.NET Tutorials, Forums, Interview Questions And Answers
Welcome :Guest
 
Sign In
Register
 
Win Surprise Gifts!!!
Congratulations!!!


Top 5 Contributors of the Month
david stephan

Home >> Interview Question >> SharePoint >> Post New Question Subscribe to Interview Questions


What security levels are assigned to users?

Posted By :Gowthammanju     Posted Date :November 30, 2011    Points :40   Category :SharePoint 
Security levels are assigned by the administrator who is adding the user. There are four levels by default and additional levels can be composed as necessary.

Reader - Has read-only access to the Web site.
Contributor - Can add content to existing document libraries and lists.
Web Designer - Can create lists and document libraries and customize pages in the Web site.
Administrator - Has full control of the Web site.



You can also find related Interview Question to What security levels are assigned to users?  below: 

What security levels are assigned to users for a SharePoint Website?

  
Security levels are assigned by the administrator who is adding the user. There are four levels by default and additional levels can be composed as necessary.
* Reader - Has read-only access to the Web site.
* Contributor - Can add content to existing document libraries and lists.
* Web Designer - Can create lists and document libraries and customize pages in the Web site.
* Administrator - Has full control of the Web site. (More...)

What security levels are assigned to users?

  
Security levels are assigned by the administrator who is adding the user. There are four levels bydefault and additional levels can be composed as necessary.

Reader - Has read-only access to the Web site.
Contributor - Can add content to existing document libraries and lists.
Web Designer - Can create lists and document libraries and customize pages in the Web site.
Administrator - Has full control of the Web site. (More...)

Describe the three levels of data abstraction?

  
The are three levels of abstraction:
1.Physical level: The lowest level of abstraction describes how data are stored.

2.Logical level: The next higher level of abstraction, describes what data are stored in database and what relationship among those data.

3.View level: The highest level of abstraction describes only part of entire database. (More...)

ASP.NET Security Fundamental Operations

  
Security in the context of ASP.NET application involves 3 fundamental operations [1,4,5]:
. Authentication: the process of validating the identity of a user to allow or deny a request [4,9,10]. This involves accepting credentials (e.g. username and password) from the users and validating it against a designated authority. After the identity is verified and validated, the user is considered to be legal and the resource request is fulfilled. Future request from the same user ideally are not subject to the authentication process until the user logs out of the web application.
. Authorization: the process of ensuring that users with valid identity are allowed to access specific resources.
. Impersonation: this process enables an application to ensure the identity of the user, and in turn make request to the other resources. Access to resources will be granted or denied based on the identity that is being impersonated. In other words, impersonation enables a server process to run using the security credentials of the client [6,9]. Thus, the ASP.NET applications are capable to execute the identity of client on whose behalf they are operating.
Since there are a lot of ASP.NET security features to cover, this paper will only focus on authentication in ASP.NET.


Shashi Ray (More...)

Difference of ASP and ASP.NET Security Flow

  
The security flow for ASP.NET page request is different from the classic ASP security flow. In ASP, IIS impersonates the authenticated user by default, and in ASP.NET, the developer has more control over configuring security at different level [2].


Shasi Ray (More...)

What is CODE Access security?

  
CAS is part of .NET security model that determines whether or not a piece of code is allowed to run and what resources it can use while running. Example CAS will allow an application to read but not to write and delete a file or a resource from a folder. (More...)

How can we change priority and what the levels of priority are provided by .NET ?

  
Thread Priority can be changed by using Threadname.Priority = ThreadPriority.Highest. In the sample provided look out for code where the second thread is ran with a high priority.
Following are different levels of Priority provided by .NET :-
. ThreadPriority.Highest
. ThreadPriority.AboveNormal
. ThreadPriority.Normal
. ThreadPriority.BelowNormal
. ThreadPriority.Lowest (More...)

What is CODE Access security?

  
Code Access Security (CAS), in the Microsoft .NET framework, is Microsoft's solution to prevent untrusted code from performing privileged actions.

It performs following function
1. Defines permissions and permission sets that represent the right to access various system resources.
2. Enables administrators to configure security policy by associating sets of permissions with groups of code (code groups).
3. Enables code to request the permissions it requires in order to run, as well as the permissions that would be useful to have, and specifies which permissions the code must never have.
4. Grants permissions to each assembly that is loaded, based on the permissions requested by the code and on the operations permitted by security policy.
5. Enables code to demand that its callers have specific permissions.
6. Enables code to demand that its callers possess a digital signature, thus allowing only callers from a particular organization or site to call the protected code.
7. Enforces restrictions on code at run time by comparing the granted permissions of every caller on the call stack to the permissions that callers must have. (More...)

How is security managed in SharePoint?

  
Security can in SharePoint be handled at the machine, domain, or SharePoint level. (More...)

How do I invite users to join a Windows SharePoint Services Site? Is the site secure?

  
SharePoint-based Web sites can be password-protected to restrict access to registered users, who are invited to join via e-mail. In addition, the site administrator can restrict certain members' roles by assigning different permission levels to view post and edit. (More...)

With respect to security, which one is the better choice?.Net or J2EE? Explain?

  
As per majority programmers .NET is the best one which have single vendor compare to, the ease of use, more use friendly, you can send any problem ,it'll be solved. (More...)

Explain about security of the Ajax based web applications?

  
The XMLHttpRequest object is subjected to the browsers security sandbox. Any resources requested by the XMLHttpRequest object must reside within the same domain from which the calling script originated from which the calling script requested. XMLHttpRequest cannot request services due to security restriction, outside the domain from which the script was originally served. (More...)

Quick Links For Interview Questions Categories:
ASP.Net Windows Application   .NET Framework   C#   VB.Net   ADO.Net  
Sql Server   SharePoint   Silverlight   OOPs   JQuery   JavaScript/VBScript
Biztalk Patten/Practices .IIS WCF WPF WWF
Networking Aptitude Others   All      

Find questions, FAQ's and their answers related to .NET, C#, Vb.Net, Sql Server and many more.

 
Now you can find lots of .NET, C#, Vb.Net, SQL Server,Windows, ASP.Net related Questions and their Answers here at www.dotnetspark.com. Our aim is to help you pass your certification Exams (MCP, MCSD, MCAD etc.,) with flying scores and get good name in your company.

So, Start looking our Interview Question section daily and improve your .NET Skills. You can also help others by posting Interview Questions and their Answers in this section.


Hall of Fame    Twitter   Terms of Service    Privacy Policy    Contact Us    Archives   Tell A Friend