Which two technologies can be used to meet the requirements?

An automobile manufacturer publishes a Web service for use by their suppliers. The manufacturer
has stringent security requirements that require suppliers to verify their identity. Data integrity and
confidentiality must be maintained between the client and the server. Which two technologies can
be used to meet the requirements? (Choose two)

An automobile manufacturer publishes a Web service for use by their suppliers. The manufacturer
has stringent security requirements that require suppliers to verify their identity. Data integrity and
confidentiality must be maintained between the client and the server. Which two technologies can
be used to meet the requirements? (Choose two)

A.
XACML and XKMS

B.
SSL with mutual authentication

C.
Message level security with WS-Security

D.
Private network and XML Signature

Explanation:



Leave a Reply 0

Your email address will not be published. Required fields are marked *