New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education S90.20 Exam - Topic 1 Question 24 Discussion

Actual exam question for Arcitura Education's S90.20 exam
Question #: 24
Topic #: 1
[All S90.20 Questions]

Services A, B and C belong to Service Inventory A .Services D, E and F belong to Service Inventory B .Service C acts as an authentication broker for Service Inventory A .Service F acts as an authentication broker for Service Inventory B .Both of the authentication brokers use Kerberos-based authentication technologies. Upon receiving a request message from a service consumer, Services C and F authenticate the request using a local identity store and then use a separate Ticket Granting Service (not shown) to issue the Kerberos ticket to the service consumer. A recent security audit of the two service inventories revealed that both authentication brokers have been victims of attacks. In Service Inventory A, the attacker has been intercepting and modifying the credential information sent by Service C (the ticket requester) to the Ticket Granting Service. As a result, the requests have been invalidated and incorrectly rejected by the Ticket Granting Service. In Service Inventory B, the attacker has been obtaining service consumer credentials and has used them to request and receive valid tickets from the Ticket Granting Service. The attacker has then used these tickets to enable malicious service consumers to gain access to other services within the service inventory. How can the two service inventory security architectures be improved in order to counter these attacks?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Lynelle
4 months ago
I think the Service Perimeter Guard is crucial for A.
upvoted 0 times
...
Page
4 months ago
The Data Origin Authentication pattern is a solid choice for B.
upvoted 0 times
...
Lilli
4 months ago
Wait, can WS-Trust really secure both inventories?
upvoted 0 times
...
Shala
4 months ago
Totally agree, they need better perimeter defenses!
upvoted 0 times
...
Phillip
5 months ago
Service C and F both use Kerberos for authentication.
upvoted 0 times
...
Ona
5 months ago
Definitely option B for me. Frequent check-ins and accountability are key to getting a project back on schedule. The other choices don't seem as directly relevant to the problem at hand.
upvoted 0 times
...
Julene
5 months ago
This question seems straightforward, I think I can figure it out.
upvoted 0 times
...
Rusty
5 months ago
I'm pretty confident about this one. The key is that CRM is about using marketing resources to retain existing customers, not just attract new ones. Statements A and D seem most relevant.
upvoted 0 times
...
Arlette
5 months ago
Hmm, I'm a bit unsure about this one. I'll need to think it through carefully to make sure I don't miss anything.
upvoted 0 times
...
Willow
5 months ago
This is a tricky one. I'll need to make sure I fully understand how to set up the Azure Web App with Azure AD and how to integrate the permission levels. I'll take some notes and think through the steps.
upvoted 0 times
...
Sabra
5 months ago
Hmm, this seems like a tricky one. I'll need to think carefully about the corrosion resistance properties of each material option.
upvoted 0 times
...

Save Cancel