You need to enable inspection of the malformed data and prevent message tampering

You create a Windows Communication Foundation (WCF) service and deploy it with wsHttpBinding
and message security enabled. You create an intermediate WCF service for logging messages sent to

the primary service. The intermediate service is called via endpoint behaviour. The primary service is
receiving malformed data from a client application. You need to enable inspection of the malformed
data and prevent message tampering. What do you do?

You create a Windows Communication Foundation (WCF) service and deploy it with wsHttpBinding
and message security enabled. You create an intermediate WCF service for logging messages sent to

the primary service. The intermediate service is called via endpoint behaviour. The primary service is
receiving malformed data from a client application. You need to enable inspection of the malformed
data and prevent message tampering. What do you do?

A.
Specify a protection level of None in the contract for the intermediate service. Disable message
and transport security from the client application configuration file.

B.
Specify a protection level of Sign in the contract for the intermediate service. Disable transport
security from the client application configuration file.

C.
Modify the binding on the intermediate service to use netNamedPipeBinding

D.
Modify the binding on the intermediate service to use webHttpBinding

Explanation:
See 513 Lyudmyla ProtectionLevel Indicates the security services requested for an authenticated
stream. Sign Sign data to help ensure the integrity of transmitted data.
None Authentication only.
<webHttpBinding> (http://msdn.microsoft.com/en-us/library/bb412176.aspx)
<webHttpBinding> Defines a binding element that is used to configure endpoints for Windows
Communication Foundation (WCF) Web services that respond to HTTP requests instead of SOAP
messages.
<netNamedPipeBinding> (http://msdn.microsoft.com/en-us/library/ms731291.aspx)
<netNamedPipeBinding> Defines a binding that is secure, reliable, optimized for on-machine cross
process communication.



Leave a Reply 0

Your email address will not be published. Required fields are marked *