1.
You are an enterprise application developer. You plan to create a data access layer for an application. The application will store the data in a relational database. The application supports multiple database
implementations. The application must use the vendor-provided database interaction component libraries whenever they are available. You need to identify a strategy to access data that supports these criteria. Which strategy should you use?
2.
You are an enterprise application developer. You are working on an accounting application. The application is designed in a modular manner. Each module provides a different set of accounting features. The modules are
implemented as a set of component assemblies. The module versions will be upgraded with new features and bug fixes in a regular maintenance release schedule. You need to ensure that the application is configured to
use the updated versions of the modules.
What should you do?
3.
You are an enterprise application developer. You are designing a monitoring mechanism for a Web service.
The Web service uses a custom header for authentication. You must send an e- mail message to the server administrators whenever the number of consecutive failed authentication attempts reaches three. You need to design the monitoring mechanism by using the minimum amount of development effort. What should you do?
4.
You are an enterprise application developer. You are designing a monitoring mechanism for an enterprise application. You need to ensure that the monitoring mechanism meets the following requirements: Logs errors
and warningsConfigures source for eventsEnables logging for particular countersTraces the execution path of a process through multiple physical tiers Which monitoring mechanism should you use?
5.
You are an enterprise application developer. You create an application to provide an enterprise- wide barcode printing solution. You are developing a component that contains a method named InitializePrinter. The method
will call a private function named IsPrinterLicensed to verify the license of the printer for the application. You need to ensure that the exceptions raised by the IsPrinterLicensed function bubble up to the application that
calls the InitializePrinter method.
You also need to ensure that the exceptions contain contextual information. Which code segment should you use?
6.
You are an enterprise application developer. You are developing a distributed application that contains a business object. The client applications must be able to access the business object from another process. The
business object implementation must minimize serialization. You need to extend a class to implement the business object. Which class should you use?
7.
You are an enterprise application developer. You plan to review the design of a component. The component is used to process purchase orders from distributors. You need to ensure that the component meets the following
requirements: It is highly available.It is transaction-oriented.It is accessible over the company intranet.It requires the minimum amount of coding effort. What should you do?
8.
You are an enterprise application developer. You design an application that communicates with other applications through .NET Remoting. The application has a large DataSet. You need to improve the performance of the application. What should you do?
9.
You are an enterprise application developer. You plan to create an application that contains a user interface.
The user interface calls the business layer Web Services Enhancements (WSE) Web service. You also plan to design an integration testing strategy for the application. You need to track and correlate the messages that are exchanged between the components by using the minimum amount of coding effort. What should you do?
10.
You are an enterprise application developer for a media organization. You create a Web service that provides large multimedia files to subscribers. The subscribers use a variety of client applications and browsers to access the content. You discover that during peak activity hours, multiple client applications simultaneously subscribe to the data. You need to ensure that the Web service meets the following requirements: It adheres to the WS-Security standards.It processes requests in a time-efficient manner. What should you do?