New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education S90.20 Exam - Topic 1 Question 28 Discussion

Actual exam question for Arcitura Education's S90.20 exam
Question #: 28
Topic #: 1
[All S90.20 Questions]

Service A provides a data access capability that can be used by a variety of service consumers. The database records accessed by Service A are classified as either private or public. There are two types of service consumers that use Service A:

Service consumers with public access permissions (allowed to access only public data records) and service consumers with private access permissions (allowed to access all data records). For performance reasons the Service A architecture uses a single database, named Database A .Each record in Database A is classified as either private or public. After Service A is invoked by a service consumer (1), it authenticates the request message using an identity store and retrieves the corresponding authorization (2, 3). Once authorized, the service consumer's request is submitted to Database A (4), which then returns the requested data (5) If the service consumer has private access permissions, all of the returned data is included in Service A's response message (6). If the service consumer has public access permissions, then Service A first filters the data in order to remove all unauthorized private data records, before sending to the response message to the service consumer (6). An investigation recently detected that private data has been leaked to unauthorized service consumers. An audit of the Service A architecture revealed that Service A's filtering logic is flawed, resulting in situations where private data was accidentally shared with service consumers that only have public access permissions. Further, it was discovered that attackers have been monitoring response messages sent by Service A in order to capture private data. It is subsequently decided to split Database A into two databases:

one containing only private data (the Private Database) and the other containing only public data (the Public Database). What additional changes are necessary to address these security problems?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Glory
4 months ago
Definitely need to modify Service A to handle two databases properly!
upvoted 0 times
...
Genevieve
4 months ago
Not sure if just encryption will fix the problem completely.
upvoted 0 times
...
Arlene
4 months ago
Wait, how did they not catch the filtering flaw sooner?
upvoted 0 times
...
Gilma
4 months ago
I think option B is the best way to go.
upvoted 0 times
...
Suzan
4 months ago
Sounds like splitting the databases is a smart move!
upvoted 0 times
...
Ula
5 months ago
I’m a bit confused about the one-time encryption key in option C. It sounds complex, and I’m not sure if it’s necessary when we could just use simpler methods like in option A.
upvoted 0 times
...
Charlie
5 months ago
I feel like we practiced a question similar to this, and I think encrypting the response messages is crucial. So, options A and D might be the best choices for security.
upvoted 0 times
...
Lyda
5 months ago
I remember we discussed the importance of modifying the logic in Service A to handle two databases. It seems like option A makes the most sense for that.
upvoted 0 times
...
Sylvia
5 months ago
I'm not entirely sure, but I think option B could work too. It introduces a utility service that might simplify the access control process.
upvoted 0 times
...
Kiley
5 months ago
I remember the protected $_template variable, but I'm not sure if that's still a valid approach these days. And I think there was something about configuring the template in di.xml as well. I'll have to review my notes on this.
upvoted 0 times
...
Howard
5 months ago
Okay, let's think this through step-by-step. The goal is to only include the data affected in the last month, so we need a way to identify that subset efficiently. I'm leaning towards the change tracking options, as that seems like the most targeted approach.
upvoted 0 times
...
Staci
5 months ago
Okay, I've got a strategy for this. The key is to focus on the role of the leader and what their primary responsibilities are in a task force setting.
upvoted 0 times
...

Save Cancel