What should you do?

You work as a Microsoft BizTalk Server 2006 Architect at Domain.com. Domain.com has several business partners. Domain.com expects its to change some of its business partners within the next year. Domain.com wants to deploy a large public-facing BizTalk application that must include all its current business partners.

You are instructed design the deployment strategy.

The Domain.com CEO is concerned that a business partner may implement a Denial of Service attack when
the relationship with that business partner is terminated. You need to address this concern in your design.

What should you do? (Choose all that apply.)

You work as a Microsoft BizTalk Server 2006 Architect at Domain.com. Domain.com has several business partners. Domain.com expects its to change some of its business partners within the next year. Domain.com wants to deploy a large public-facing BizTalk application that must include all its current business partners.

You are instructed design the deployment strategy.

The Domain.com CEO is concerned that a business partner may implement a Denial of Service attack when
the relationship with that business partner is terminated. You need to address this concern in your design.

What should you do? (Choose all that apply.)

A.
Use Health and Activity Tracking (HAT) queries to examine messages that pass through the BizTalk application.

B.
Configure the Domain.com firewall to only accept ingress traffic from the IP addresses of Domain.com business partners.

C.
Set the Authentication Required property on all Receive Ports.

D.
Limit the size of incoming messages that BizTalk can receive.

Explanation:
You can set the Authentication Required property on all Receive Ports to ensure that only messages from parties that BizTalk is aware of will be accepted.
You can also limit the size of incoming messages to minimize the load on your system when a Denial of Service attack is attempted.

Incorrect Answers:
A: Health and Activity Tracking (HAT) queries will allow you to monitor of suspicious messages only after they have entered the BizTalk application.
B: You would need to reconfigure the IP address filter on the firewall once a business partner changes. This would not really be a design feature but an administrative task.



Leave a Reply 0

Your email address will not be published. Required fields are marked *