New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education S90.18 Exam - Topic 1 Question 87 Discussion

Actual exam question for Arcitura Education's S90.18 exam
Question #: 87
Topic #: 1
[All S90.18 Questions]

Service A is owned by Organization A . Service A sends a message containing confidential data to Service B, which is owned by Organization B . Service B sends the message to Service C, which is also owned by Organization B . Organization A trusts Organization B, which means there is no requirement to protect messages from intermediaries and after a message is received by Service B (and as long as the message remains within the boundary of Organization B), there is no requirement to keep the message data confidential. Which of the following approaches will fulfill these security requirements with the least amount of performance degradation?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Sina
3 months ago
SAML tokens are cool, but might add overhead.
upvoted 0 times
...
Samuel
3 months ago
Transport-layer security is a solid approach!
upvoted 0 times
...
Virgina
3 months ago
Wait, why would they trust Organization B so easily?
upvoted 0 times
...
Skye
4 months ago
I disagree, XML-Encryption could be more secure.
upvoted 0 times
...
Aretha
4 months ago
Option B seems like the best choice for performance.
upvoted 0 times
...
Iluminada
4 months ago
Introducing an authentication broker sounds like it could complicate things, but I can't recall if it would actually help with performance.
upvoted 0 times
...
Yuki
4 months ago
SAML tokens seem more about authentication than confidentiality, so I'm not sure if that would meet the requirements here.
upvoted 0 times
...
Yolando
4 months ago
I think using transport-layer security for the communication channel is a common practice and might be the best option for performance.
upvoted 0 times
...
Kaitlyn
5 months ago
I remember that encrypting messages with XML-Encryption might add some overhead, but it could be necessary for confidentiality.
upvoted 0 times
...
Lashandra
5 months ago
This is a tricky one. I'm not sure if the SAML tokens or authentication broker are really necessary given the trust relationship. I'll need to carefully weigh the pros and cons of each approach.
upvoted 0 times
...
Elin
5 months ago
I'm leaning towards option A since it provides message-level encryption, which seems more secure than just encrypting the transport channel. But I'll need to double-check the performance implications.
upvoted 0 times
...
Aja
5 months ago
Okay, I think I've got it. The key is that there's no need to protect the message once it's within Organization B, so I'd go with option B to minimize performance impact.
upvoted 0 times
...
Desire
5 months ago
Hmm, I'm a bit confused by the trust relationship between the organizations. I'll need to make sure I understand that part before deciding on the best solution.
upvoted 0 times
...
Denae
5 months ago
This seems like a straightforward security question. I'll need to carefully read through the requirements and think about the most efficient approach.
upvoted 0 times
...
Goldie
5 months ago
Okay, I think I've got it. Since the latitude of origin is becoming less negative, the map will shift upwards, so the data will move north.
upvoted 0 times
...
Jolene
5 months ago
I practiced a similar question on using "Families" for design elements; could it be that?
upvoted 0 times
...
Dolores
5 months ago
Hmm, I'm a bit unsure about the specifics of how to mark traffic in a GRE tunnel. I'll need to review my notes on QoS and header fields.
upvoted 0 times
...
Ria
10 months ago
Option B all the way! Unless you're working for the NSA, there's no need to turn this into a James Bond movie. Transport-layer encryption is the way to go, folks.
upvoted 0 times
...
Gwen
10 months ago
Option B is the clear winner here. Why make things more complex than they need to be? Keep it simple and secure with transport-layer encryption.
upvoted 0 times
Antonette
8 months ago
C) SAML security tokens are used so that Service B can authenticate Service A.
upvoted 0 times
...
Ryan
9 months ago
B) The communication channel between Service A and Service B is encrypted using a transport-layer security technology.
upvoted 0 times
...
Verda
9 months ago
A) Messages exchanged between Service A and Service B are encrypted using XML-Encryption.
upvoted 0 times
...
...
Annalee
10 months ago
Hmm, I'm not sure. Option C with SAML tokens might be a bit overkill, but it could provide more robust authentication. Tough call, but I'd probably still go with Option B.
upvoted 0 times
Tammy
8 months ago
I think I'll stick with Option B for now.
upvoted 0 times
...
Stephania
8 months ago
True, but it might be overkill for this scenario.
upvoted 0 times
...
Jolene
9 months ago
But Option C with SAML tokens could provide more robust authentication.
upvoted 0 times
...
Mignon
10 months ago
Option B sounds good. It encrypts the communication channel between Service A and Service B.
upvoted 0 times
...
...
Rory
10 months ago
I agree with Gregoria. Option B is the way to go. No need to over-complicate things when a simple transport-layer encryption can do the job.
upvoted 0 times
Lisha
10 months ago
I agree, using transport-layer security is the most efficient way to fulfill the security requirements.
upvoted 0 times
...
Sherrell
10 months ago
I think option B is the best choice. It's simple and effective.
upvoted 0 times
...
...
Nan
11 months ago
But wouldn't encrypting the communication channel be more efficient?
upvoted 0 times
...
Reena
11 months ago
I disagree, I believe option C is more secure.
upvoted 0 times
...
Gregoria
11 months ago
Option B seems like the best choice here. Encrypting the communication channel at the transport layer is a lightweight and efficient way to meet the security requirements without the overhead of XML encryption or SAML tokens.
upvoted 0 times
Yolando
10 months ago
An authentication broker could add an extra layer of security between the services.
upvoted 0 times
...
Howard
10 months ago
I prefer option A, encrypting the messages between Service A and Service B.
upvoted 0 times
...
Janella
10 months ago
I think using SAML security tokens could also work well for authentication.
upvoted 0 times
...
Nadine
10 months ago
I agree, option B is a good choice for this scenario.
upvoted 0 times
...
...
Nan
11 months ago
I think option B is the best choice.
upvoted 0 times
...

Save Cancel