New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education S90.20 Exam - Topic 1 Question 11 Discussion

Actual exam question for Arcitura Education's S90.20 exam
Question #: 11
Topic #: 1
[All S90.20 Questions]

Service Consumer A sends a request to Service A (1). Service A replies with an acknowledgement message (2) and then processes the request and sends a request message to Service B (3). This message contains confidential financial data. Service B sends three different request messages together with its security credentials to Services C .D .and E (4, 5, 6). Upon successful authentication, Services C .D .and E store the data from the message in separate databases (7.8, 9). Services B .C .D, and E belong to Service Inventory A, which further belongs to Organization B .Service Consumer A and Service A belong to Organization A .Organization B decides to create a new service inventory (Service Inventory B) for services that handle confidential data. Access to these services is restricted by allocating Service Inventory B its own private network. Access to this private network is further restricted by a dedicated firewall. Services C, D and E are moved into Service Inventory B, and as a result. Service B can no longer directly access these services. How can this architecture be changed to allow Service B to access Services C, D and E in a manner that does not jeopardize the security of Service Inventory B while also having a minimal impact on the service composition's performance?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Fannie
4 months ago
I agree, keeping performance in mind is crucial for this setup!
upvoted 0 times
...
Tonja
4 months ago
The Message Screening pattern could add unnecessary delays, though.
upvoted 0 times
...
Benedict
4 months ago
Wait, can Service B really authenticate just once? That seems risky.
upvoted 0 times
...
Nelida
4 months ago
I think the Brokered Authentication pattern is the way to go.
upvoted 0 times
...
Jestine
5 months ago
Sounds like a solid plan with the Service Perimeter Guard!
upvoted 0 times
...
Odette
5 months ago
Okay, let me think this through. The question is asking about what the engagement work program tests, so I'll need to focus on that specific aspect of the guidance.
upvoted 0 times
...
Edward
5 months ago
This one seems pretty straightforward. I'm pretty confident the answer is C - obscuring the true email sender.
upvoted 0 times
...
Carla
5 months ago
Hmm, this one seems tricky. I'll need to think carefully about the different options and how they relate to filtering in Advanced Find.
upvoted 0 times
...
Luis
5 months ago
Hmm, I'm a bit confused by the active/standby mode and how that relates to the ACI leaves. I'll need to review my notes on that.
upvoted 0 times
...
Mireya
5 months ago
Okay, let's see here. The question is asking about hardware sizing, so I'd want to look at things like the transaction volume, user load, and any potential bottlenecks in the system. Transaction characterization and business process optimization seem like the most relevant factors to consider.
upvoted 0 times
...

Save Cancel