1.
You are an enterprise application developer. You design a data access component that interacts with a
Microsoft SQL Server database. The component uses a database connection string. The database connection string is stored in clear text in the ConnectionStrings section of the application configuration file. During testing,
you discover that the component might be vulnerable to SQL injection attacks. You need to adopt a strategy to protect the component from SQL injection attacks.
What should you do?
2.
You are an enterprise application developer. You are implementing a new component for an application. The component accesses a database to populate a list of customer objects and exposes a method that is named
GetAllCustomers. The component uses a design pattern to access the database only on an as-needed basis. A caching mechanism exists in a lower tier of the application architecture. The component must not cache data.
You need to implement the logic for populating a list of customer objects by using a database query. You also need to ensure that you meet the company guidelines for the component design pattern. What should you do?
3.
You are an enterprise application developer. You are creating the first version of an application to manage rich text documents.
The application must meet the following design requirements:
4.
You are an enterprise application developer. You are creating an application that has a layered architecture as shown in the following diagram. A component that resides in the workflow layer manages transactions across one or more activities in the business logic layer. You need to make modifications to the component. You need to identify the layers that might require modification when the component in the workflow layer is modified. Which two layers should you identify? (Each correct answer presents part of the solution. Choose two.)
5.
You are an enterprise application developer. You are creating a .NET Remoting component. The Version 1.0 of the component is deployed as a well-known server-activated object. The strong- named component is installed
into the global assembly cache. Ten distributed applications in your company utilize the component, and each application has an independent schedule for upgrades and deployment. You add new features to the component. These additions will change the signatures of the public methods on the component. You need to devise a deployment strategy for the component. What should you do?
6.
You are an enterprise application developer. You are creating a component that processes loan requests. Your component will be used inside Microsoft Windows Forms client applications. The loan request form is complex
and time consuming to complete. Loan data is saved to a Microsoft SQL Server 2005 database. You need to ensure that in case of a system failure the loan officer does not need to re-enter any loan data. What should you do?

 
7.
You are an enterprise application developer. You create a component that generates medical documents. Your component is used by multiple document management systems. Users generate documents throughout the entire day and most documents are generated during business hours. You notice that user load is increasing and performance is degrading. You need to identify sections of code on which to focus performance tuning efforts. Which two actions should you recommend? (Each correct answer presents part of the solution. Choose two.)
8.
You are an enterprise application developer. You are creating a component that will be used in an order fulfillment process.
The component performs the following two tasks:
9.
You are an enterprise application developer. You are creating a component that will be deployed as part of a class library. The component must meet the following specifications:
10.
You are an enterprise application developer. You create a component that executes queries against Microsoft SQL Server. The queries are executed inside the scope of a transaction. The transaction is started by using the
SqlTransaction object. The code executes the query inside a Try block. You need to create an exception handling mechanism that rolls back the transaction under any error condition and notifies the caller of the error.
What should you do?