What should you do?
You are an enterprise application developer. You are creating a client-side service component for
an application. The application runs in the security context of the user. The component must store
proprietary information in a secure registry store that requires system service-level access by using the ACL of the user. You need to ensure that the component meets the requirement of the application with a minimum level of security risk. What should you do?
What should you do?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the design and development of applications. Domain.com operates as an Independent Electoral Commission. You are currently developing a voter registration application for Domain.com. Following is a list of the facts that must be taken into account:
1. A voter is associated with one political party.
2. A voter has one mailing address.
3. A mailing address can belong to multiple voters.
4. It is estimated that on average each mailing address can be used by two voters.
5. A voter has two telephone contact numbers.
6. A contact phone number can belong to multiple voters.
7. It is estimated that on average each contact phone number can be used by two voters.
The plan is to design the database schema based on these facts. Now you need to decide on the minimum number of tables that will be required. In your solution you must ensure that it offers the best performance.
What should you do? (Choose the correct amount of tables required.)
What should you do?
You open a Groove workspace and receive a name conflict alert. You need to resolve the name conflict. What should you do?
Which code segment should you use?
You are writing code for user authentication and authorization. The username, password, and roles are stored in your application data store. You need to establish a user security context that will be used for authorization checks such as IsInRole. You write the following code segment to authorize the user.
If TestPassword(UserName, Password) = False Then
Throw New Exception(“Could not authenticate user”)
End If
Dim RolesArray() As String = LookUpUserRoles(UserName)
You need to complete this code so that it establishes the user security context. Which code segment should you use?
Which monitoring feature should you use?
You are an enterprise application developer. You are designing monitoring features for an ASP.NET Web-based application.
The monitoring features must meet the following requirements:
Log events to a data source for later review.
Read configuration settings from the Web.config file. Monitor the application after deployment to production.
You decide to use a monitoring feature built into Microsoft .NET Framework. You need to choose
an appropriate monitoring feature. Which monitoring feature should you use?
What should you do?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the design and development of application frameworks. Domain.com operates in the security and surveillance environment. You are currently developing a Microsoft Windows Forms security monitoring system. The application is destined to connect to fifty cameras to record as well as play video. A class named Camera interacts with a physical camera. You make use of the semaphore class to create a resource pool of five camera instances. The business is of such a nature that no more than three Camera instances will be in use at a time. To this end you implement a custom trace listener to send trace messages to a database. In the event of a fourth Camera instance is obtained from the resource pool, you will require to log a message that will read something like:
Only one Camera instance remains in the resource pool. You now need to choose the most appropriate trace level for this message.
What should you do?
What should you do?
You install a Groove Server Manager server and create a Groove domain named Contoso. You need to allow a user named User1 to create a new Groove domain on the Groove server. What should you do?
Which method should you use on the DirectorySecurity object?
You create a DirectorySecurity object for the working directory. You need to identify the user accounts and groups that have read and write permissions. Which method should you use on the DirectorySecurity object?
What should you conclude and recommend?
You are an enterprise application developer. You create a data access layer for an order processing application.
The data access layer meets the following criteria:
The data access layer contains a GetConnectionString method to retrieve and return the connection string for the database.
The data access layer contains a stored procedure named GetTotalOrderAmount. The stored procedure runs a select query to return only the sum of the OrderAmount column for the active orders. At times, there might be no active orders.
You create the following method to execute the stored procedure and return the total.
public double GetTotalOrderAmount() {
SqlConnection con = new SqlConnection(GetConnectionString()); string sql = GetTotalOrderAmount;
SqlCommand cmd = new SqlCommand(sql,con);
IDataReader rd; con.Open(); rd = cmd.ExecuteReader(); double amt = 0.0;
if (rd.Read()) {
amt = rd.GetDouble(0);
}
rd.Close();
con.Close();
return amt;
}
You need to review the code and recommend modifications to simplify the code and improve performance, if necessary. What should you conclude and recommend?
What should you do?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the design and development of application frameworks. Domain.com operates as a medical technological company that manufactures electronic scanning equipment for medical use. You are currently developing a Microsoft Windows Forms application. This application is destined to allow doctors to perform computed Axial Tomography (CAT) scans on patients. When a CAT scan is carried out, it takes over 1,000 two-dimensional scans that are combined to create a three-dimensional image. It takes no more than two seconds to make a two-dimensional scan, however it also takes approximately 20 seconds to combine each image. The Microsoft Windows Forms application that you are developing must allow doctors to take the two-dimensional scans without requiring the patients to wait for a long time. You thus need to choose the appropriate component to meet this requirement.
What should you do? (Choose the correct component.)