New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education S90.20 Exam - Topic 1 Question 27 Discussion

Actual exam question for Arcitura Education's S90.20 exam
Question #: 27
Topic #: 1
[All S90.20 Questions]

Service Consumer A submits a request message with security credentials to Service A (1). The identity store that Service A needs to use in order to authenticate the security credentials can only be accessed via a legacy system that resides in a different service inventory. Therefore, to authenticate Service Consumer A, Service A must first forward the security credentials to the legacy system (2). The legacy system then returns the requested identity to Service A (3). Service A authenticates Service Consumer A against the identity received from the legacy system. If the authentication is successful, Service A retrieves the requested data from Database A (4), and returns the data in a response message sent back to Service Consumer A (5). Service A belongs to Service Inventory A which further belongs to Security Domain A and the legacy system belongs to Service Inventory B which further belongs to Security Domain B .(The legacy system is encapsulated by other services within Service Inventory B, which are not shown in the diagram.) These two security domains trust each other. Communication between Service A and the legacy system is kept confidential using transport-layer security. No intermediary service agents currently exist between the two service inventories. However, it has been announced that due to the introduction of new systems, some intermediary service agents may be implemented in the near future. Additionally, the legacy system has been scheduled for retirement and will be replaced by a new identity management system that will provide a new identity store. Because the new identity store will need to serve many different systems, there are concerns that it could become a performance bottleneck. As a result, services (including Service A and other services in Security Domains A and B) will not be allowed to directly access the new identity store. Which of the following statements describes a solution that can accommodate the requirements of the new identity store, the authentication requirements of Service A, and can further ensure that message exchanges between Security Domains A and B remain confidential after intermediary service agents are introduced?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

0/2000 characters
Blondell
4 months ago
Agreed, the Trusted Subsystem pattern seems efficient for this scenario.
upvoted 0 times
...
Chanel
4 months ago
Not sure if replicating the identity database is a good idea, could lead to sync issues.
upvoted 0 times
...
Martina
4 months ago
Surprised they’re retiring the legacy system so soon!
upvoted 0 times
...
Berry
4 months ago
I think message-layer security is the way to go, especially with intermediaries coming.
upvoted 0 times
...
Franchesca
4 months ago
A utility service sounds like a solid plan!
upvoted 0 times
...
Mica
5 months ago
The Brokered Authentication pattern sounds familiar, but I’m not clear on how SAML tokens fit into this situation. I feel like I need to review that concept again.
upvoted 0 times
...
Audry
5 months ago
I think replicating the identity database could work, but I'm concerned about the trust between the security domains. Would that really be secure enough?
upvoted 0 times
...
Adela
5 months ago
This question feels similar to one we practiced where we had to secure communication between different services. I think using message-layer security might be the right approach here.
upvoted 0 times
...
Salley
5 months ago
I remember studying the Trusted Subsystem pattern, but I'm not entirely sure how it applies to the new identity management system in this scenario.
upvoted 0 times
...
Tamar
5 months ago
Hmm, I'm a bit unsure here. I'm leaning towards option B, getting a new resource, since the current team member is really struggling with the work. But the question says there's no one else available, so that might not be feasible.
upvoted 0 times
...
Pearly
5 months ago
I'm a little confused by the wording of this question. What exactly do they mean by "series of operations required to make the item"? Is that the same as the manufacturing process? I'll need to re-read the question carefully to make sure I'm interpreting it correctly.
upvoted 0 times
...

Save Cancel