Which test should you perform?
You are an enterprise application developer. You create a routing application that ascertains the best routes for shipment of containers.
The application contains a complex routing method that examines the following parameters:
* The weight of the containers
* The length of the trailer that hauls the containers
* Road constraints such as weight limits and bridge heights
The method returns a list of roads to use. You need to design a unit test to ensure that the routes returned do not violate any known constraints.
Which test should you perform?
Which component should you choose?
You are an enterprise application developer. You are testing authentication in a Microsoft Windows-based application.
After the user enters the user name and password in the logon form of the user interface component, the following responses are triggered:
* The user interface component passes the user name and password to a utility component that performs the encryption.
* The user interface component then passes the encrypted user name and password to a Web service.
* The Web service invokes a business component and passes the encrypted user name and password.
* The business component passes the encrypted user name and password to a data access layer component that validates the user.
You need to identify the component on which the business component depends.
Which component should you choose?
What should you do?
You are creating an ASP.NET application by using the .NET Framework 3.5.
A Web form in the application needs to call a Web service. You place the following code segment in the Page_l_oad event of the form.
AddOnPreRenderCornpleteAsync (
new BeginEventHandler (BecrinCallWebService) ,
new EndEventHandler(EndCallWebService)
);
You need to ensure that the BeginCallWebService and EndCallWebService routines are called when the page is accessed.
What should you do?
What should you recommend?
You are an enterprise application developer. You create a Web-based application that manages financial transactions for an online investment company. The company requires to meet the following processes:
* Log all customer actions.
* Log all application execution failures.
The company security policy permits audit events to be logged. The security policy requires that there must be only one local administrator on the Web server. The policy also requires that all code must be run with the least possible privileges. The company uses Microsoft Windows Event Log as the repository for all event information. You need to recommend an appropriate solution to meet the companys requirements. You also need to ensure that you adhere to the company security policy.
What should you recommend?
Which two actions should you perform?
You create several ASP.NET applications by using the .NET Framework 3.5.
You create a custom server control in a class library named CustomControls. The custom server control uses a JavaSchpt file to provide client-side validation logic.
You plan to reuse the custom server control in all the applications.
You need to ensure that the JavaScript file is deployed along with the custom server control and that it is accessible from the applications. You have already decorated the CustomControls assembly with the WebResource attribute.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two)
Which two actions should you perform?
You are an enterprise application developer. You are creating an ASP.NET e-commerce Web site. Shoppers are able to browse products anonymously and page output caching is enabled.
You are adding monitoring features to the Web site.
You must track the following information:
* Products that are being browsed
* Promotions that are being clicked on
* Shoppers who want to sign out
* Shoppers who have completed more than one purchase
The monitoring features are in the form of performance counters. You need to ensure that the monitoring features meet the requirements.
Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
What should you do?
You are creating an ASP.NET application by using the .NET Framework 3.5.
The organization uses an Active Directory Application Mode (ADAM) server to store user names, passwords, and role membership information.
You need to configure the application to access the role information for authenticated users. You also need to accomplish this goal by using the minimum amount of development effort.
What should you do?
What should you do?
You are an enterprise application developer. You are creating a Microsoft Windows-based client application that manages investment portfolios and permits users to monitor stock market data. The application must meet the following requirements:
* It must provide asynchronous processing of transactions.
* It must prevent pending transactions from blocking new transactions.
* It must execute transactions immediately.
You need to use an appropriate component implementation approach to meet the requirements.
What should you do?
What should you do?
You are creating an ASP.NET application by using the .NET Framework 3.5.
The application stores user names and passwords in the database.
You need to ensure that the passwords are encrypted and cannot be decrypted.
What should you do?
What should you do?
You are an enterprise application developer. You create a Microsoft Windows client application that consumes a third-party Web service. The Web service is secure and requires user credentials to be passed through SOAP headers. The Web service is currently in its beta. The URL of the Web service will change after it goes live. The beta Web service will be available after the Web service goes live. You need to ensure that the Windows application can switch between the beta version and the live version of the Web service, if required. You need to achieve this goal by using the least maintenance and coding effort.
What should you do?