Question: 1
An Architect is performing an audit of production logs via Log Center and finds some potentially dangerous custom log output.
In which two ways It this log output Improper In a production environment? Choose 2 answers
Question: 2
During implementation, the team found that there is a notification controller exposed for an external service that marks the order as paid when notification is received. The notification URL is sent to the service together with the payment request and contains only the URL with orderlD as the parameter.
What should the Architect recommend to the team in order to prevent the unauthorized usage of the controller to mark the orders as paid?
Question: 3
A developer is checking for Cross Site Scripting (XSS) and found that the quick search is not escaped (allows inclusion of Javascript) in the following script:
How would the developer resolve this issue?
Question: 4
An Architect is documenting the technical design for a single B2C Commerce storefront. The Client has a business requirement to provide pricing that is customized to specific groups:
* 50 different pricing groups of customers
* 30 different pricing groups of employees
* 10 different pricing groups of vendors
Which items should the Architect include in the design in order to set applicable price books based on these requirements''
Choose 2 answers
Question: 5
An Architect to notify by the Business that order conversion dramatically dropped a few hours after go live. Further investigation points out that customers cannot proceed to checkout anymore. The Architect is aware that a custom inventory checks with a third-party API is enforced at the beginning of checkout, and that customers are redirected to the basket page when items are no longer in stock
Which tool can dearly confirm that the problem is indeed caused by the inventory check?