BlackFriday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education Exam S90.18 Topic 2 Question 82 Discussion

Actual exam question for Arcitura Education's S90.18 exam
Question #: 82
Topic #: 2
[All S90.18 Questions]

Security specialists at an organization require that messages exchanged between two services are kept private. There is an added requirement to check if the messages were tampered with. The application of which of the following patterns fulfills these requirements?

Show Suggested Answer Hide Answer
Suggested Answer: A, B

Contribute your Thoughts:

Zana
5 months ago
I'm not sure, but I think C) Direct Authentication could also fulfill the requirements.
upvoted 0 times
...
Ryan
5 months ago
I agree with Luisa, because data origin authentication ensures the message hasn't been tampered with.
upvoted 0 times
...
Luisa
5 months ago
I disagree, I believe the correct answer is B) Data Origin Authentication.
upvoted 0 times
...
Ezekiel
5 months ago
I think the answer is A) Data Confidentiality.
upvoted 0 times
...
Sabine
6 months ago
I think D) Brokered Authentication could also work since it involves a trusted broker for authenticating messages.
upvoted 0 times
...
France
6 months ago
I'm not sure, but I think B) Data Origin Authentication makes sense because we need to check if the messages were tampered with.
upvoted 0 times
...
Theola
6 months ago
I disagree, I believe it's B) Data Origin Authentication.
upvoted 0 times
...
Thaddeus
7 months ago
I think the answer is A) Data Confidentiality.
upvoted 0 times
...

Save Cancel