1.
You are an enterprise application developer. You are designing monitoring features for an ASP.NET Web- based application.
The monitoring features must meet the following requirements:
2.
You are an enterprise application developer. You are creating a client-side service component for an application. The application runs in the security context of the user. The component must store
proprietary information in a secure registry store that requires system service-level access by using the ACL of the user. You need to ensure that the component meets the requirement of the application with a minimum level of security risk. What should you do?
3.
You are an enterprise application developer. You review the design of a component. The component processes billing for an online store application. The application is developed by using
ASP.NET 2.0. The component must be highly available during business hours. You need to ensure that the component meets the following requirements: It reads all orders that must be billed. It sends an e-mail
notification to the users.It receives confirmation for credit card and bank account transactions. What should you do?
4.
You are an enterprise application developer. You are creating an application that has a layered architecture as shown in the following diagram. A component that resides in the workflow layer manages transactions across one or more activities in the business logic layer. You need to make modifications to the component. You need to identify the layers that might require modification when the component in the workflow layer is modified. Which two layers should you identify? (Each correct answer presents part of the solution. Choose two.)
5.
You are an enterprise application developer. You are creating a component that will be deployed as part of a class library. The component must meet the following specifications:
6.
You are an enterprise application developer. You are designing monitoring features for an ASP.NET Web- based application.
The monitoring features must meet the following requirements:
7.
You are an enterprise application developer. You are creating an application to manage the inventories of 1,000 stores in geographically dispersed locations. The stores are connected to the main office through a secure
network infrastructure. Inventory data from the store servers must be consolidated at the main office everyday.
The main office initiates the consolidation by calling a component at the store. Transactional integrity must be maintained during consolidation. Security policy requires the application to propagate Microsoft Windows
security context throughout the system to ensure authorization and authentication. Security policy does not permit Web servers at the stores. You need to recommend a reusable component technology that permits data
from the store servers to be consolidated at the main office. You also need to ensure that the security policy requirements are met.
What should you recommend?
8.
You are an enterprise application developer. You are working on a component in an application that provides a business workflow solution. The component will be used as a workflow to manage purchase requisitions. You
discover that a WebException is raised when you use the GetApprover private method to invoke a method of a
Web Service. You need identify a code that allows the component to invoke the following methods: The GetDefaultApprover method if a WebException is raisedThe ReportError method if any other exception is raisedThe GoToNextStep method if no exception is raised Which code segment should you use?
9.
You are an enterprise application developer. You develop an application by using Microsoft Visual Studio .NET 2005 and .NET Framework 2.0. The application will use a custom authentication mechanism. Authentication
information will be stored in a Microsoft SQL Server 2005 database table. You design the table and stored procedure that will be used for authentication. You need to ensure that the stored procedure design is as secure as possible.
What should you do?
10.
You are an enterprise application developer. You are creating a .NET Remoting component. The Version 1.0 of the component is deployed as a well-known server-activated object. The strong- named component is installed
into the global assembly cache. Ten distributed applications in your company utilize the component, and each application has an independent schedule for upgrades and
deployment. You add new features to the component. These additions will change the signatures of the public methods on the component. You need to devise a deployment strategy for the component. What should you do?