0% found this document useful (0 votes)
632 views

Web Services Security 1

This document discusses security aspects of web services. It covers common web service standards like SOAP, WSDL, UDDI and how they are used. It also discusses security mechanisms like encryption, digital signatures, authentication and authorization that help secure web service messages and operations. Various standards for implementing security in web services are covered, including WS-Security, WS-SecureConversation and WS-Trust. Common security threats to web services like message interception are also mentioned.

Uploaded by

Ankur Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
632 views

Web Services Security 1

This document discusses security aspects of web services. It covers common web service standards like SOAP, WSDL, UDDI and how they are used. It also discusses security mechanisms like encryption, digital signatures, authentication and authorization that help secure web service messages and operations. Various standards for implementing security in web services are covered, including WS-Security, WS-SecureConversation and WS-Trust. Common security threats to web services like message interception are also mentioned.

Uploaded by

Ankur Singh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

WEB SERVICES SECURITY

 The standard format for describing a Web service: WEB SERVICE DESCRIPTION
LANGUAGE
 SOAP Stands for -_______________________ SIMPLE OBJECT ACCESS PROTOCOL
 Other services may interact with a Web services using __________________ SOAP
MESSAGES
 Which among the following is a software system designed to support interoperable machine-
to-machine interaction over a network? WEB SERVICES
 For exchanging information between computers, the requests are encoded in ____________
and send via --------------------------- XML, HTTP POST
5/5

 Which of the following is a authentication mechanism for the application level? SAML
 HTTP is a _________ layer protocol. APPLICATION
 Base64 is a ____________ ENCRYPTION ALGORITHM
 Which of the following operates in the tunnel model? IPSEC
 Which among the following is NOT an OASIS standard for Web service security? SMIL
4/5

 Which of the following are authentication mechanisms for the application level? ALL OF
THESE
 WS-Security headers include mechanisms for: ALL THE OPTIONS
 The three major roles in the Web service architecture. SOAP, WSDL, UDDI
 ____________ is used to sign the digest with the private key. ENCRYPTION ALGORITHM
 The major security issue to be considered for Web services: ALL THE OPTIONS
 The Web services protocol for creating and sharing security context: WS-SECURE
CONVERSATION
 HTTP, FTP, SMTP are included in which layer of the Web service protocol stack? XML
MESSAGING
 Which of the following are threats posed by message interception? ALL THE OPTIONS
 HTTP encompasses in-built support for Basic and Digest authentication TRUE
 Access control for services, resources, devices are based on the _________ of the requester.
ALL THE OPTIONS
 Web services are tightly coupled FALSE
 Signing and encrypting messages are used to ensure: CONFIDENTIALITY
 Service description is handled by _____________________ WSDL
 Which among the following enhances WS-Security to facilitate a mechanism for issuing,
renewing, and validating security tokens? WS-TRUST
 TLS
 How many predominant roles are defined in the Web service architecture THREE
 A ________ is used to create a message digest HASH ALGORITHM
 Which of the following facilitates the encoding of messages in a common XML format? XML
MESSAGING
 IPSec is usually implemented at the operating system level. TRUE
 A part of UDDI that acts as an interface between Web service applications. WSDL
 Authentication and authorization information from the requester is usually represented in the
form of ‘_______’ TOKENS
 An XML based framework for describing, discovering and integrating Web services.
UNIVERSAL DESCRIPTION, DISCOVERY AND INTEGRATION
17/20

This study source was downloaded by 100000797727937 from CourseHero.com on 04-01-2023 06:46:22 GMT -05:00

https://www.coursehero.com/file/48606651/WEB-SERVICES-SECURITY-1docx/
Powered by TCPDF (www.tcpdf.org)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy