Which two actions should you perform?

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2008 R2. The domain contains three servers
that run Windows Server 2012. The servers are configured as shown in the following table.

Server1 and Server2 are configured in a Network Load Balancing (NLB) cluster. The NLB cluster hosts a website named Web1 that uses an application pool named

App1. Web1 uses a database named DB1 as its data store. You create an account named User1. You configure User1, as the identity of App1. You need to ensure
that contoso.com domain users accessing Web1 connect to DB1 by using their own credentials. Which two actions should you perform? (Each correct answer
presents part of the solution. Choose two.)

Your network contains an Active Directory domain named contoso.com. All domain controllers run Windows Server 2008 R2. The domain contains three servers
that run Windows Server 2012. The servers are configured as shown in the following table.

Server1 and Server2 are configured in a Network Load Balancing (NLB) cluster. The NLB cluster hosts a website named Web1 that uses an application pool named

App1. Web1 uses a database named DB1 as its data store. You create an account named User1. You configure User1, as the identity of App1. You need to ensure
that contoso.com domain users accessing Web1 connect to DB1 by using their own credentials. Which two actions should you perform? (Each correct answer
presents part of the solution. Choose two.)

A.
Configure the delegation settings of Server3.

B.
Create a Service Principal Name (SPN) for User1.

C.
Configure the delegation settings of User1.

D.
Create a matching Service Principal Name (SPN) for Server1 and Server2.

E.
Configure the delegation settings of Server1 and Server2.



Leave a Reply 2

Your email address will not be published. Required fields are marked *


Chris

Chris

https://msdn.microsoft.com/en-us/library/ff647248.aspx
What is the difference between impersonation and delegation?
Impersonation flows the original caller’s identity to back-end resources on the same computer. Delegation flows the original caller’s identity to back-end resources on computers other than the computer running the service.