The service-oriented modeling framework (SOMF) introduces five major life cycle modeling activities that drive a service evolution during design-time and run-time. Which of the following activities integrates SOA software assets and establishes SOA logical environment dependencies?
The service-oriented logical architecture modeling integrates SOA software assets and establishes SOA logical environment dependencies. It
also offers foster service reuse, loose coupling and consolidation.
Answer A is incorrect. The service-oriented discovery and analysis modeling discovers and analyzes services for granularity, reusability,
interoperability, loose-coupling, and identifies consolidation opportunities.
Answer B is incorrect. The service-oriented business integration modeling identifies service integration and alignment opportunities
with business domains' processes.
Answer D is incorrect. The service-oriented logical design modeling establishes service relationships and message exchange paths.
The Web resource collection is a security constraint element summarized in the Java Servlet Specification v2.4. Which of the following elements does it include?
Each correct answer represents a complete solution. Choose two.
Web resource collection is a set of URL patterns and HTTP operations that define all resources required to be protected. It is a security
constraint element summarized in the Java Servlet Specification v2.4. The Web resource collection includes the following elements:
URL patterns
HTTP methods
Answer B is incorrect. An authorization constraint includes role names.
Answer C is incorrect. A user data constraint includes transport guarantees.
Which of the following methods offers a number of modeling practices and disciplines that contribute to a successful service-oriented life cycle management and modeling?
The service-oriented modeling framework (SOMF) has been proposed by author Michael Bell as a service-oriented modeling language for
software development that employs disciplines and a holistic language to provide strategic solutions to enterprise problems.
The service-oriented modeling framework (SOMF) is a service-oriented development life cycle methodology. It offers a number of modeling
practices and disciplines that contribute to a successful service-oriented life cycle management and modeling. The service-oriented modeling
framework illustrates the major elements that identify the 'what to do' aspects of a service development scheme.
Answer B is incorrect. The service-oriented architecture (SOA) is a flexible set of design principles used during the phases of systems
development and integration.
Answer D is incorrect. The service-oriented modeling and architecture (SOMA) includes an analysis and design method that extends
traditional object-oriented and component-based analysis and design methods to include concerns relevant to and supporting SOA.
Answer C is incorrect. SABSA (Sherwood Applied Business Security Architecture) is a framework and methodology for Enterprise Security
Architecture and Service Management. It is a model and a methodology for developing risk-driven enterprise information security architectures
and for delivering security infrastructure solutions that support critical business initiatives.
Fill in the blank with an appropriate phrase The is a formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity.
The Biba model is a formal state transition system of computer security policy that describes a set of access control rules
designed to ensure data integrity. Data and subjects are grouped into ordered levels of integrity. The model is designed so that subjects may
not corrupt data in a level ranked higher than the subject, or be corrupted by data from a lower level than the subject.
You work as a security engineer for BlueWell Inc. Which of the following documents will you use as a guide for the security certification and accreditation of Federal Information Systems?
NIST has developed a suite of documents for conducting Certification & Accreditation (C&A). These documents are as follows:
NIST Special Publication 800-37: This document is a guide for the security certification and accreditation of Federal Information
Systems.
NIST Special Publication 800-53: This document provides a guideline for security controls for Federal Information Systems.
NIST Special Publication 800-53A. This document consists of techniques and procedures for verifying the effectiveness of security
controls in Federal Information System.
NIST Special Publication 800-59: This document is a guideline for identifying an information system as a National Security System.
NIST Special Publication 800-60: This document is a guide for mapping types of information and information systems to security
objectives and risk levels.
Wilda
10 days agoGladys
18 days agoShelba
26 days agoCammy
1 month agoIzetta
1 month agoDalene
2 months agoLouvenia
2 months agoLuisa
2 months agoEdna
2 months agoHannah
3 months agoFelicia
3 months agoCharlene
3 months agoTegan
3 months agoWillow
4 months agoValentine
4 months agoJunita
4 months agoKaycee
4 months agoDelila
5 months agoTegan
5 months agoLeanna
5 months agoTammi
5 months agoLeana
6 months agoMerlyn
6 months agoMoira
6 months agoLachelle
7 months agoRosenda
7 months agoMarilynn
7 months agoRutha
7 months agoArlette
10 months agoCamellia
12 months agoDortha
1 year agoRodrigo
1 year agoGarry
1 year agoRonny
1 year agoParis
1 year agoAja
1 year agoLazaro
1 year agoTawanna
1 year agoCarissa
1 year agoWynell
1 year agoMabelle
1 year agoAshley
1 year agoShenika
1 year agoNicolette
2 years agoTerina
2 years agoDustin
2 years agoMarylin
2 years agoDulce
2 years agoCarmela
2 years agoLeah
2 years agoErinn
2 years agoLarue
2 years agoRochell
2 years agoElli
2 years ago