What should you do?
A test team plans to conduct performance testing on a Web site that is deployed on a staging server. The test team needs to modify the deployed Web Forms to test different scenarios. You need to deploy the Web site to the staging server without the Web site’s source code files.
What should you do?
Which approach should you choose?
You are an enterprise application developer. You create a large-scale, managed application that needs a consistent approach to event logging. The application must format and log events to 20 destinations. Events from 15 sources must be collated onto a single computer. The application must perform the following tasks:
* Maintain consistent logging and instrumentation practices, both within an application and across the enterprise.
* Ease the learning curve for developers by using a consistent architectural model.
* Support custom implementations of formatters and event sinks.
* Generate log entries as discrete events or as part of a traced process.
You need to select an appropriate implementation approach. Which approach should you choose?
What should you do?
You create a mobile Web Form. The mobile Web Form contains a mobile Calendar control named calDate. You need to capture the date that users choose from the Calendar control. What should you do?
What should you recommend?
You are an enterprise application developer. You design and develop an event logging strategy for a distributed system. The distributed system consists of a Web-based application, a Microsoft Windows service, and several Microsoft Windows-based applications. The event logging strategy must meet the following requirements:
* All system errors are logged and available to a central administration application.
* The data is available for historical analysis.
* The delivery mechanism is fault-tolerant and reliable.
You need to recommend a system-wide event logging strategy. What should you recommend?
Which code segment should you use?
You are developing an application that runs by using the credentials of the end user. Only users who are members of the Administrator group get permission to run the application. You write the following security code to protect sensitive data within the application.
Dim blnAdmin As Boolean = False
Dim objRole As WindowsBuiltInRole = _
WindowsBuiltInRole.Administrator
If blnAdmin = False Then
Throw New Exception(“User not permitted”)
End If
You need to add a code segment to this security code to ensure that the application throws an exception if a user is not a member of the Administrator group. Which code segment should you use?
What should you recommend?
You are an enterprise application developer. You are designing an application that manages names and descriptions for your companys products.
To manipulate these items, the application requires the object that holds the strings to meet the following criteria:
* Be dynamically resizable.
* Be able to store duplicate entries.
* Expose methods to find all instances of the same text.
You need to recommend an appropriate container for the strings. What should you recommend?
Which code segment should you use?
You are developing an application that will use custom authentication and role-based security. You need to write a code segment to make the runtime assign an unauthenticated principal object to each running thread. Which code segment should you use?
What should you recommend?
You are an enterprise application developer. You are creating an application to manage the inventories of 1,000 stores in geographically dispersed locations. The stores are connected to the main office through a secure network infrastructure. Inventory data from the store servers must be consolidated at the main office everyday. The main office initiates the consolidation by calling a component at the store. Transactional integrity must be maintained during consolidation. Security policy requires the application to propagate Microsoft Windows security context throughout the system to ensure authorization and authentication. Security policy does not permit Web servers at the stores. You need to recommend a reusable component technology that permits data from the store servers to be consolidated at the main office. You also need to ensure that the security policy requirements are met.
What should you recommend?
Which two code segments should you use?
You create a Web application for your company’s intranet. You want to enable users to customize their versions of the intranet home page. You create sections of content as Web Parts. You need to ensure that users can customize content at any time. Which two code segments should you use? (Each correct answer presents part of the solution. Choose two.)
What should you do?
You are an enterprise application developer for Woodgrove Bank. You are creating an application to manage different loan types. All loan types share a common implementation for interacting with the financial systems of Woodgrove. Each loan type must implement its own rules for calculating interest. In the first version of the application, you must support car loans and house loans. You need to develop an architecture for the different loan types within your application. What should you do?