Hmm, I'm a bit unsure here. The question mentions modeling requirements, so I'm wondering if process models might be a better fit to capture the flow of activities.
I've got a strategy - I'll start by eliminating the options that don't seem to fit the minimum requirement, then focus on the remaining choices to make the best selection.
I'm a little confused by the wording of the question. Is it asking about the consequences to the reliability of the information, or the security properties? I'll need to re-read it a few times to make sure I understand what they're looking for.
This looks like a straightforward question on securing the Citrix control layer. I'll focus on the key requirements - SSL for StoreFront to Delivery Controller XML traffic, and SSL for the Ticket Authority.
upvoted 0
times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Arminda
6 months agoNan
6 months agoArminda
7 months agoPhyliss
7 months agoGerald
7 months agoMarylyn
7 months agoMalika
7 months agoDexter
7 months agoCyril
7 months agoIndia
7 months ago