AllExam Dumps

DUMPS, FREE DUMPS, VCP5 DUMPS| VMWARE DUMPS, VCP DUMPS, VCP4 DUMPS, VCAP DUMPS, VCDX DUMPS, CISCO DUMPS, CCNA, CCNA DUMPS, CCNP DUMPS, CCIE DUMPS, ITIL, EXIN DUMPS,


READ Free Dumps For Microsoft- 70-576





Question ID 10132

You are planning security for a SharePoint 2010 intranet site. A sub site for the human resources (HR) department contains a list of salary information. All the HR department employees are in an Active Directory (AD) group named SharePoint HR. The SharePoint HR AD group has been granted Read access to the sub site. You have the following requirements: Access to the list should be handled only through the HR department group. The group membership of the AD HR group should be used to specify the site permissions. The department’s administrative assistant should not have access to view the salary list. You need to ensure that permissions are configured on the sub site to meet these requirements. Which plan should you recommend?

Option A

Remove the assistant from the SharePoint HR AD group. Give the assistant individual Read access to the site. Modify the salary list permissions, removing the assistant from the list

Option B

Modify the salary list permissions, explicitly denying the assistant Read access to the salary list

Option C

Modify the salary list permissions, remove the SharePoint HR group from the list of users and groups who have been granted any sort of access to the list. Grant each employee of the HR department individual Read access to the salary list, with the exception of the assistant.

Option D

Modify the salary list permissions, explicitly denying the SharePoint HR group Read access to the salary list. Grant each employee of the HR department individual Read access to the salary list, with the exception of the assistant

Correct Answer A
Explanation


Question ID 10133

You are designing a SharePoint 2010 application and a Web application. You need to design a security model for the application that requires users to be authenticated through the Windows Live ID service without using a custom provider. Which type of authentication should you recommend?

Option A

Claims-based authentication

Option B

Kerberos

Option C

NTLM

Option D

Forms-based authentication

Correct Answer A
Explanation

Send email to admin@getfreedumps for new dumps request!!!