PrepAway - Latest Free Exam Questions & Answers

Tag: security

You need to establish a user security context that will be used for authorization checks such as IsInRole.

You are writing code for user authentication and authorization.
The username, password, and roles are stored in your application data store.
You need to establish a user security context that will be used for authorization checks such as IsInRole.
You write the following code segment to authorize the user.
if (!TestPassword(userName, password))
throw new Exception(“could not authenticate user”);
String[] userRolesArray = LookupUserRoles(userName);

What should you do to implement role-based security?

You work as an application developer at Domain.com. You are currently creating an application that requires role-based security.
You are planning to utilize a database to store the user accounts and group membership data. You need to ensure that users are able to log on and off.
You also need to ensure that the application you have created tracks the user accounts of these users, and restrict or allow access to code based on their group membership.
You need to achieve this objective with as little developer effort as possible.
What should you do to implement role-based security?

comWhat should you do?

You work as the network administrator at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. Domain.com has its headquarters located in London and branch office located in Paris. All servers on the Domain.com network run Windows Server 2008 and all client computers run Windows Vista.
During the course of the day you receive instruction from Domain.com do design a security solution for Domain.com which is isolated from the Internet. Domain.com has additionally requested that you determine the recommendations for DNS.

What should you do? (Choose two)

What should you do?

Your company has a server named Server1 that runs Windows Server 2008. Server1 is a Windows Server Update Services (WSUS) server. You have a computer named Computer1 that runs Windows 7. Computer1 is configured to obtain updates from Server1. You open the WSUS snap-in on Server1 and discover that Computer1 does not appear. You need to ensure that Computer1 appears in the WSUS snap-in. What should you do?

What should you do?

A custom Security Configuration Wizard (SCW) policy is applied to an Exchange Server 2007 Edge Transport server named Exch1. You want to apply this policy to a new Edge Transport server named Exch2. You install SCW on Exch2. You copy the existing SCW policy to Exch2 as
C:ExchangeSCWPolicy.xml. You need to apply the custom policy to Exch2. What should you do?

What should you do next?

You have an Exchange Server 2007 environment. You configure your external e-mail client access to use IMAP4. You configure the external firewall to allow TCP port 993. You need to ensure that your external e-mail clients are able to securely send messages from the Internet by using your Exchange servers. You configure an SSL certificate for secure authenticated SMTP. What should you do next?

What should you do to to prevent Rory Allen from modifying the SOA record in the Domain.com zone?

You work as the network administrator at Domain.com. The Domain.com network consists of a single Active Directory forest containing a single domain named Domain.com. All servers on the Domain.com network run Windows Server 2008 and all client computers run Windows Vista. The Domain.com network currently has two Active Directory-integrated zones: Domain.com and Weyland.com. During the […]


Page 1 of 41234