New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education S90.20 Exam - Topic 1 Question 1 Discussion

Actual exam question for Arcitura Education's S90.20 exam
Question #: 1
Topic #: 1
[All S90.20 Questions]

Service A is a publically accessible service that provides free multimedia retrieval capabilities to a range of service consumers. To carry out this functionality, Service A is first invoked by Service Consumer A (1). Based on the nature of the request message received from Service Consumer A, Service A either invokes Service B or Service C .When Service B is invoked by Service A (2A) it retrieves data from publicly available sources (not shown) and responds with the requested data (3A). When Service C is invoked by Service A (2B) it retrieves data from proprietary sources within the IT enterprise (not shown) and responds with the requested data (3B). After receiving a response from Service B or Service C, Service A sends the retrieved data to Service Consumer A (4). Service B does not require service consumers to be authenticated, but Service C does require authentication of service consumers. The service contract for Service A therefore uses WS-Policy alternative policies in order to express the two different authentication requirements to Service Consumer A .When Service Consumer A sends a request message (1), Service A determines whether the request requires the involvement of Service C and then checks to ensure that the necessary security credentials were received as part of the message. If the credentials provided by Service Consumer A are verified. Service A creates a signed SAML assertion and sends it with the request message to Service C (2B) This authentication information is protected by public key encryption However, responses to Service Consumer A's request message (3B, 4) are not encrypted for performance reasons. The owner of Service C is planning two changes to the service architecture:

1. A fee will be charged to Service Consumer A (or any service consumer) using Service C .2. The response messages issued by Service C need to be secured in order to prevent unauthorized access. An analysis of Service C's usage statistics reveals that a group of service consumers specifically request the retrieval of multimedia data on a frequent basis. To promote the usage of Service C to these types of service consumers, the owner of Service C plans to offer a special discount by allowing unlimited multimedia retrievals for a fixed monthly price. Service consumers that do not subscribe to this promotion will need to pay for each request individually. It is anticipated that the new promotion will significantly increase the usage of Service C .The owner of Service C therefore wants to ensure that the security added to the response messages has a minimal impact on Service C's runtime performance. What steps can be taken to fulfill these requirements?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Darell
4 months ago
Not sure if a new key pair is the best move for performance.
upvoted 0 times
...
Teddy
4 months ago
Totally agree, symmetric session keys sound like a solid plan!
upvoted 0 times
...
Tegan
4 months ago
Wait, how will they manage the performance with all that encryption?
upvoted 0 times
...
Elenor
4 months ago
Charging fees for Service C? That's a bummer!
upvoted 0 times
...
Tenesha
5 months ago
Service C needs to secure response messages now.
upvoted 0 times
...
Adelina
5 months ago
I think the key here is to configure the item record to allow for over-receipts. Option C looks like the right approach.
upvoted 0 times
...
Tamekia
5 months ago
This looks like a standard IIA Standards question about internal audit assessments. I'm pretty confident D is not correct because follow-up is typically considered mandatory.
upvoted 0 times
...
Letha
5 months ago
I practiced a similar question where we discussed applications and drivers, but I'm a bit confused how that applies here. I think it could be option D.
upvoted 0 times
...
Meaghan
5 months ago
I remember we discussed hard forks in class, and I think the nodes not updating would mean they're on a different blockchain altogether.
upvoted 0 times
...
Gilma
5 months ago
Ah, I see. Frameworks can be harder to master than just using HTML5, which could be a challenge for a large, complex web site. Good to keep that in mind.
upvoted 0 times
...

Save Cancel