Hmm, I'm a bit unsure here. The question mentions modeling requirements, so I'm wondering if process models might be a better fit to capture the flow of activities.
I've got a strategy - I'll start by eliminating the options that don't seem to fit the minimum requirement, then focus on the remaining choices to make the best selection.
I'm a little confused by the wording of the question. Is it asking about the consequences to the reliability of the information, or the security properties? I'll need to re-read it a few times to make sure I understand what they're looking for.
This looks like a straightforward question on securing the Citrix control layer. I'll focus on the key requirements - SSL for StoreFront to Delivery Controller XML traffic, and SSL for the Ticket Authority.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Arminda
5 months agoNan
5 months agoArminda
5 months agoPhyliss
5 months agoGerald
5 months agoMarylyn
6 months agoMalika
6 months agoDexter
6 months agoCyril
6 months agoIndia
6 months ago