READ Free Dumps For Microsoft- 70-576
Question ID 10132 | You are planning security for a SharePoint 2010 intranet site. A sub site for the human resources (HR) department contains a list of salary information. All the HR department employees are in an Active Directory (AD) group named SharePoint HR. The SharePoint HR AD group has been granted Read access to the sub site. You have the following requirements: Access to the list should be handled only through the HR department group. The group membership of the AD HR group should be used to specify the site permissions. The department’s administrative assistant should not have access to view the salary list. You need to ensure that permissions are configured on the sub site to meet these requirements. Which plan should you recommend? |
Option A | Remove the assistant from the SharePoint HR AD group. Give the assistant individual Read access to the site. Modify the salary list permissions, removing the assistant from the list |
Option B | Modify the salary list permissions, explicitly denying the assistant Read access to the salary list |
Option C | Modify the salary list permissions, remove the SharePoint HR group from the list of users and groups who have been granted any sort of access to the list. Grant each employee of the HR department individual Read access to the salary list, with the exception of the assistant. |
Option D | Modify the salary list permissions, explicitly denying the SharePoint HR group Read access to the salary list. Grant each employee of the HR department individual Read access to the salary list, with the exception of the assistant |
Correct Answer | A |
Question ID 10133 | You are designing a SharePoint 2010 application and a Web application. You need to design a security model for the application that requires users to be authenticated through the Windows Live ID service without using a custom provider. Which type of authentication should you recommend? |
Option A | Claims-based authentication |
Option B | Kerberos |
Option C | NTLM |
Option D | Forms-based authentication |
Correct Answer | A |