Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education Exam S90.18 Topic 5 Question 104 Discussion

Actual exam question for Arcitura Education's S90.18 exam
Question #: 104
Topic #: 5
[All S90.18 Questions]

Security specialists at an organization require that messages exchanged between two services are kept private. There is an added requirement to check if the messages were tampered with. The application of which of the following patterns fulfills these requirements?

Show Suggested Answer Hide Answer
Suggested Answer: A, B

Contribute your Thoughts:

Sue
11 days ago
Data Origin Authentication for the win! Gotta love a pattern that keeps your messages safe and lets you know if anyone's been snooping around.
upvoted 0 times
...
Adaline
12 days ago
Am I the only one who thinks this question is hilarious? All these fancy authentication patterns, and I bet the answer is just 'use SSL/TLS and call it a day'.
upvoted 0 times
Ernest
1 days ago
A) Data Confidentiality
upvoted 0 times
...
Krystina
8 days ago
A) Data Confidentiality
upvoted 0 times
...
...
Franklyn
24 days ago
This question is making my head spin! I'm just going to go with D. Brokered Authentication and hope for the best.
upvoted 0 times
Wilda
2 days ago
I'm not sure, but I'll go with D) Brokered Authentication like you did.
upvoted 0 times
...
Halina
14 days ago
I believe it's B) Data Origin Authentication.
upvoted 0 times
...
Lelia
18 days ago
I think the correct answer is A) Data Confidentiality.
upvoted 0 times
...
...
Mitzie
27 days ago
I see your point, but I think C) Direct Authentication could also fulfill the requirements by verifying the identity of the services exchanging messages.
upvoted 0 times
...
Merilyn
29 days ago
I'm going with C. Direct Authentication. That sounds like it would verify the identity of the services sending the messages, right?
upvoted 0 times
...
Marguerita
1 months ago
Hmm, I'm not so sure. Wouldn't Data Confidentiality (A) also work to keep the messages private? This is a tough one!
upvoted 0 times
Raymon
8 days ago
User 1: Data Confidentiality (A) would keep the messages private.
upvoted 0 times
...
...
Ines
1 months ago
I agree with Heidy, because Data Origin Authentication ensures the messages are not tampered with.
upvoted 0 times
...
Heidy
1 months ago
I disagree, I believe the correct answer is B) Data Origin Authentication.
upvoted 0 times
...
Salley
1 months ago
I think the answer is B. Data Origin Authentication. That's the pattern that ensures the messages are private and can't be tampered with.
upvoted 0 times
Peter
5 days ago
Using Data Origin Authentication will help the organization meet the requirements for message privacy and integrity.
upvoted 0 times
...
Arlette
7 days ago
It's important for security specialists to implement the right pattern to protect the messages exchanged between services.
upvoted 0 times
...
Joesph
14 days ago
Data Origin Authentication is crucial for verifying the source of the messages and ensuring they have not been tampered with.
upvoted 0 times
...
Yolando
20 days ago
Yes, B) Data Origin Authentication ensures both privacy and integrity of the messages exchanged between services.
upvoted 0 times
...
Naomi
24 days ago
I agree, B) Data Origin Authentication is the correct pattern for this requirement.
upvoted 0 times
...
Johnathon
26 days ago
I agree, B) Data Origin Authentication is the correct pattern for ensuring message privacy and integrity.
upvoted 0 times
...
...
Precious
2 months ago
I think the answer is A) Data Confidentiality.
upvoted 0 times
...

Save Cancel