Which of the following activities integrates SOA software assets and establishes SOA logical environment depen
The service-oriented modeling framework (SOMF) introduces five major life cycle modeling activities
that drive a service evolution during design-time and run-time. Which of the following activities
integrates SOA software assets and establishes SOA logical environment dependencies?
What is the simplest way to accomplish this?
You are responsible for security at a building that has a lot of traffic. There are even a significant
number of non-employees coming in and out of the building. You are concerned about being able to
find out who is in the building at a particular time. What is the simplest way to accomplish this?
Which of the following security architectures defines how to integrate widely disparate applications for a wor
Which of the following security architectures defines how to integrate widely disparate applications
for a world that is Web-based and uses
multiple implementation platforms?
Which of the following methods of encryption uses a single key to encrypt and decrypt data?
Which of the following methods of encryption uses a single key to encrypt and decrypt data?
which layer of OSI model is the File and Print service performed?
The OSI reference model is divided into layers and each layer has a specific task to perform. At which
layer of OSI model is the File and Print service performed?
Which of the following cables provides maximum security against electronic eavesdropping on a network?
Which of the following cables provides maximum security against electronic eavesdropping on a
network?
Which of the following authentication methods provides credentials that are only valid during a single session
Which of the following authentication methods provides credentials that are only valid during a
single session?
Which of the following password authentication schemes enables a user with a domain account…?
Which of the following password authentication schemes enables a user with a domain account to
log on to a network once, using a
password or smart card, and to gain access to multiple computers in the domain without being
prompted to log in again?
Which of the following authentication protocols should be used to accomplish this?
Perfect World Inc., provides its sales managers access to the company’s network from remote
locations. The sales managers use laptops to
connect to the network. For security purposes, the company’s management wants the sales
managers to log on to the network using smart
cards over a remote connection. Which of the following authentication protocols should be used to
accomplish this?
What feature of a router would accomplish this?
Your customer is concerned about security. He wants to make certain no one in the outside world
can see the IP addresses inside his network. What feature of a router would accomplish this?