New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education S90.20 Exam - Topic 1 Question 18 Discussion

Actual exam question for Arcitura Education's S90.20 exam
Question #: 18
Topic #: 1
[All S90.20 Questions]

Service Consumer A sends a request message to Service A (1) after which Service A retrieves financial data from Database A (2). Service A then sends a request message with the retrieved data to Service B (3). Service B exchanges messages with Service C (4) and Service D (5), which perform a series of calculations on the data and return the results to Service A .Service A uses these results to update Database A (7) and finally sends a response message to Service Consumer A (8). Component B has direct, independent access to Database A and is fully trusted by Database A .Both Component B and Database A reside within Organization A .Service Consumer A and Services A, B, C, and D are external to the organizational boundary of Organization A .

Component B is considered a mission critical program that requires guaranteed access to and fast response from Database A .Service A was recently the victim of a denial of service attack, which resulted in Database A becoming unavailable for extended periods of time (which further compromised Component B). Additionally, Services B, C, and D have repeatedly been victims of malicious intermediary attacks, which have further destabilized the performance of Service A .How can this architecture be improved to prevent these attacks?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Tammara
4 months ago
Isn't encrypting everything going to slow down performance?
upvoted 0 times
...
Dorothy
4 months ago
The utility service idea is smart for managing access!
upvoted 0 times
...
Iraida
4 months ago
Wait, can you really trust all those services with sensitive data?
upvoted 0 times
...
Barney
4 months ago
I disagree, replication might complicate things too much.
upvoted 0 times
...
Azzie
5 months ago
Sounds like a solid plan to improve security!
upvoted 0 times
...
Georgeanna
5 months ago
Hmm, this seems like a tricky one. I'll need to carefully consider the options and think through the potential consequences of each approach.
upvoted 0 times
...
Brice
5 months ago
I'm pretty confident about this one. I remember from the training that a deployer is required for search head clustering, and the search heads need to meet certain performance requirements.
upvoted 0 times
...
Lanie
5 months ago
Hmm, I'm a bit unsure about this. I know NFV stands for Network Function Virtualization, but I'm not totally clear on the specific attack vectors. I'll have to review my notes.
upvoted 0 times
...
Cristal
5 months ago
I remember a similar question from practice, and I think make-to-stock typically has shorter lead times, right?
upvoted 0 times
...
Salome
5 months ago
Hmm, I'm a bit confused on the difference between these two modes. I'll need to review my notes to refresh my memory.
upvoted 0 times
...

Save Cancel