What conclusion can you draw?

You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. The design of applications forms part of your responsibilities at Domain.com. You are currently developing a Microsoft ASP.NET Web application that makes use of a data access component to access data in a Microsoft SQL Server 2005 database. This data access component makes use of Microsoft .NET Remoting to enable access over Transmission Control Protocol (TCP) port 9001. You must develop the Microsoft ASP.NET application to enable users to access data in the database via the Web application only. The following table illustrates the logical and physical design aspects that you should take into account when deciding whether the design meets with the security requirement:

What conclusion can you draw?

You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. The design of applications forms part of your responsibilities at Domain.com. You are currently developing a Microsoft ASP.NET Web application that makes use of a data access component to access data in a Microsoft SQL Server 2005 database. This data access component makes use of Microsoft .NET Remoting to enable access over Transmission Control Protocol (TCP) port 9001. You must develop the Microsoft ASP.NET application to enable users to access data in the database via the Web application only. The following table illustrates the logical and physical design aspects that you should take into account when deciding whether the design meets with the security requirement:

What conclusion can you draw?

A.
The design meets the security requirement.

B.
The design does not meet the security requirement.
The data access component should be deployed to an application server on the intranet.

C.
The design does not meet the security requirement.
The data access component should be deployed to the database server on the intranet.

D.
The design does not meet the security requirement.
The data access component should be deployed to an application server on the perimeter network.

Explanation:
It is mentioned in the question that the Web server is placed in the perimeter network and that only HTTP traffic is allowed to the Web server. This means that users can only send HTTP requests to the Web server. Even though the data access component does exist on the Web server, it will still require access through an IPC channel and IPC supports communication on the same computer only. Thus the design currently meets the security requirement.
Incorrect answers:
B: There is no need to deploy the data access component to application server on the intranet. The Web application connects to the data access component over IPC and IPC supports communication on the same computer only.
C: There is no need to deploy the data access component to database server on the intranet. The Web application connects to the data access component over IPC and IPC supports communication on the same computer only.
D: There is no need to deploy the data access component to application server on the perimeter network. The Web application connects to the data access component over IPC and IPC supports communication on the same computer only.

VB, Designing and Developing a Component(10 Questions)



Leave a Reply 0

Your email address will not be published. Required fields are marked *