You need to establish a user security context that will be used for authorization checks such as IsInRole.
You are writing code for user authentication and authorization.
The username, password, and roles are stored in your application data store.
You need to establish a user security context that will be used for authorization checks such as IsInRole.
You write the following code segment to authorize the user.
if (!TestPassword(userName, password))
throw new Exception(“could not authenticate user”);
String[] userRolesArray = LookupUserRoles(userName);
Which code segment should you use?
You are loading a new assembly into an application.
You need to override the default evidence for the assembly.
You require the common language runtime (CLR) to grant the assembly a permission set, as if the assembly were loaded from the local intranet zone.
You need to build the evidence collection.
Which code segment should you use?
What should you do to implement role-based security?
You work as an application developer at Domain.com. You are currently creating an application that requires role-based security.
You are planning to utilize a database to store the user accounts and group membership data. You need to ensure that users are able to log on and off.
You also need to ensure that the application you have created tracks the user accounts of these users, and restrict or allow access to code based on their group membership.
You need to achieve this objective with as little developer effort as possible.
What should you do to implement role-based security?
comWhat should you do?
You work as the network administrator at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. Domain.com has its headquarters located in London and branch office located in Paris. All servers on the Domain.com network run Windows Server 2008 and all client computers run Windows Vista.
During the course of the day you receive instruction from Domain.com do design a security solution for Domain.com which is isolated from the Internet. Domain.com has additionally requested that you determine the recommendations for DNS.
What should you do? (Choose two)
What should you do?
Your company has a server named Server1 that runs Windows Server 2008. Server1 is a Windows Server Update Services (WSUS) server. You have a computer named Computer1 that runs Windows 7. Computer1 is configured to obtain updates from Server1. You open the WSUS snap-in on Server1 and discover that Computer1 does not appear. You need to ensure that Computer1 appears in the WSUS snap-in. What should you do?
What should you do?
You have a standalone computer that runs Windows 7. Multiple users share the computer. You need to ensure that you can read the content of all encrypted files on the computer. What should you do?
What should you do?
A custom Security Configuration Wizard (SCW) policy is applied to an Exchange Server 2007 Edge Transport server named Exch1. You want to apply this policy to a new Edge Transport server named Exch2. You install SCW on Exch2. You copy the existing SCW policy to Exch2 as
C:ExchangeSCWPolicy.xml. You need to apply the custom policy to Exch2. What should you do?
What should you do next?
You have an Exchange Server 2007 environment. You configure your external e-mail client access to use IMAP4. You configure the external firewall to allow TCP port 993. You need to ensure that your external e-mail clients are able to securely send messages from the Internet by using your Exchange servers. You configure an SSL certificate for secure authenticated SMTP. What should you do next?
Which tool should you use to configure the SNMP security settings on the server?
Your network contains a server that has the SNMP Service installed. You need to configure the SNMP security settings on the server. Which tool should you use? A. Local Security Policy B. Scw C. Secedit D. Services console
What should you do to to prevent Rory Allen from modifying the SOA record in the Domain.com zone?
You work as the network administrator at Domain.com. The Domain.com network consists of a single Active Directory forest containing a single domain named Domain.com. All servers on the Domain.com network run Windows Server 2008 and all client computers run Windows Vista. The Domain.com network currently has two Active Directory-integrated zones: Domain.com and Weyland.com. During the […]