New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education S90.20 Exam - Topic 1 Question 16 Discussion

Actual exam question for Arcitura Education's S90.20 exam
Question #: 16
Topic #: 1
[All S90.20 Questions]

Service Consumer A sends a request message to Service A (1), after which Service A sends a request message with security credentials to Service B (2). Service B authenticates the request and, if the authentication is successful, writes data from the request message into Database B (3). Service B then sends a request message to Service C (4), which is not required to issue a response message. Service B then sends a response message back to Service A (5). After processing Service B's response, Service A sends another request message with security credentials to Service B (6). After successfully authenticating this second request message from Service A, Service B sends a request message to Service D (7). Service D is also not required to issue a response message. Finally, Service B sends a response message to Service A (8), after which Service A records the response message contents in Database A (9) before sending its own response message to Service Consumer A (10).

Services A and B use digital certificates to support message integrity and authentication. With every message exchange between the two services (2, 5, 6, 8), the digital certificates are used. It has been determined that both Databases A and B are vulnerable to malicious attackers that may try to directly access sensitive data records. Furthermore, performance logs have revealed that the current exchange of digital certificates between Services A and B is unacceptably slow. How can the integrity and authenticity of messages exchanged between Services A and B be maintained, but with improved runtime performance - and - how can Databases A and B be protected with minimal additional impact on performance?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Fredric
4 months ago
Not sure if encrypting with passwords is the best idea for security.
upvoted 0 times
...
Tijuana
4 months ago
Totally agree, SCTs would speed things up a lot!
upvoted 0 times
...
Krissy
4 months ago
Surprised they didn't mention using OAuth for better performance!
upvoted 0 times
...
Ciara
4 months ago
I think using SAML tokens is a bit outdated, though.
upvoted 0 times
...
Brendan
5 months ago
Sounds like a solid plan with the Brokered Authentication pattern!
upvoted 0 times
...
Suzi
5 months ago
Okay, I think I've got a handle on this. The key is to identify which statement is NOT true about the consequences of detailed test condition specification. I'll weigh the pros and cons of each option.
upvoted 0 times
...
Pamella
5 months ago
I'm a little confused by the difference between the shcluster-bundle and the cluster-bundle commands. Can someone help me understand the distinction there?
upvoted 0 times
...

Save Cancel