PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which approach should you recommend?

You are designing an authentication plan for a SharePoint 2010 intranet site for a large enterprise. The site
administrator and the Active Directory (AD) administrator are concerned that the traffic on the SharePoint site
might cause performance issues related to site authentication. Average user page sessions typically last longer
than 15 minutes. You must design an authentication plan that provides the best possible performance and meets
the following requirements:
The plan must be able to accommodate 50,000 users.
.The existing infrastructure must be used as much as possible but the performance problem with user access must be prevented.
Which approach should you recommend?

Which format should you use?

Your company has Windows Mobile 6.5 devices that support Secure Digital High Capacity (SDHC). You receive a shipment of 8-GB SDHC cards for the Windows Mobile devices. On your Windows 7 computer, you need to format the SDHC cards to provide access to the entire 8 GB of memory from the Windows Mobile devices.
Which format should you use?

How should you design the timer job?

You are designing an application that will use a timer job that will run each night to send documents to a
SharePoint 2010 Records Center site for archiving. The security on the site requires higher privileges than those
normally associated with the application. The security requirements for this application specify that:
It must not require customized storage of the user credentials.
.The user token used for security access must expire within 24 hours unless specifically refreshed to prevent
extended or unintended use over time.
.The security mechanism must require a two-way trust to prevent unauthorized activity between domains.
.The application must use the SharePoint object model to accomplish this.
You need to design the application to support these security requirements.
How should you design the timer job?

What should you do?

Your company has a Microsoft Exchange Server 2007 Service Pack 2 (SP2) environment with Enterprise client access licenses (CALs) installed. Employees have Windows Mobile 6.5 devices. You manage the devices by using Microsoft Exchange ActiveSync. You deploy a certificate to the Windows Mobile devices, and configure an Exchange ActiveSync policy to allow only applications with this certificate to run on the Windows Mobile devices. You develop a custom Windows Mobile application. You deploy the application to the Windows Mobile devices. The application does not run. You need to ensure that the application can run on the Windows Mobile devices.
What should you do?

What should you do?

Your company has a Microsoft Exchange Server 2007 Service Pack 2 (SP2) environment with Enterprise client access licenses (CALs) installed. Employees have Windows Mobile 6.5 devices. You manage the devices by using Microsoft Exchange ActiveSync. You deploy a certificate to the Windows Mobile devices, and configure an Exchange ActiveSync policy to allow only applications with this certificate to run on the Windows Mobile devices. You develop a custom Windows Mobile application. You deploy the application to the Windows Mobile devices. The application does not run. You need to ensure that the application can run on the Windows Mobile devices.
What should you do?

Which authentication approach should you recommend?

You are designing a SharePoint 2010 application that contains a Web Part. The Web Part must connect to an
RSS data stream provided by a Web service. The Web service is on another server in the domain. You need to
recommend an authentication approach that meets the following requirements:
SharePoint users must not be required to supply additional credentials for the Web service.
.Standard authentication systems available to SharePoint 2010 must be used.
Which authentication approach should you recommend?