You are designing a Web application for a SharePoint 2010 system. You need to plan an authorization system
that meets the following requirements:
It must enforce uniform security throughout all site collections at the Web application or zone level.
It must use Windows authentication.
It must assign a role incorporating a collection of rights to individual SharePoint 2010 users or domain
groups.
It must specify the rights for a user or group in the Web application based on an Active Directory (AD) user
or
group account.
The rights should not be shared across other Web applications.
You need to design a plan that provides specific control of SharePoint object access and meets all
requirements.
Which approach should you recommend?
You are designing a SharePoint 2010 application that contains a Web Part. The Web Part must connect to an
RSS data stream provided by a Web service. The Web service is on another server in the domain. You need
to
recommend an authentication approach that meets the following requirements:
SharePoint users must not be required to supply additional credentials for the Web service.
Standard authentication systems available to SharePoint 2010 must be used.
Which authentication approach should you recommend?
You are designing an application that will use a timer job that will run each night to send documents to a
SharePoint 2010 Records Center site for archiving. The security on the site requires higher privileges than
those
normally associated with the application. The security requirements for this application specify that:
It must not require customized storage of the user credentials.
The user token used for security access must expire within 24 hours unless specifically refreshed to prevent
extended or unintended use over time.
The security mechanism must require a two-way trust to prevent unauthorized activity between domains.
The application must use the SharePoint object model to accomplish this.
You need to design the application to support these security requirements.
How should you design the timer job?
You are designing an authentication plan for a SharePoint 2010 intranet site for a large enterprise. The site
administrator and the Active Directory (AD) administrator are concerned that the traffic on the SharePoint site
might cause performance issues related to site authentication. Average user page sessions typically last longer
than 15 minutes. You must design an authentication plan that provides the best possible performance and
meets
the following requirements:
The plan must be able to accommodate 50,000 users.
The existing infrastructure must be used as much as possible but the performance problem with user
access
must be prevented.
Which approach should you recommend?
You are designing a knowledge base (KB) solution for a SharePoint 2010 Internet site for vendors and
employees
in your organization. The employees have Active Directory (AD) accounts. You have the following
requirements:
You must incorporate the existing Windows authentication system based on AD.
Vendors who have no Windows credentials must have access to the KB.
Content editors must be able to use their Windows credentials to log on to the site and publish the content.
You need to ensure that vendors and content editors can access the site.
Which approach should you recommend?
You are designing an extranet site using SharePoint 2010. This site must allow employees to log on to the
extranet site from home. They should use their corporate Active Directory credentials by typing their user name
and password into text boxes on a logon page on the site. After users log on, they should be redirected to the
site
home page. You need to meet these requirements with the least amount of configuration.
Which type of authentication should you design?
Your company has a SharePoint 2010 farm that has one Web application with multiple site collections. Your
team
needs to meet the following requirements:
Certain individuals need to have the "Full Control" permission set on every site collection in the Web
application.
Permissions must be set in a central location and should effect all current and future site collections.
Which approach should you recommend?
You are planning security for a SharePoint 2010 intranet site. A sub site for the human resources (HR)
department contains a list of salary information. All the HR department employees are in an Active Directory
(AD)
group named SharePoint HR. The SharePoint HR AD group has been granted Read access to the sub site.
You have the following requirements:
Access to the list should be handled only through the HR department group.
The group membership of the AD HR group should be used to specify the site permissions.
The department's administrative assistant should not have access to view the salary list.
You need to ensure that permissions are configured on the sub site to meet these requirements.
Which plan should you recommend?
You are designing a SharePoint 2010 application and a Web application. You need to design a security model
for
the application that requires users to be authenticated through the Windows Live ID service without using a
custom provider.
Which type of authentication should you recommend?
You are designing a SharePoint 2010 application. You have the following requirements:
Display sales data from a CRM system.
Authenticate users to the CRM system through their Windows credentials.
Eliminate multiple authentication requests.
You need to choose an authentication method that supports the requirements.
Which authentication method should you recommend?