Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Arcitura Education Exam S90.18 Topic 5 Question 61 Discussion

Actual exam question for Arcitura Education's S90.18 exam
Question #: 61
Topic #: 5
[All S90.18 Questions]

Service A requires self-signed digital certificates from all of its service consumers. The service and its service consumers both belong to the same organization. You are presented with a new requirement to only allow access to those service consumers with certificates that have not expired. How can this requirement be addressed with minimal impacts on the current security architecture?

Show Suggested Answer Hide Answer
Suggested Answer: D

Contribute your Thoughts:

Tora
25 days ago
Wait, so we can't use our own self-signed certs? That's just plain silly. I bet the developers are kicking themselves for not thinking this through from the start.
upvoted 0 times
Ezekiel
4 days ago
Wait, so we can't use our own self-signed certs? That's just plain silly. I bet the developers are kicking themselves for not thinking this through from the start.
upvoted 0 times
...
Maryanne
7 days ago
B) The certificates need to be signed by an external certificate authority so that the certificate authority's Certificate Revocation List (CRL) can be accessed in order to check the expiry dates of the certificates.
upvoted 0 times
...
Kimbery
9 days ago
A) The current security mechanism already addresses this requirement because the certificates contain a value that represents the validity period.
upvoted 0 times
...
...
Sherron
29 days ago
Haha, 'None of the above'? This is like a trick question. I'm starting to think the person who wrote this exam needs a refresher on certificate management.
upvoted 0 times
...
Stacey
1 months ago
Certificates not valid? What is this, the dark ages? I can't believe we're even considering that as an option.
upvoted 0 times
Sarah
6 days ago
B) The certificates need to be signed by an external certificate authority so that the certificate authority's Certificate Revocation List (CRL) can be accessed in order to check the expiry dates of the certificates.
upvoted 0 times
...
Pa
11 days ago
A) The current security mechanism already addresses this requirement because the certificates contain a value that represents the validity period.
upvoted 0 times
...
Cordelia
13 days ago
A) The current security mechanism already addresses this requirement because the certificates contain a value that represents the validity period.
upvoted 0 times
...
...
Marjory
1 months ago
Bringing in an external certificate authority just to check expiry dates? That's overkill. We're in the same organization, can't we just handle this internally?
upvoted 0 times
Georgeanna
3 days ago
A) We should explore options to handle this internally to minimize impacts on the current security architecture.
upvoted 0 times
...
Laurel
6 days ago
B) Bringing in an external certificate authority might be necessary for added security measures.
upvoted 0 times
...
Daryl
1 months ago
A) The current security mechanism already addresses this requirement because the certificates contain a value that represents the validity period.
upvoted 0 times
...
...
Shannan
2 months ago
The current security mechanism already addresses this requirement? Really? I guess the developers forgot to actually check the certificate expiration dates. That's an oversight waiting to happen.
upvoted 0 times
Basilia
26 days ago
The current security mechanism already addresses this requirement? Really? I guess the developers forgot to actually check the certificate expiration dates. That's an oversight waiting to happen.
upvoted 0 times
...
Leonora
29 days ago
B) The certificates need to be signed by an external certificate authority so that the certificate authority's Certificate Revocation List (CRL) can be accessed in order to check the expiry dates of the certificates.
upvoted 0 times
...
Andree
1 months ago
User 2: I don't think so. The developers should definitely check the certificate expiration dates to avoid any oversight.
upvoted 0 times
...
Marcos
1 months ago
A) The current security mechanism already addresses this requirement because the certificates contain a value that represents the validity period.
upvoted 0 times
...
Dominga
1 months ago
User 1: The current security mechanism already addresses this requirement because the certificates contain a value that represents the validity period.
upvoted 0 times
...
...
Fletcher
2 months ago
I'm not sure about using certificates in this scenario. Maybe option C is right after all.
upvoted 0 times
...
Lachelle
2 months ago
I disagree, I believe option B is the way to go. We need to have access to the CRL to check expiry dates.
upvoted 0 times
...
Long
2 months ago
I think option A is the best choice because the certificates already have the validity period.
upvoted 0 times
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77