Which two actions should you perform?

You create Web-based client applications. You create a Web-based application for your company. Partner companies will also access the application. You evaluate the deployment plan as shown in the following exhibit. (Refer to the Exhibit.) Company policy states that permission is required to open port 80 and port 443 on the company firewall. The ports are to be opened only to specified servers. This policy applies to the firewall that separates the red zone from the perimeter network. This policy also applies to the firewall that separates the perimeter network from the intranet. Port 80 is already open in the outer firewall. You need to modify the deployment plan to meet the company policy. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

You create Web-based client applications. You create a Web-based application for your company. Partner companies will also access the application. You evaluate the deployment plan as shown in the following exhibit. (Refer to the Exhibit.) Company policy states that permission is required to open port 80 and port 443 on the company firewall. The ports are to be opened only to specified servers. This policy applies to the firewall that separates the red zone from the perimeter network. This policy also applies to the firewall that separates the perimeter network from the intranet. Port 80 is already open in the outer firewall. You need to modify the deployment plan to meet the company policy. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

A.
Ask the firewall administrator to open port 80 in the firewall that separates the perimeter network from the intranet to the business servers.

B.
Ask the firewall administrator to open port 80 in the firewall that separates the perimeter network from the intranet to the business servers and the database server.

C.
Add a Web service layer to the business servers.

D.
Move the business servers into the perimeter network.

E.
Configure the database server to use port 80.

F.
Make the Web server farm a member of the Active Directory domain.



Leave a Reply 0

Your email address will not be published. Required fields are marked *