Which diagram type should you use?
You are an enterprise application developer. You are documenting the security design of a component in an application. You plan to create a diagram that will display the security zones and input data for the component in the application. You need to identify the appropriate diagram type to ensure that the diagram displays changes in zones and locations of input data. Which diagram type should you use?
What should you do?
You work as the Microsoft.NET developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003.
The development and deployment of Client applications forms part of your responsibilities at Domain.com. You are currently developing a Microsoft Windows Forms client application that will retrieve data from an Extensible Markup Language (XML) Web Service. This XML Web Services requires Kerberos authentication. To this end you use the Web Services Enhancements (WSE) 3.0 proxy generation tool (wsewsdl3.exe) to generate a proxy to the Web service. You then create a policy file named policies.config. Policies.config specifies the authentication requirements.
You now need to specify the policy file in the app.config file.
What should you do? (Choose the correct configuration.)
What should you do?
You have a Groove domain. You need to view the content of future Groove instant messages sent from domain members. What should you do?
What are two possible ways to achieve this goal?
You are developing a Web application that has two distinct UIs. One UI is targeted to desktop browsers. The other UI is targeted to mobile devices. The mobile devices might or might not support cookies and relative URLs. Users request the Default.aspx page. You need to redirect users to the appropriate UI, depending on whether they are using a mobile device or a desktop browser. What are two possible ways to achieve this goal? (Each correct answer presents a complete solution.
Choose two.)
What should you do?
You are an enterprise application developer. You develop an application by using Microsoft Visual Studio .NET 2005 and .NET Framework 2.0. The application will use a custom authentication mechanism. Authentication information will be stored in a Microsoft SQL Server 2005 database table. You design the table and stored procedure that will be used for authentication. You need to ensure that the stored procedure design is as secure as possible.
What should you do?
What should you do?
You work as the Microsoft.NET developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003.
The development and deployment of Client applications forms part of your responsibilities at Domain.com. You are currently developing a client application that will retrieve data from two Extensible Markup Language (XML) Web Services.
1. The one Web service requires the use of username/password authentication.
2. The other Web service requires the use of Kerberos authentication.
You make use of the Web Services Enhancements (WSE) 3.0 proxy generation tool (wsewsdl3.exe) to generate the proxies to the two Web services that requires the different authentications. To this end you create a policy file that specifies the authentication requirements. Now you need to ensure that the requirements are enforces when you call each of the Web services.
What should you do? (Each correct answer presents part of the solution. Choose two.)
What should you do?
You have a Groove Server Manager server, a Groove Server Data Bridge server, and a Groove domain. You create an identity for Groove Server Data Bridge. You need to ensure that the identity can only be added to workspaces as a manager. What should you do?
Which two actions should you perform?
You are creating a mobile Web Form that displays your company’s logo. The Web Form contains the following image control.
<mobile:Image ID=”ImageLogo” runat=server ImageURL=”logo-bw.gif”> </mobile:Image>
You need to display the logo in black and white on devices that do not support color. In addition, you need to display the logo in color on devices that support color. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
What should you do?
You are an enterprise application developer. You develop an ASP.NETapplication that interacts with a Windows service. The application and the Windows service exchange Microsoft Message Queuing (MSMQ) messages. You need to define an integration test to ensure that the application and the Windows service interact appropriately. What should you do?
What should you do?
You work as the Microsoft.NET developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003.
The implementation of policies for Web applications forms part of your responsibilities. You deployed a Microsoft Web Services Enhancements (WSE) 3.0-enabled Web service application to a production server. Each Web service that is implemented in the application has a Policy attribute applied. This attribute specifies the name of a policy in a policy file. The production server has the Microsoft.NET Framework 2.0 installed, but not Microsoft Visual Studio 2005. You are required to modify the Web service on the production server to use a different set of policies than those that were used during the development.
What should you do?