Which five actions should you include?

You are an enterprise application developer. You are creating a Web service by using ASP.NET. The Web service estimates insurance premiums based on values passed by the client application. The Web server is on the perimeter network. The Web server uses .NET Remoting to communicate to components on an application server that is on the corporate network. The components on the application server use Microsoft Windows Integrated security to authenticate to the database server.
The perimeter network is configured to ensure that the following restrictions are imposed:

Only port 80 is open between the perimeter network and the external network. Application-specific ports might be opened between the perimeter network and the internal network when necessary.

You need to prepare a deployment verification list and a production verification list. Which five actions should you include? (Each correct answer presents part of the solution. Choose five.)

You are an enterprise application developer. You are creating a Web service by using ASP.NET. The Web service estimates insurance premiums based on values passed by the client application. The Web server is on the perimeter network. The Web server uses .NET Remoting to communicate to components on an application server that is on the corporate network. The components on the application server use Microsoft Windows Integrated security to authenticate to the database server.
The perimeter network is configured to ensure that the following restrictions are imposed:

Only port 80 is open between the perimeter network and the external network. Application-specific ports might be opened between the perimeter network and the internal network when necessary.

You need to prepare a deployment verification list and a production verification list. Which five actions should you include? (Each correct answer presents part of the solution. Choose five.)

A.
Verify that the Web server is a member of the domain.

B.
Verify that the application server is a member of the domain.

C.
Create a SQL user name and password for the application.

D.
Open a port between the perimeter network and the internal network.

E.
Verify that the .NET Framework is installed on the Web server.

F.
Verify that the .NET Framework is installed on the application server.

G.
Verify that the .NET Framework is installed on the database server.

H.
Verify that IIS is installed on the Web server.

I.
Verify that IIS is installed on the application server.



Leave a Reply 0

Your email address will not be published. Required fields are marked *