单选题You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()ACreate the role with external authentication.BCreate the role as a secure application role.CCreate the role as a password-protected role.DCreate a role and use Fine-Grained Access Control (FGAC) to secure the role

单选题
You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()
A

Create the role with external authentication.

B

Create the role as a secure application role.

C

Create the role as a password-protected role.

D

Create a role and use Fine-Grained Access Control (FGAC) to secure the role


参考解析

解析: 暂无解析

相关考题:

You need to perform these tasks:1. Create and assign a MANAGER role to Blake and Clark2. Grant CREATE TABLE and CREATE VIEW privileges to Blake and ClarkWhich set of SQL statements achieves the desired results? ()A. CREATE ROLE manager; GRANT create table, create view TO manager; GRANT manager TO BLACK, CLARK;B. CREATE ROLE manager; GRANT create table, create voew TO manager; GRANT manager ROLE TO BLACK, CLARK;C. GRANT manager ROLE TO BLACK, CLARK; GRANT create table, create voew TO BLACK CLARK; ***MISSING***

You need to recommend changes to Web1 that meet the company’s application requirements for the WebApp2 deployment.   What should you recommend?()A、Add a second IP address.B、Configure request filtering.C、Create separate application pools.D、Add worker processes to the DefaultAppPool.

You need to configure Windows Update to meet the company’s technical requirements. What should you do?()A、Configure WSUS2 as an autonomous server.B、Create a Network Load Balancing (NLB) cluster.C、Create multiple Host (A) records and use round robin DNS.D、Configure multiple service location (SRV) records and use round robin DNS.

You have a server that runs Windows Server 2008 and has the Windows Server Virtualization (WSv) server role installed. You create a new virtual machine.  You need to configure the virtual machine to meet the following requirements: Allow network communications between the virtual machine and the host system. Prevent communications with other network servers. What should you do first?()A、Install the Microsoft Loopback Adapter.B、Create a new Virtual Network Switch.C、Enable Internet Connection Sharing (ICS).D、Set the Connection to None for the network interface card.

You are designing a DNS strategy to meet the business and technical requirements. Which two actions should you perform?()A、Create a dynamic reverse lookup zone for each subnet.B、Create a dynamic forward lookup for each domain.C、Install caching-only DNS servers in the branch offices.D、Enable the BIND secondaries option for each DNS server.

You are designing a Windows Azure application.  The application includes two web roles and three instances of a worker role.  The web roles will send requests to the worker role through one or more Windows Azure Queues. You have the following requirements:   - Ensure that each request is processed exactly one time.   - Minimize the idle time of each worker role instance. - Maximize the reliability of request processing.   You need to recommend a queue design for sending requests to the worker role.  What should you recommend?()A、 Create a single queue.  Send requests on the single queue.B、 Create a queue for each web role.  Send requests on all queues at the same time.C、 Create a queue for each workerrole instance.  Send requests on each worker queue in a round robin.D、 Create a queue for each combination of web roles and worker role instances.  Send requests to all worker role instances based on the sending web role.

You want to create a role to meet these requirements:  1:The role is to be protected from unauthorized usage.  2:The password of the role is not to be embedded in the application source code or stored in a table.  Which method would you use to restrict enabling of such roles()A、Create the role with global authentication.B、Create the role with external authentication.C、Create the role as a secure application role.D、Create the role as a password-protected role.E、Create a role and use Fine-Grained Access Control (FGAC) to secure the role.

You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()A、Create the role with external authentication.B、Create the role as a secure application role.C、Create the role as a password-protected role.D、Create a role and use Fine-Grained Access Control (FGAC) to secure the role

You need to perform these tasks: 1. Create and assign a MANAGER role to Blake and Clark 2. Grant CREATE TABLE and CREATE VIEW privileges to Blake and Clark Which set of SQL statements achieves the desired results?()A、CREATE ROLE manager; GRANT create table, create view TO manager; GRANT manager TO BLACK, CLARK;B、CREATE ROLE manager; GRANT create table, create voew TO manager; GRANT manager ROLE TO BLACK, CLARK;C、GRANT manager ROLE TO BLACK, CLARK; GRANT create table, create voew TO BLACK CLARK; ***MISSING***

You are designing an Active Directory forest structure to meet the business and technical requirements. What should you do?()A、Create a single forest that has one domain. Use OUs to separate the departments.B、Create a single forest that has multiple domains to represent every department.C、Create a single forest that has three domains: one for finance, one for HR, and one for the remaining departments.D、Create multiple forests that have a single domain in each forest to represent the departments.

You are designing the placement of the PDC emulator role to meet the business and technical requirements. In which location should you place the PDC emulator role?()A、Los AngelesB、ParisC、SydneyD、LisbonE、Barcelona

You need to recommend a solution for managing all of the servers. The solution must meet the  company’s technical requirements.What should you include in the recommendation?()A、Remote Server Administration Tools (RSAT)B、the Administration Tools Pack (adminpak.msi)C、the Remote Desktop Gateway (RD Gateway) role serviceD、the Remote Desktop Web Access (RD Web Access) role service

Your company has a main office and a branch office.The branch office administrators are the only members of a custom management role group.The role group is configured to allow members to manage recipients. You notice that the branch office administrators can manage recipients in both offices.You need to ensure that the branch office administrators can manage recipients in the branch office only. What should you do?()A、Create and associate a management scope to the role group.B、Create and associate a management role assignment policy to the role group.C、Create a new linked role group, and then add the branch office administrators to the role group.D、Create a new role, and then add management role entries to the role.

You need to meet the fraud detection requirements. What should you do?()A、Use Percentage Sampling in SSIS.B、Use a Neural Network Data mining algorithm.C、Create an SSAS Key Performance Indicator for each account.D、Monitor transactions by using SQL Server Profiler.

单选题You need to perform these tasks: 1. Create and assign a MANAGER role to Blake and Clark 2. Grant CREATE TABLE and CREATE VIEW privileges to Blake and Clark Which set of SQL statements achieves the desired results? ()ACREATE ROLE manager; GRANT create table, create view TO manager; GRANT manager TO BLACK, CLARK;BCREATE ROLE manager; GRANT create table, create voew TO manager; GRANT manager ROLE TO BLACK, CLARK;CGRANT manager ROLE TO BLACK, CLARK; GRANT create table, create voew TO BLACK CLARK; ***MISSING***

单选题You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()ACreate the role with external authentication.BCreate the role as a secure application role.CCreate the role as a password-protected role.DCreate a role and use Fine-Grained Access Control (FGAC) to secure the role

单选题You are designing the placement of the PDC emulator role to meet the business and technical requirements. In which location should you place the PDC emulator role?()ALos AngelesBParisCSydneyDLisbonEBarcelona

多选题You are the network administrator for All network servers run Windows Server 2003. All client computers run Windows XP Professional. You create a folder on thet network and share it as TestKingDocs. You want users to be able to read, create, and modify documents that are stored in the shared folder. You also want users to be able to delete the folders and the files that they create. A user reports that another used deleted a folder that she created. You discover that the Everyone group ias assigned the Allow - Full Control NTFS permission for the folder. You remove all assigned permissions for the Everyone group. You need to configure permission for the TestKingDocs shared folder to meet your requirements. You also need to ensure that users cannot delete the folders and files that other users create. Which two actions should you perform ()(Each correct answer presents part of the solution. Choose two.)AAssign the Authenticated Users group the Allow - Read Execute permission.BAssign the Anonymous group the Allow - Modify permission.CAssign the Creator Owner group the Allow - Modify permission.DAssign the Creator Owner group the Allow - Full Control permission

单选题You are designing the placement of the PDC emulator role to meet the business and technical requirements.  In which location should you place the PDC emulator role?()A Los AngelesB ParisC SydneyD LisbonE Barcelona

单选题You need to perform these tasks: 1. Create and assign a MANAGER role to Blake and Clark 2. Grant CREATE TABLE and CREATE VIEW privileges to Blake and Clark Which set of SQL statements achieves the desired results?()ACREATE ROLE manager; GRANT create table, create view TO manager; GRANT manager TO BLACK, CLARK;BCREATE ROLE manager; GRANT create table, create voew TO manager; GRANT manager ROLE TO BLACK, CLARK;CGRANT manager ROLE TO BLACK, CLARK; GRANT create table, create voew TO BLACK CLARK; ***MISSING***

单选题You have a server that runs Windows Server 2008 and has the Windows Server Virtualization (WSv) server role installed. You create a new virtual machine.  You need to configure the virtual machine to meet the following requirements: Allow network communications between the virtual machine and the host system. Prevent communications with other network servers. What should you do first?()AInstall the Microsoft Loopback Adapter.BCreate a new Virtual Network Switch.CEnable Internet Connection Sharing (ICS).DSet the Connection to None for the network interface card.

单选题You are designing a forest structure to meet the business and technical requirements.  How many forests should you create?()A OneB TwoC ThreeD Four

单选题You are designing a forest structure to meet the business and technical requirements. How many forests should you create?()AOneBTwoCThreeDFour

单选题You need to recommend a solution for managing all of the servers. The solution must meet the  company’s technical requirements.What should you include in the recommendation?()ARemote Server Administration Tools (RSAT)Bthe Administration Tools Pack (adminpak.msi)Cthe Remote Desktop Gateway (RD Gateway) role serviceDthe Remote Desktop Web Access (RD Web Access) role service

单选题You create Windows Forms applications by using the .NET Framework 3.5.You plan to deploy a new Windows Presentation Foundation (WPF) XAML browser application (XBAP).The deployment must meet the following requirements:  (1)shortcut is added to the Start menu   (2)The most recent version of the application is installed and executed on client computers   (3)Users can uninstall the application from the control panel    You need to identify a deployment technology that meets the specified requirements.You want to achieve this goal by using the minimum amount of development effort. Which deployment technology should you use?()AXCOPYBClickOnceCMicrosoftWindows InstallerDRemote Desktop connections

单选题You need to recommend an administrative solution for the local support technicians in the satellite offices. The solution must meet the companys security requirements.What should you include in the recommendation?()AActive Directory delegationBAdministrator Role SeparationCmanaged service accountsDRestricted Groups

单选题You want to create a role to meet these requirements:  1:The role is to be protected from unauthorized usage.  2:The password of the role is not to be embedded in the application source code or stored in a table.  Which method would you use to restrict enabling of such roles()ACreate the role with global authentication.BCreate the role with external authentication.CCreate the role as a secure application role.DCreate the role as a password-protected role.ECreate a role and use Fine-Grained Access Control (FGAC) to secure the role.