocol for creating and sharing security context:
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-service-protocol
0
votes
1
answer
HTTP is an _________ layer protocol.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
http-layer-protocol
web-security
0
votes
1
answer
Which of the following is not an OASIS standard for Web service security?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
oasis-standard
web-service-security
0
votes
1
answer
Kerberos is a protocol used for ___________.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
kerberos-protocol
web-security-protocol
0
votes
1
answer
Which of the following operates in tunnel mode?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
tunnel-mode
web-securty
0
votes
1
answer
Which of the following is a authentication mechanism for the application level?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
authentication-mechanism
0
votes
1
answer
Which among the following is a software system designed to support interoperable machine-to-machine interaction over a network?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
software-system
machine-interaction
0
votes
1
answer
To exchange information between computers, requests are encoded in ________ and sent via ___________.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-service-security
information-encoding
0
votes
1
answer
Which of the following is a standard format to describe a Web service?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-service
0
votes
1
answer
Web services are language and platform independent.
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
web-service-security
0
votes
1
answer
SOAP stands for?
answered
Mar 7, 2022
in
Web Services Security
by
rajeshsharma
soap
To see more, click for all the
questions in this category
.
Recent questions and answers in Web Services Security
...