logo

CuriousTab

CuriousTab

Discussion


Home Certification Microsoft Certification See What Others Are Saying!
  • Question
  • You plan to deploy your ASP.NET application over XYZ?s intranet. The application uses data retrieved from a Microsoft SQL Server database. You want to use SQL Server connection pooling to optimize performance. You also need to protect confidential data stored on the server while minimizing administrative costs. You need to configure security for your application. What should you do?


  • Options
  • A. Use Microsoft Windows authentication in the application. Enable impersonation for users to access the SQL Server database from your application.
  • B. Use Microsoft Windows authentication in the application. Use a single Windows account for users to access the SQL Server database from your application.
  • C. Use form-based authentication in the application. Use the system administrator (sa) SQL Server login for users to access the SQL Server database from your application.
  • D. Use form-based authentication in the application. Assign each user a separate SQL Server login to use to access the SQL Server database from your application.

  • Correct Answer
  • Use Microsoft Windows authentication in the application. Use a single Windows account for users to access the SQL Server database from your application. 

    Explanation

    We should only use one account to access the SQL Server database. This ensures that connection pooling is optimized.

     

    Incorrect Answers:

    A: We should only use a single account to access the SQL Server database.

    C: Form-based authentication is less secure. Furthermore, running as the System Administrator with the sa login would compromise security.

    D: Form-based authentication is less secure. Furthermore, creating a separate SQL Server login for each user is a daunting administrative task.


  • More questions

    • 1. Which two descriptions are correct about characteristics of IPv6 unicast addressing? (Choose two) A. Global addresses start with 2000::/3. B. Link-local addresses start with FF00::/10. C. Link-local addresses start with FE00:/12. D. There is only one loopback address and it is ::1.
    • Discuss
    • 2. What are the six OSPF route types?
    • Discuss
    • 3. How many non- overlapping channels are available with 802.11b?

    • Options
    • A. 3
    • B. 12
    • C. 23
    • D. 40
    • Discuss
    • 4. Which IEEE committee has been sanctioned by WAP and is called WPA2?
    • Discuss
    • 5. When a station sends a transmission to the MAC address ff : ff : ff : ff : ff : ff, what type of transmission is it?

    • Options
    • A. Unicast
    • B. Multicast
    • C. Anycast
    • D. Broadcast
    • Discuss
    • 6. In the operation of CSMA/CD, which host(s) have priority after the expiration of the backoff algorithm?

    • Options
    • A. All hosts have equal priority
    • B. The two hosts that caused the collision will have equal priority
    • C. The host that sent the jam signal after the collision
    • D. The host with the highest MAC address
    • Discuss
    • 7. What is the Classs A Private IP address space?
    • Discuss
    • 8. What is the Class C private IP address space?
    • Discuss
    • 9. To use VLSM, what capability must the routing protocols in use possess?

    • Options
    • A. Support for multicast
    • B. Multi-protocol support
    • C. Transmission of subnet mask information
    • D. Support for unequal load balancing
    • Discuss
    • 10. If you wanted administrators to see a message when logging into the router, which command would you use?

    • Options
    • A. message banner motd
    • B. banner message motd
    • C. banner motd
    • D. message motd
    • Discuss


    Comments

    There are no comments.

Enter a new Comment