Which two technologies can be used to meet the requirements? (Choose two)

An automobile manufacturer publishes a Web service for use by their suppliers. The manufacturer has stringent security requirements that require suppliers to verify their identity. Data integrity and confidentiality must be maintained between the client and the server. Which two technologies can be used to meet the requirements? (Choose two)

An automobile manufacturer publishes a Web service for use by their suppliers. The manufacturer has stringent security requirements that require suppliers to verify their identity. Data integrity and confidentiality must be maintained between the client and the server. Which two technologies can be used to meet the requirements? (Choose two)

A.
XACML and XKMS

B.
SSL with mutual authentication

C.
Message level security with WS-Security

D.
Private network and XML Signature



Leave a Reply 1

Your email address will not be published. Required fields are marked *


VijayVarma

VijayVarma

Answer: B,C
B.
SSL with mutual authentication

C.
Message level security with WS-Security