Create the role with external authentication.
Create the role as a secure application role.
Create the role as a password-protected role.
Create a role and use Fine-Grained Access Control (FGAC) to secure the role
第1题:
You are evaluating a Windows Azure application. The application uses one instance of a web role. The role instance size is set to Medium. The application does not use SQL Azure. You have the following requirements for scaling the application: - Maximize throughput. - Minimize downtime while scaling. - Increase system resources. You need to recommend an approach for scaling the application. What should you recommend?()
第2题:
You have the following requirements: - Ensure that the business tier can be updated without affecting the application tier. - Use the minimum role instance size that meets or exceeds the current server specifications. You need to recommend a topology for hosting the application in Windows Azure. What should you recommend?()
第3题:
A. user name
B. password length
C. certificate
D. Host Checker
第4题:
You want to create a role to meet these requirements: 1:The role is to be protected from unauthorized usage. 2:The password of the role is not to be embedded in the application source code or stored in a table. Which method would you use to restrict enabling of such roles()
第5题:
You are designing a Windows Azure application. The application includes two web roles and three instances of a worker role. The web roles will send requests to the worker role through one or more Windows Azure Queues. You have the following requirements: - Ensure that each request is processed exactly one time. - Minimize the idle time of each worker role instance. - Maximize the reliability of request processing. You need to recommend a queue design for sending requests to the worker role. What should you recommend?()
第6题:
You are developing an application that uses role-based security. The prinicipal policy of the application domain is configured during startup with the following code:AppDomain.CurrentDomain.SetPrincipalPolicy(PrincipalPolicy.WindowsPrincipal); You need to restrict access to one of the methods in your application so that only members of the local Administrators group can call the method. Which attribute should you place on the method?()
第7题:
You work as an application developer at Contoso.com. You use Microsoft .NET Framework 3.5 and Microsoft ADO.NET to develop an application. The user name and password that is kept by the connection string is stored directly in the code of the application. You want to make sure that the password in the connection string is as protected. What should you do? ()
第8题:
You are the administrator of a database that contains 64 lookup tables. These tables store static data that should not change. However, users report that some of this data is being changed. You need to prevent users from modifying the data.
You want to minimize changes to your security model and to your database applications. How should you modify the database?
A.Create a filegroup named LOOKUP. Move the lookup tables to this filegroup. Select the read only check box for the filegroup.
B.Create a database role named datamodifier. Grant SELECT permissions to the datamodifier role. Add all users to the role.
C.Deny INSERT, UPDATE, and DELETE permissions for all users. Create stored procedures that modify data in all tables except lookup tables. Require users to modify data through these stored procedures.
D.Create a view of the lookup tables. Use the view to allow users access to the lookup tables.
第9题:
You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()
第10题:
You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()