New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education S90.18 Exam - Topic 5 Question 106 Discussion

Actual exam question for Arcitura Education's S90.18 exam
Question #: 106
Topic #: 5
[All S90.18 Questions]

Security specialists at an organization require that messages exchanged between two services are kept private. There is an added requirement to check if the messages were tampered with. The application of which of the following patterns fulfills these requirements?

Show Suggested Answer Hide Answer
Suggested Answer: A, B

Contribute your Thoughts:

0/2000 characters
Avery
3 months ago
B is the best choice, no doubt about it.
upvoted 0 times
...
Kattie
3 months ago
Surprised that D is even an option here!
upvoted 0 times
...
Jacquelyne
3 months ago
I think C is a bit off for this scenario.
upvoted 0 times
...
Dolores
4 months ago
A is also important for keeping messages private!
upvoted 0 times
...
Dick
4 months ago
Definitely B, you need to verify the source of the messages.
upvoted 0 times
...
Isabella
4 months ago
Brokered authentication sounds familiar, but I don't think it applies here since we need to ensure both privacy and tamper-proofing.
upvoted 0 times
...
Eric
4 months ago
I practiced a similar question where we had to choose between confidentiality and integrity, but I can't recall the exact details now.
upvoted 0 times
...
Alline
4 months ago
I think data origin authentication might be the right choice since it verifies the source and can help with integrity too.
upvoted 0 times
...
Fernanda
5 months ago
I remember studying about data confidentiality, but I'm not sure if it also covers tampering checks.
upvoted 0 times
...
Dona
5 months ago
This question is testing our understanding of security patterns. I'll carefully consider each option and eliminate the ones that don't fully address the requirements.
upvoted 0 times
...
Emerson
5 months ago
I've got a good feeling about this one. Data Confidentiality and Data Origin Authentication seem like the obvious choices to meet the stated requirements.
upvoted 0 times
...
Michael
5 months ago
I'm a bit confused on the difference between Direct Authentication and Brokered Authentication. I'll need to review those concepts before deciding.
upvoted 0 times
...
Latrice
5 months ago
Okay, let's see. We need to ensure message privacy and detect tampering. I'm thinking Data Confidentiality and Data Origin Authentication might be the way to go.
upvoted 0 times
...
Marica
5 months ago
Hmm, this looks like a tricky one. I'll need to think through the requirements carefully to determine the right pattern.
upvoted 0 times
...
Carin
1 year ago
I'm pretty sure the answer is B) Data Origin Authentication. Ain't no way I'm letting anyone mess with my messages!
upvoted 0 times
...
Rodolfo
1 year ago
Haha, these options are a real cryptic puzzle, aren't they? I'm gonna go with whatever the guy who writes the exams thinks is right.
upvoted 0 times
...
Miriam
1 year ago
Hmm, I'm not so sure. I'd go with D) Brokered Authentication. Gotta have that third-party verification, you know?
upvoted 0 times
Wilda
1 year ago
I agree with B) Data Origin Authentication. We need to make sure the messages haven't been tampered with.
upvoted 0 times
...
Elin
1 year ago
I think A) Data Confidentiality is the way to go. We need to keep those messages private.
upvoted 0 times
...
...
Annelle
1 year ago
I see your point, Myra. Data Origin Authentication does provide both privacy and integrity checks.
upvoted 0 times
...
Myra
1 year ago
I believe the answer is B) Data Origin Authentication, as it also checks if messages were tampered with.
upvoted 0 times
...
Latosha
1 year ago
I agree with Georgeanna, because data confidentiality ensures that messages are kept private.
upvoted 0 times
...
Huey
1 year ago
C'mon, it's obviously A) Data Confidentiality. Keeping the messages private is the key requirement here.
upvoted 0 times
...
Muriel
1 year ago
I think the answer is B) Data Origin Authentication. It ensures the message wasn't tampered with and the sender's identity is verified.
upvoted 0 times
Brittni
1 year ago
I believe B) Data Origin Authentication is the best option to fulfill both requirements of message privacy and integrity.
upvoted 0 times
...
Sarah
1 year ago
I think A) Data Confidentiality is also important for keeping the messages private.
upvoted 0 times
...
Nan
1 year ago
I agree, B) Data Origin Authentication is the correct choice for ensuring message integrity and sender verification.
upvoted 0 times
...
...
Georgeanna
1 year ago
I think the answer is A) Data Confidentiality.
upvoted 0 times
...

Save Cancel