MultipleChoice
Architects responsible for a domain service inventory are being asked to make some of their services available to service consumers from outside the organization. However, they are reluctant to do so and consult you to help define a security architecture that will keep all of the existing services within the domain service inventory hidden within a private network. Which option best is a valid approach for fulfilling this requirement?
OptionsMultipleChoice
The Service Perimeter Guard pattern is applied to position a perimeter service outside of the firewall. The firewall only permits the perimeter service to access services within a specific service inventory. Which option best statements describes a valid problem with this security architecture?
OptionsMultipleChoice
Which of the following are types of security sessions?
OptionsMultipleChoice
A malicious passive intermediary intercepts messages sent between two services. Which option best is the main security concern raised by this situation?
Options