New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education S90.20 Exam - Topic 1 Question 15 Discussion

Actual exam question for Arcitura Education's S90.20 exam
Question #: 15
Topic #: 1
[All S90.20 Questions]

Service A provides a customized report generating capability. Due to infrastructure limitations, the number of service consumers permitted to access Service A concurrently is strictly controlled. Service A validates request messages based on the supplied credentials (1). If the authentication of the request message is successful, Service A sends a message to Service B (2) to retrieve the required data from Database A (3). Service A stores the response from Service B (4) in memory and then issues a request message to Service C (5). Service C retrieves a different set of data from Database A (6) and sends the result back to Service A (7). Service A consolidates the data received from Services B and C and sends the generated report in the response message to its service consumer (8).

This service composition was recently shut down after it was discovered that Database A had been successfully attacked twice in a row. The first type of attack consisted of a series of coordinated request messages sent by the same malicious service consumer, with the intention of triggering a range of exception conditions within the database in order to generate various error messages. The second type of attack consisted of a service consumer sending request messages with malicious input with the intention of gaining control over the database server. This attack resulted in the deletion of database records and tables. An investigation revealed that both attacks were carried out by malicious service consumers that were authorized. How can the service composition security architecture be improved to prevent these types of attacks?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Hubert
4 months ago
The Exception Shielding pattern seems like a must-have!
upvoted 0 times
...
Meghan
4 months ago
I disagree, we need more than just perimeter guards.
upvoted 0 times
...
Armando
4 months ago
Wait, how can authorized users be malicious? That's surprising!
upvoted 0 times
...
Lavelle
4 months ago
I think option B is the best choice here.
upvoted 0 times
...
Malcom
5 months ago
Sounds like a solid plan to improve security!
upvoted 0 times
...
Samira
5 months ago
Okay, I think I've got this. The question is asking about reprofile endpoints based on INIT-REBOOT and SELECTING message types, so the DHCP probe is the way to go.
upvoted 0 times
...
Fairy
5 months ago
The key here is to focus on the wording of the question. It's asking about the PROC SORT option, so I'm going to review the PROC SORT syntax and look for the option that creates an output data set.
upvoted 0 times
...
Noel
5 months ago
Wasn't it the case that the green policy focuses on low delay? I think option A had the lowest delay last time we practiced, but I might be mixing up the paths.
upvoted 0 times
...

Save Cancel