What should you do?
Your company has five departments. Each department has 300 Groove domain members. You need to prepare your environment so that you can apply separate identity policies to each department. You must prepare the environment by using the minimum amount of administrative effort. What should you do?
Which attribute should you place on the method?
You are developing a method to call a COM component. You need to use declarative security to explicitly request the runtime to perform a full stack walk. You must ensure that all callers have the required level of trust for COM interop before the callers execute your method.
Which attribute should you place on the method?
Which object should you choose?
You are an enterprise application developer. You create a distributed application that transfers data across tiers. The application transfers multiple rows of data per transaction to business components through a Microsoft .NET Framework remoting channel. The application binds this data to user interface components. The .NET Framework remoting channel is configured to use binary serialization.
After the data is retrieved from the data source, the data is not changed. The distributed application must meet the following criteria:
Consume minimum memory for any data location.
Make minimum use of the processor for any data location.
You need to identify the type of object to serialize. Which object should you choose?
What should you do?
You work as the Microsoft.NET developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003.
The development of Extensible Markup Language (XML) Web Services forms part of your responsibilities at Domain.com. You are currently developing an Extensible Markup Language (XML) Web Service that will allow Domain.com to locate the delivery trucks that it provides to companies. The Web service clients will send a similar request to the one illustrated below:
<soap:envelope>
<soap:body>
<GetLocation xmins=urn:gov:DOT”>
<mobilePhoneNumber>000-000-0000</mobilePhoneNumber> </GetLocation>
</soap:body>
<soap:envelope>
To this end you need to configure the attribute to enable it to support the SOAP request.
What should you do? (Each correct answer presents part of the solution. Choose two.)
Which role should you assign to User1?
You install a Groove Server Manager server and create a Groove domain.
You need to assign the appropriate role to a user named User1 to meet the following requirements:
User1 must be able to view which workspaces each Groove domain member accessed.
User1 must not be able to create accounts or reset account passwords.
Which role should you assign to User1?
Which permission class should you use?
You are creating an assembly named Assembly1. Assembly1 contains a public method. The global cache contains a second assembly named Assembly2. You must ensure that the public method is only called from Assembly2. Which permission class should you use?
What should you do?
You are an enterprise application developer. You create 10 applications. Your companys application server will host the applications. You are responsible for designing a monitoring solution for the applications.
Your monitoring solution must meet the following criteria:
The solution must be reusable.
The solution must aggregate all data into one display.
You need to design a solution to meet the requirements. What should you do?
What should you do?
You work as the Microsoft.NET developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003.
The development and deployment of Client applications forms part of your responsibilities at Domain.com. You are currently developing a Microsoft Windows Forms client application that will retrieve data from an Extensible Markup Language (XML) Web Service. This XML Web Services requires Kerberos authentication. To this end you use the Web Services Enhancements (WSE) 3.0 proxy generation tool (wsewsdl3.exe) to generate a proxy to the Web service. You then create a policy file named policies.config. Policies.config specifies the authentication requirements.
You now need to specify the policy file in the app.config file.
What should you do? (Choose the correct configuration.)
What should you do next?
Your company has a single Active Directory domain. You install a Groove Server Manager server and create a Groove domain. You need to ensure that all users are managed from your Groove server. You install Groove on all client computers and create a Groove account for each user. What should you do next?
Which code segment should you use?
You are developing an application that will use custom authentication and role-based security. You need to write a code segment to make the runtime assign an unauthenticated principal object to each running thread. Which code segment should you use?