What should you do?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the support and deployment of applications. You are currently busy developing an enterprise solution for Domain.com. The Domain.com network contains amongst, others two Web servers named Certkiller -WS501 and Certkiller -WS502, as well as a database server named Certkiller -DB01 which you intend to use in the deployment of the solution. Upon completion the solution will consist of a Microsoft ASP.NET Web application, a Microsoft .NET Remoting component, an Extensible Markup Language (XML) Web service, as well as a Microsoft SQL Server 2005 database. The Microsoft ASP.NET Web application and the Extensible Markup Language (XML) Web service make use of the inter-process communication (IPC) channel for connectivity to the .NET Remoting component. The .NET Remoting component in turn accesses data in the database.
Following is the deployment design:
1. Deploy the Microsoft ASP.NET Web application to Certkiller -WS501
2. Deploy the Extensible Markup Language (XML) Web service to Certkiller -W502
3. Deploy the database to Certkiller -DB01
Now you need to make a decision as to where the data access component should be deployed.
What should you do?
What should you do?
What should you do?
You create a Web site that is for members only. The behavior of the Web site changes according to the role of the user. The Web site uses the ASP.NET Membership control for creation of user accounts. You need to find out whether a user is a member of a particular role. What should you do?
Which approach should you choose?
You are an enterprise application developer. You are creating the first version of an application to manage rich text documents.
The application must meet the following design requirements:
Support the file system and a Microsoft SQL Server database as data stores.
Ensure the following for future versions:
o Add support for additional data stores, including network storage. o Acquire the ability to interface with third-party-distributed authoring and versioning tools.
Bring additional storage options online without having to redeploy the entire application. You need to identify an appropriate approach to meet these requirements. Which approach should you choose?
What type of attack would result in these inconsistencies?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the support and deployment of applications. Domain.com operates as a company specializing in providing environmental and social impact assessments for civil engineering companies. Domain.com currently offers an Extensible Markup Language (XML) Web service which allows civil engineering companies the ability to submit environmental impact results and the liability and indemnity coverage of projects to a government agency that deals with infrastructure and engineering. A Web method named AddEnvironmentalimpactTestResult is design to accept a String parameter that represents a specific geographical area (GEO); usually identified by means of its coordinates; and a Boolean parameter that indicates that the test was passed. The AddEnvironmentalimpactTestResult method then executes the following query:
INSERT INTO EnvironmentalimpactResult (GEO, Passed) VALUES ((‘{0}’, {1})
The {0} and {1} format placeholders are replaced with the values for the String and Boolean parameters, respectively. The results are stored in a SQL database. An operations engineer named Clive Wilson is responsible for the monitoring of the database. In carrying out his duties, Clive Wilson compares several liability and indemnity coverage records in the database with the paper results. However, Clive Wilson found that there are some inconsistencies in the results. It thus appears that there were some unauthorized changes to data objects in the database. The suspicion is that an attack must have occurred.
What type of attack would result in these inconsistencies?
which you are a member from the new computer. You save your Groove account and Groove contacts as files to the
You have a new portable computer. You need to access all the Groove workspaces of which you are a member from the new computer. You save your Groove account and Groove contacts as files to the new computer. What should you do next?
Which code logic should you use?
You are using the ASP.NET membership APIs to manage user accounts for a Web site. The Web.config file contains the definition for the membership provider. After modifying the Web.config file to enable password recovery, you create a PasswordReset.aspx file. You need to enable users to reset their passwords online. The new passwords must be sent to them by e-mail after they have logged on through the Login.aspx page. In addition, users must be required to answer their secret questions before resetting their passwords. Which code logic should you use?
Which two layers should you identify?
You are an enterprise application developer. You are creating an application that has a layered architecture as shown in the following diagram. A component that resides in the workflow layer manages transactions across one or more activities in the business logic layer. You need to make modifications to the component. You need to identify the layers that might require modification when the component in the workflow layer is modified. Which two layers should you identify? (Each correct answer presents part of the solution. Choose two.)
What conclusion can you draw?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the support and deployment of applications. There is a Microsoft .NET Remoting component that configured to allow a total of five applications to access data in a C-tree database. All aspects seems to be functional however, you have discovered that whenever it happens that an application accesses data, the other four applications are blocked from accessing the data. To this end you monitor the Contention Rate / Sec performance counter in the .NET CLR LocksAndThreads category and measure it to be 50. You now need to analyze this result.
What conclusion can you draw?
What should you do?
You install a Groove Server Manager server. You need to enable role-based access control on the Groove Server Manager server. What should you do?