Which authorizations should you redesign?

You are designing an enterprise‐level Windows Communication Foundation (WCF) application. User
accounts will migrate from the existing system. The new system must be able to scale to
accommodate the increasing load.
The new servers are experiencing significant stress under load of large‐scale role changes.
You need to ensure that the application can handle the stress.
Which authorizations should you redesign? (Each correct answer presents a complete solution.
Choose all that apply.)

You are designing an enterprise‐level Windows Communication Foundation (WCF) application. User
accounts will migrate from the existing system. The new system must be able to scale to
accommodate the increasing load.
The new servers are experiencing significant stress under load of large‐scale role changes.
You need to ensure that the application can handle the stress.
Which authorizations should you redesign? (Each correct answer presents a complete solution.
Choose all that apply.)

A.
Role‐based approach

B.
Identity‐based approach

C.
Resource‐based trusted subsystem model

D.
Resource‐based impersonation/delegation model



Leave a Reply 6

Your email address will not be published. Required fields are marked *


Janis

Janis

The answer should be
A. Role-based approach
B. Identity-based approach

Deno

Deno

a and b are correct

Saeid

Saeid

A.B 93 is the same