Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education Exam S90.18 Topic 5 Question 106 Discussion

Actual exam question for Arcitura Education's S90.18 exam
Question #: 106
Topic #: 5
[All S90.18 Questions]

Security specialists at an organization require that messages exchanged between two services are kept private. There is an added requirement to check if the messages were tampered with. The application of which of the following patterns fulfills these requirements?

Show Suggested Answer Hide Answer
Suggested Answer: A, B

Contribute your Thoughts:

Carin
1 months ago
I'm pretty sure the answer is B) Data Origin Authentication. Ain't no way I'm letting anyone mess with my messages!
upvoted 0 times
...
Rodolfo
1 months ago
Haha, these options are a real cryptic puzzle, aren't they? I'm gonna go with whatever the guy who writes the exams thinks is right.
upvoted 0 times
...
Miriam
1 months ago
Hmm, I'm not so sure. I'd go with D) Brokered Authentication. Gotta have that third-party verification, you know?
upvoted 0 times
Wilda
25 days ago
I agree with B) Data Origin Authentication. We need to make sure the messages haven't been tampered with.
upvoted 0 times
...
Elin
29 days ago
I think A) Data Confidentiality is the way to go. We need to keep those messages private.
upvoted 0 times
...
...
Annelle
2 months ago
I see your point, Myra. Data Origin Authentication does provide both privacy and integrity checks.
upvoted 0 times
...
Myra
2 months ago
I believe the answer is B) Data Origin Authentication, as it also checks if messages were tampered with.
upvoted 0 times
...
Latosha
2 months ago
I agree with Georgeanna, because data confidentiality ensures that messages are kept private.
upvoted 0 times
...
Huey
2 months ago
C'mon, it's obviously A) Data Confidentiality. Keeping the messages private is the key requirement here.
upvoted 0 times
...
Muriel
2 months ago
I think the answer is B) Data Origin Authentication. It ensures the message wasn't tampered with and the sender's identity is verified.
upvoted 0 times
Brittni
1 months ago
I believe B) Data Origin Authentication is the best option to fulfill both requirements of message privacy and integrity.
upvoted 0 times
...
Sarah
1 months ago
I think A) Data Confidentiality is also important for keeping the messages private.
upvoted 0 times
...
Nan
1 months ago
I agree, B) Data Origin Authentication is the correct choice for ensuring message integrity and sender verification.
upvoted 0 times
...
...
Georgeanna
2 months ago
I think the answer is A) Data Confidentiality.
upvoted 0 times
...

Save Cancel