Service Consumer A sends a request message to Service A (1) after which Service A retrieves financial
data from Database A (2). Service A then sends a request message with the retrieved data to Service
B (3). Service B exchanges messages with Service C (4) and Service D (5), which perform a series of
calculations on the data and return the results to Service A .Service A uses these results to update
Database A (7) and finally sends a response message to Service Consumer A (8). Component B has
direct, independent access to Database A and is fully trusted by Database A .Both Component B and
Database A reside within Organization A .Service Consumer A and Services A, B, C, and D are external
to the organizational boundary of Organization A .
Component B is considered a mission critical program that requires guaranteed access to and fast
response from Database A .Service A was recently the victim of a denial of service attack, which
resulted in Database A becoming unavailable for extended periods of time (which further
compromised Component B). Additionally, Services B, C, and D have repeatedly been victims of
malicious intermediary attacks, which have further destabilized the performance of Service A .How
can this architecture be improved to prevent these attacks?
Question No 2
Service A exchanges messages with Service B multiple times during the same runtime service
activity. Communication between Services A and B has been secured using transport - layer security.
With each service request message sent to Service B (1A .IB), Service A includes an X.509 certificate,
signed by an external Certificate Authority (CA). Service B validates the certificate by retrieving the
public key of the CA (2A .2B) and verifying the digital signature of the X.509 certificate. Service B then
performs a certificate revocation check against a separate external CA repository (3A, 3B). No
intermediary service agents reside between Service A and Service B .
To fulfill a new security requirement, Service A needs to be able to verify that the response message
sent by Service B has not been modified during transit. Secondly, the runtime performance between
Services A and B has been unacceptably poor and therefore must be improved without losing the
ability to verify Service A's security credentials. It has been determined that the latency is being
caused by redundant security processing carried out by Service B .Which of the following statements
describes a solution that fulfills these requirements?
Question No 3
Service Consumer A sends a request message to Service A (1), after which Service A sends a request
message with security credentials to Service B (2). Service B authenticates the request and, if the
authentication is successful, writes data from the request message into Database B (3). Service B
then sends a request message to Service C (4), which is not required to issue a response message.
Service B then sends a response message back to Service A (5). After processing Service B's response,
Service A sends another request message with security credentials to Service B (6). After successfully
authenticating this second request message from Service A, Service B sends a request message to
Service D (7). Service D is also not required to issue a response message. Finally, Service B sends a
response message to Service A (8), after which Service A records the response message contents in
Database A (9) before sending its own response message to Service Consumer A (10).
Services A and B use digital certificates to support message integrity and authentication. With every
message exchange between the two services (2, 5, 6, 8), the digital certificates are used. It has been
determined that both Databases A and B are vulnerable to malicious attackers that may try to
directly access sensitive data records. Furthermore, performance logs have revealed that the current
exchange of digital certificates between Services A and B is unacceptably slow. How can the integrity
and authenticity of messages exchanged between Services A and B be maintained, but with
improved runtime performance - and - how can Databases A and B be protected with minimal
additional impact on performance?