What should you include in the recommendation?

You have a SharePoint Server 2010 Service Pack 1 (SP1) server farm that hosts intranet sites for
internal users. The farm uses Active Directory for authentication. The farm contains two web
applications named WebApp1 and WebApp2 that have the following configurations:
• WebApp1 is used by the finance department and uses the URL http://finance.contoso.com.
• WebApp2 is used by the marketing department and uses the URL http://marketing.contoso.com.
You have a Microsoft SharePoint Online environment. External users use the environment to access
content.
You plan to implement SSL in WebApp1.
You need to recommend a solution to ensure that the internal users can access WebApp1 by using
HTTP and HTTPS.
What should you include in the recommendation?

You have a SharePoint Server 2010 Service Pack 1 (SP1) server farm that hosts intranet sites for
internal users. The farm uses Active Directory for authentication. The farm contains two web
applications named WebApp1 and WebApp2 that have the following configurations:
• WebApp1 is used by the finance department and uses the URL http://finance.contoso.com.
• WebApp2 is used by the marketing department and uses the URL http://marketing.contoso.com.
You have a Microsoft SharePoint Online environment. External users use the environment to access
content.
You plan to implement SSL in WebApp1.
You need to recommend a solution to ensure that the internal users can access WebApp1 by using
HTTP and HTTPS.
What should you include in the recommendation?

A.
service application groups

B.
Remote BLOB Storage (RBS)

C.
the Access Services service application

D.
Microsoft Visual Studio 2010

E.
the Secure Store Service service application

F.
Information Rights Management (IRM)

G.
user policies

H.
managed accounts

I.
cross-firewall access zones

J.
Network Access Protection (NAP)
K.
SharePoint Health Analyzer
L.
a BLOB cache
M.
Active Directory Federation Services (AD FS)
N.
Network Load Balancing (NLB)
O.
an ASP.NET Membership Database
P.
alternate access mappings



Leave a Reply 0

Your email address will not be published. Required fields are marked *