1Z0-052

单选题You want to create a role to meet these requirements:  1:The role is to be protected from unauthorized usage.  2:The password of the role is not to be embedded in the application source code or stored in a table.  Which method would you use to restrict

题目
单选题
You want to create a role to meet these requirements:  1:The role is to be protected from unauthorized usage.  2:The password of the role is not to be embedded in the application source code or stored in a table.  Which method would you use to restrict enabling of such roles()
A

Create the role with global authentication.

B

Create the role with external authentication.

C

Create the role as a secure application role.

D

Create the role as a password-protected role.

E

Create a role and use Fine-Grained Access Control (FGAC) to secure the role.

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are evaluating a Windows Azure application. The application uses one instance of a web role. The role instance size is set to Medium. The application does not use SQL Azure.   You have the following requirements for scaling the application:   - Maximize throughput.  - Minimize downtime while scaling. - Increase system resources.   You need to recommend an approach for scaling the application.  What should you recommend?()  

  • A、 Set up vertical partitioning.
  • B、 Set up horizontal partitioning.
  • C、 Increase the number of role instances.
  • D、 Change the role instance size to large.

正确答案:C

第2题:

You have the following requirements:   - Ensure that the business tier can be updated without affecting the application tier.   - Use the minimum role instance size that meets or exceeds the current server specifications.    You need to recommend a topology for hosting the application in Windows Azure.  What should you recommend?()

  • A、 Deploy the application tier and the business tier to one role with two Medium instances.
  • B、 Deploy the application tier and the business tier to one role with two Large instances.
  • C、 Deploy the application tier role to a Medium instance.  Deploy the business tier role to a medium instance.
  • D、 Deploy the application tier role to a Large instance.  Deploy the business tier role to a Large instance.

正确答案:D

第3题:

On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()

A. Sign-in Policy

B. Role Mapping Rule

C. Role Restrictions

D. Trusted Server CA


参考答案:B, C

第4题:

You want to create a role to meet these requirements:  1:The role is to be protected from unauthorized usage.  2:The password of the role is not to be embedded in the application source code or stored in a table.  Which method would you use to restrict enabling of such roles()

  • A、Create the role with global authentication.
  • B、Create the role with external authentication.
  • C、Create the role as a secure application role.
  • D、Create the role as a password-protected role.
  • E、Create a role and use Fine-Grained Access Control (FGAC) to secure the role.

正确答案:C

第5题:

You work as an application developer at Contoso.com. You use Microsoft .NET Framework 3.5 and Microsoft ADO.NET to develop an application. The user name and password that is kept by the connection string is stored directly in the code of the application. You want to make sure that the password in the connection string is as protected.   What should you do? ()

  • A、 Add the connection string to the Settings.settings file.
  • B、 Add connection string to the Web.config file and use protected configuration.
  • C、 Use the TRUE setting in the Persist Security Info keyword.
  • D、 Use the FALSE setting in the Persist Security Info keyword

正确答案:B

第6题:

You are developing an application that uses role-based security. The prinicipal policy of the application domain is configured during startup with the following code:AppDomain.CurrentDomain.SetPrincipalPolicy(PrincipalPolicy.WindowsPrincipal);  You need to restrict access to one of the methods in your application so that only members of the local Administrators group can call the method. Which attribute should you place on the method?()

  • A、 [PrincipalPermission (SecurityAction.Demand, Name = @"BUILTIN/Administrators")]
  • B、 [PrincipalPermission (SecurityAction.Demand, Role = @"BUILTIN/Administrators")]
  • C、 [PrincipalPermission (SecurityAction.Assert, Name = @"BUILTIN/Administrators")]
  • D、 [PrincipalPermission (SecurityAction.Assert, Role = @"BUILTIN/Administrators")]

正确答案:B

第7题:

On the Junos Pulse Access Control Service, you have created a role called Secret that you only want to provide to users who present a certificate.Using the admin GUI, which two features would you configure to satisfy this requirement?()

  • A、Sign-in Policy
  • B、Role Mapping Rule
  • C、Role Restrictions
  • D、Trusted Server CA

正确答案:B,C

第8题:

You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()

A. user name

B. password length

C. certificate

D. Host Checker


参考答案:C, D

第9题:

You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()

  • A、user name
  • B、password length
  • C、certificate
  • D、Host Checker

正确答案:C,D

第10题:

You want to create a role to meet these requirements: 1. The role is to be protected from unauthorized usage. 2. The password of the role is not to be embedded in the application source code or stored in a table. method would you use to restrict enabling of such roles()

  • A、Create the role with external authentication.
  • B、Create the role as a secure application role.
  • C、Create the role as a password-protected role.
  • D、Create a role and use Fine-Grained Access Control (FGAC) to secure the role

正确答案:B

更多相关问题