By applying the Data Origin Authentication pattern together with the Brokered
Authentication pattern, you guarantee confidential message exchanges by a service consumer that needs to repeatedly authenticate itself with a set of services within the same service composition.
Answer : B
When working with SAML, a Security Token Service (STS) and a Service Provider refer to the same service.
Answer : B
Service A requires certificates signed by a trusted certificate authority. The certificate authority publishes a Certificate Revocation List (CRL) on a frequent basis. As a result, some of the service consumers that were previously authorized to access Service A will not be able to after new CRLs are issued. How can this security requirement be enforced?
Answer : B
The Data Confidentiality pattern is applied to all of the services in a service inventory. As a result, all message data must be encrypted.
Answer : B