New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education S90.18 Exam - Topic 4 Question 35 Discussion

Actual exam question for Arcitura Education's S90.18 exam
Question #: 35
Topic #: 4
[All S90.18 Questions]

The Data Confidentiality pattern can be applied using which of the following security mechanisms?

Show Suggested Answer Hide Answer
Suggested Answer: A, B

Contribute your Thoughts:

0/2000 characters
Erinn
4 months ago
I thought hashing was for passwords, not confidentiality!
upvoted 0 times
...
Coletta
4 months ago
Wait, identity store? That doesn't sound right.
upvoted 0 times
...
Tracey
4 months ago
Hashing? Not really for confidentiality, more for integrity.
upvoted 0 times
...
Trinidad
4 months ago
Totally agree, symmetric encryption is a must!
upvoted 0 times
...
Gail
5 months ago
A and B are both valid options for data confidentiality.
upvoted 0 times
...
Tiffiny
5 months ago
Hmm, I'm a bit unsure about this one. A change schedule - is that related to emergency changes or normal changes? I'll have to think it through.
upvoted 0 times
...
Carey
5 months ago
Ah, I see what they're getting at. Even without the implementation details, we can still test the contract and ensure it's functioning as expected. I'm confident the answer is True.
upvoted 0 times
...
Crista
5 months ago
Hmm, I'm a bit unsure about this one. I know computer forensics involves some kind of process, but I can't quite remember all the specific steps. I'll have to think this through carefully.
upvoted 0 times
...
Andrew
5 months ago
I'm not sure about the Google Workspace audit logs part. Do I really need to enable that, or is it just for additional context? I want to make sure I'm only doing the minimum required to meet the stated requirements.
upvoted 0 times
...

Save Cancel