MultipleChoice
To provide message confidentiality and message integrity, which of the following patterns need to be applied?
OptionsMultipleChoice
Service A relies on a shared identity store. Service B has its own identity store. Service C also has its own identity store, but must also access the shared identity store used by Service A . Which service has the least reduction in autonomy as a result of its relationship with identity store mechanism(s)?
OptionsMultipleChoice
Service A hashes a message, resulting in message digest X. Service A encrypts message digest X with its private key, resulting in cipher text X1. Service A sends the message and X1 to Service B. Service B hashes the message, resulting in message digest Y. Service B decrypts X1 with Service A's public key, recovering message digest X1. Service B compares X and Y and finds them not to be equal. This proves that;
OptionsMultipleChoice
Which of the following security mechanisms can provide centralized security measures for all services within a service inventory?
Options