Which of the following is not a hashing algorithm?
Question No 2
The application of the Data Origin Authentication pattern only provides message integrity.
Question No 3
Service A relies on a shared identity store. Service B has its own identity store. Service C also has its
own identity store, but must also access the shared identity store used by Service A . Which service
has the least reduction in autonomy as a result of its relationship with identity store mechanism(s)?
Question No 4
The requirement to defer security related state data at runtime relates directly to the application of
which service - orientation principle?
Question No 5
The use of XML - Encryption supports the application of the Service Abstraction principle because the
actual message remains hidden from the attacker.