What should you conclude?

You create Web-based client applications. You are designing an extranet site for a company of trading partners.

You decide to use the following technologies:

Windows Authentication
XML to transfer data between the company and the traders

Before implementation, these technologies must be validated. You propose the following approach to perform the validation:

Coordinate a test set of Active Directory accounts for one trading partner. Provide the trading partner access to a test site that has logon facility. Distribute the XML schema that permits the partner to access data.

You need to evaluate whether the approach validates the proposed technology successfully. What should you conclude?

You create Web-based client applications. You are designing an extranet site for a company of trading partners.

You decide to use the following technologies:

Windows Authentication
XML to transfer data between the company and the traders

Before implementation, these technologies must be validated. You propose the following approach to perform the validation:

Coordinate a test set of Active Directory accounts for one trading partner. Provide the trading partner access to a test site that has logon facility. Distribute the XML schema that permits the partner to access data.

You need to evaluate whether the approach validates the proposed technology successfully. What should you conclude?

A.
The approach validates the use of the proposed technology for the application.

B.
The approach does not validate the use of the proposed technology for the application. The company and the partner need to create test applications. The test applications need to read data in the proposed XML schema to establish the validation.

C.
The approach does not validate the use of the proposed technology for the application. The company and the partner need to coordinate their Active Directory tree into a shared Active Directory forest.

D.
The approach does not validate the use of the proposed technology for the application. You must either use an existing publicly documented XML schema or register the shared XML schema by using an authentication site.



Leave a Reply 0

Your email address will not be published. Required fields are marked *