PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What should you do?

You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5.
You evaluate the design of a Microsoft SQL Server 2005 database that stores data for the application.
Several queries share a common SELECT statement.
The only difference between the SELECT statement in each query is a parameter that is used in the WHERE clause.
The SELECT statement is used in joins and subqueries.
You need to ensure that the database queries can be easily maintained.
What should you do?

What should you do ?

You create a Windows application by using the .NET Framework 3.5. The application is used by employees to submit timesheets and to generate reports. The application must contain a Managers role and an Employees role. You have the following security requirements:

* Members of the Managers role can approve the timesheets.
* Members of the Employees role can generate reports only if they are a member of the local administrators group.
* Members of the Managers role can access the application from untrusted domains.

You need to design a security model to meet the design requirements. What should you do ?

Which hosting environment should you use?

You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5.
You configure the Windows Communication Foundation (WCF) service to be exposed by using the HTTP and TCP endpoints.
You plan to deploy the WCF service. You need to identify the host environment that provides the following services:
– Message-based activation
– Health management
– Process recycling capabilities
Which hosting environment should you use?

What should you do?

You are creating a Windows application by using the .NET Framework 3.5. The application is used to browse through purchase orders. The purchase order data is stored in a file on the localcomputer. The application synchronizes purchase order data with a central database by using a Web service. You discover that other
applications on the computer can access the purchase order data. You need to ensure that the purchase order data can be accessed only by the Windows application. What should you do?

What should you do?

You are an enterprise application developer. You are designing an event logging mechanism for an application. The application will be installed on all computers in your company. The company policy has the following requirements: Developers must be informed of critical events.Help-desk technicians must have access to all events on each computer. You need to design the event logging storage strategy that complies with the company policy.
What should you do?

What should you do?

You are creating a Windows application by using the .NET Framework 3.5. The application will be
installed on Windows Vista computers.
The application includes tasks to change the application settings. Elevated privileges are required to
complete a particular task.
The application must differentiate the task that requires elevated privileges to meet the Windows Vista
User Account Control guidelines.
You need to ensure that the application indicates the task to the user before the user initiates the task.
What should you do?

What should you do?

You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. The application includes multiple components.
The components communicate by passing messages to each other. You are planning to update the application to meet new business requirements.
You need to document the application logic. You also need to ensure that the documentation captures the details of the component interaction.
What should you do?

What should you do?

You create a Windows application by using the .NET Framework 3.5. The application is used in a corporate environment to maintain the contact information of all employees. You create a Windows client application to browse through employee contacts information. All data is stored on a central Microsoft SQL Server 2008
database, and smart clients are deployed on each computer. You discover that users often browse through the same contacts data several times. You need to prevent unnecessary round trips to bind the data from the server. What should you do?