Which approach should you recommend?
You are designing an authentication plan for a SharePoint 2010 intranet site for a large enterprise. The site
administrator and the Active Directory (AD) administrator are concerned that the traffic on the SharePoint site
might cause performance issues related to site authentication. Average user page sessions typically last longer
than 15 minutes. You must design an authentication plan that provides the best possible performance and meets
the following requirements:
The plan must be able to accommodate 50,000 users.
.The existing infrastructure must be used as much as possible but the performance problem with user access must be prevented.
Which approach should you recommend?
Which access method should you use?
You have a SharePoint site collection that contains 100 sites. Each site contains 100 lists.
You need to retrieve the data from all of the lists. The data must be retrieved in the minimum amount of time.
Which access method should you use?
Which tool should you use?
You are developing a Windows Embedded Standard device. You have a USB Flash device that is marked as “removable.” You need to ensure that this device can be used to start Windows Embedded Standard. Which tool should you use?
Which format should you use?
Your company has Windows Mobile 6.5 devices that support Secure Digital High Capacity (SDHC). You receive a shipment of 8-GB SDHC cards for the Windows Mobile devices. On your Windows 7 computer, you need to format the SDHC cards to provide access to the entire 8 GB of memory from the Windows Mobile devices.
Which format should you use?
How should you design the timer job?
You are designing an application that will use a timer job that will run each night to send documents to a
SharePoint 2010 Records Center site for archiving. The security on the site requires higher privileges than those
normally associated with the application. The security requirements for this application specify that:
It must not require customized storage of the user credentials.
.The user token used for security access must expire within 24 hours unless specifically refreshed to prevent
extended or unintended use over time.
.The security mechanism must require a two-way trust to prevent unauthorized activity between domains.
.The application must use the SharePoint object model to accomplish this.
You need to design the application to support these security requirements.
How should you design the timer job?
What should you do first?
You plan to create a custom Web Part that displays items from a custom SharePoint list named Project.
You need to ensure that you can access the list by using strongly-typed objects in Microsoft Visual Studio 2010.
What should you do first?
Which three actions should you perform?
You are configuring a Windows Embedded Standard run-time image. The destination device uses a third-party video card. There is currently no component available for this video card. You need to include support for the video card in your run-time image. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
What should you do?
Your company has a Microsoft Exchange Server 2007 Service Pack 2 (SP2) environment with Enterprise client access licenses (CALs) installed. Employees have Windows Mobile 6.5 devices. You manage the devices by using Microsoft Exchange ActiveSync. You deploy a certificate to the Windows Mobile devices, and configure an Exchange ActiveSync policy to allow only applications with this certificate to run on the Windows Mobile devices. You develop a custom Windows Mobile application. You deploy the application to the Windows Mobile devices. The application does not run. You need to ensure that the application can run on the Windows Mobile devices.
What should you do?
What should you do?
Your company has a Microsoft Exchange Server 2007 Service Pack 2 (SP2) environment with Enterprise client access licenses (CALs) installed. Employees have Windows Mobile 6.5 devices. You manage the devices by using Microsoft Exchange ActiveSync. You deploy a certificate to the Windows Mobile devices, and configure an Exchange ActiveSync policy to allow only applications with this certificate to run on the Windows Mobile devices. You develop a custom Windows Mobile application. You deploy the application to the Windows Mobile devices. The application does not run. You need to ensure that the application can run on the Windows Mobile devices.
What should you do?
Which authentication approach should you recommend?
You are designing a SharePoint 2010 application that contains a Web Part. The Web Part must connect to an
RSS data stream provided by a Web service. The Web service is on another server in the domain. You need to
recommend an authentication approach that meets the following requirements:
SharePoint users must not be required to supply additional credentials for the Web service.
.Standard authentication systems available to SharePoint 2010 must be used.
Which authentication approach should you recommend?