What should you do?
You are creating an ASP.NET application by using the .NET Framework 3.5.
The application is configured to run by using a specific set of user credentials. Other applications are not allowed to use these user credentials. The application uses asymmetric encryption to encrypt and decrypt messages to other servers.
You need to protect the private key used to encrypt and decrypt messages from being accessed by other users or applications on the same server.
What should you do?
What should you do?
You are creating an ASP.NET application by using the .NET Framework 3.5.
The application stores and retrieves sensitive data in a Microsoft SQL Server 2008 database. The database is accessed by multiple applications.
You need to ensure that other applications that access the database are unable to view any sensitive data that is stored by the application.
What should you do?
Which two actions should you perform?
You are creating an ASP.NET application by using the .NET Framework 3.5. The application uses the Forms authentication mode. Each folder in the application contains confidential Microsoft Excel files. You need to ensure that bots are not allowed to access the folders in the application. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
Which two actions should you perform?
You are creating an ASP.NET application by using the .NET Framework 3.5.
The application will allow users to enter HTML content into a Web form. The HTML content will be stored in a Microsoft SQL Server database.
You need to ensure that the content can be posted to the page. You also need to ensure that potentially harmful script cannot be stored in the database.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
Which three actions should you perform?
You are creating an ASP.NET application by using the .NET Framework 3.5.
You deploy the application to a remote server. The application contains form submissions, QueryString parameters, cookies, and ViewState properties. The application connects to a database.
You need to ensure that SQL injection attacks are minimized.
Which three actions should you perform? (Each correct answer presents part of the solution.
Choose three.)
Which authentication mode should you select?
You are creating an ASP.NET application by using the .NET Framework 3.5. Users are authenticated against the Web server by using a custom Single Sign-On (SSO) provider. You need to select an authentication mode in the Web.config file. Which authentication mode should you select?
Which two actions should you perform?
You are creating an ASP.NET application by using the .NET Framework 3.5.
The application will be accessed by Internet users.
You plan to enable users to authenticate from the client-side script.
You add the following code fragment in the Web.config file of the application.
You need to configure the application to ensure user credentials are validated against Active Directory by using the client-side script. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
Which XML fragment should you use in the Web.config file?
You are creating an ASP.NET application by using the .NET Framework 3.5. User accounts in Active Directory are configured to provide access to resources. You need to ensure that users can access the resources through the application. Which XML fragment should you use in the Web.config file?
Which node should you use?
You are creating an ASP.NET application by using the .NET Framework 3.5. The application has several subdirectories under the application root directory. Only the users who belong to an approved role can access the contents of the subdirectory. The user authorizations for the subdirectories must be stored in a single Web.config file in the application root directory. You need to ensure that the node encloses the approved roles and specifies the appropriate subdirectory.
Which node should you use?
What should you do?
You are creating an ASP.NET application by using the .NET Framework 3.5.
The application will be deployed to an intranet server in your organization.
You need to ensure that the application meets the following requirements:
– Users must be able to log on to the application by using their Active Directory credentials.
– Each page in the application must display controls for user name and password when accessed by an unauthenticated user.
What should you do?