New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education S90.20 Exam - Topic 1 Question 14 Discussion

Actual exam question for Arcitura Education's S90.20 exam
Question #: 14
Topic #: 1
[All S90.20 Questions]

Service A has two specific service consumers, Service Consumer A and Service Consumer B (1). Both service consumers are required to provide security credentials in order for Service A to perform authentication using an identity store (2). If a service consumer's request message is successfully authenticated, Service A processes the request by exchanging messages with Service B (3) and then Service C (4). With each of these message exchanges, Service A collects data necessary to perform a query against historical data stored in a proprietary legacy system. Service A's request to the legacy system must be authenticated (5). The legacy system only provides access control using a single account. If the request from Service A is permitted, it will be able to access all of the data stored in the legacy system. If the request is not permitted, none of the data stored in the legacy system can be accessed. Upon successfully retrieving the requested data (6), Service A generates a response message that is sent back to either Service Consumer A or B .The legacy system is also used independently by Service D without requiring any authentication. Furthermore, the legacy system has no auditing feature and therefore cannot record when data access from Service A or Service D occurs. If the legacy system encounters an error when processing a request, it generates descriptive error codes. This service composition architecture needs to be upgraded in order to fulfill the following new security requirements:

1. Service Consumers A and B have different permission levels, and therefore, response messages sent to a service consumer must only contain data for which the service consumer is authorized.

2. All data access requests made to the legacy system must be logged.

3. Services B and C must be provided with the identity of Service A's service consumer in order to provide Service A with the requested data.

4. Response messages generated by Service A cannot contain confidential error information about the legacy system. Which of the following statements provides solutions that satisfy these requirements?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Allene
4 months ago
The Trusted Subsystem pattern sounds like a solid approach for this scenario.
upvoted 0 times
...
Lashon
4 months ago
I disagree, option C seems more secure with digital certificates.
upvoted 0 times
...
Carry
4 months ago
Wait, can the legacy system really handle all those requests without proper logging?
upvoted 0 times
...
Kimberlie
4 months ago
I think option B is the best choice here!
upvoted 0 times
...
Aleisha
5 months ago
Service A needs to authenticate both consumers before accessing the legacy system.
upvoted 0 times
...
Shawn
5 months ago
Ah, this is a good one. I remember learning about WildFire and how it can help with real-time threat detection. I'll focus on the options that highlight the advantages of having that capability inline on the firewall.
upvoted 0 times
...
Francoise
5 months ago
Okay, let me re-read the question and options. I think I've got it now - the correct answer is B, the computer that hosts the application.
upvoted 0 times
...
Marshall
5 months ago
Hmm, I'm a bit confused by the wording of this question. I'll need to read through it a few times to make sure I understand what it's asking.
upvoted 0 times
...
Ena
5 months ago
Hmm, I'm a bit unsure about this one. The question seems clear, but I'll need to double-check my work to make sure I'm not missing anything.
upvoted 0 times
...

Save Cancel