New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education S90.09 Exam - Topic 6 Question 23 Discussion

Actual exam question for Arcitura Education's S90.09 exam
Question #: 23
Topic #: 6
[All S90.09 Questions]

Service Consumer A sends a message to Service A . Before the message arrives with Service A, it is intercepted by Service Agent A (1). which checks the message for compliance to Policy A that is required by Service A . If the message fails compliance, Service Agent A will not allow it to proceed and will instead write the message contents to a log. If the message does comply to the policy, it continues to be transmitted toward Service A, but before it arrives it is intercepted by Service Agent B (2), which validates the security credentials in the message header. If the security credential validation fails, the message is rejected and a runtime exception is raised. If the security credentials are validated, the message is sent to Service A . Upon receiving the message, Service A retrieves a data value from a database and populates the message header with this data value (3) prior to forwarding the message to Service B . Before the message arrives at Service B . it is intercepted by Service Agent C (4) which checks the message for compliance with two policies: Policy B and Policy C . Policy B is identical to Policy A that was checked by Service Agent A . To check for compliance to Policy C . Service Agent C uses the data value added by Service A . If the message complies with both of the policies, it is forwarded to Service B (5), which stores the message contents in its own database.

You are told that Policy B and Policy C have changed. Also, in order to carry out the compliance check of Policy C, Service Agent C will now require a new data value from the Service B database. How can this service composition architecture be changed to fulfill these new requirements?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Catalina
4 months ago
Is it really safe to embed policy enforcement in Service B? Feels risky!
upvoted 0 times
...
Gearldine
4 months ago
I disagree, option C complicates things too much.
upvoted 0 times
...
Twana
4 months ago
Wait, how does Service Consumer A get the value from Service B? Seems tricky.
upvoted 0 times
...
Rory
4 months ago
I think option B makes the most sense.
upvoted 0 times
...
Deja
5 months ago
Sounds like a solid plan with the Policy Centralization pattern!
upvoted 0 times
...
Ailene
5 months ago
Hmm, this looks like a tricky one. I'll need to think through the key requirements - high-performance, custom OS, and additional capacity needs. Gotta weigh the options carefully.
upvoted 0 times
...
Jesse
5 months ago
I think this might relate to insufficient authorization because the attacker bypassed the authentication.
upvoted 0 times
...
Joaquin
5 months ago
Wireshark is my go-to tool for network troubleshooting, but I don't think that's the best option here. I'm leaning towards the Cisco spectrum expert to pinpoint the interference source.
upvoted 0 times
...
Gracia
5 months ago
Hmm, this is a tricky one. I want to make sure I don't overlook anything important. I'll carefully review the question and the options to ensure I select the two actions that are most critical to meet the company's priorities before enabling access to the DR data center.
upvoted 0 times
...

Save Cancel