Which code segment should you use?
You are customizing a Windows Form to update a database asynchronously by using an instance of a BackgroundWorker component named bgwExecute. You start the component by using the following code.
private void StartBackgroundProcess() {
bgwExecute.DoWork += new DoWorkEventHandler(WorkHandler);
bgwExecute.RunWorkerCompleted += new RunWorkerCompletedEventHandler(CompletedHandler);
bgwExecute.ProgressChanged += new
ProgressChangedEventHandler(ProgressChanged);
bgwExecute.RunWorkerAsync();
}
If the UpdateDB method that is called by the BackgroundWorker component returns the value False, you need to display a message box to the user that indicates that the update failed.
Which code segment should you use?
What should you do?
You are an enterprise application developer. You are creating an ASP.NET Web service. You identify an existing COM component that provides the necessary functionality required by your Web service. You need to wrap the COM component so that it can be accessed by your Web service. You also need to minimize marshalling overhead. What should you do?
What should you recommend?
You create Web-based client applications. You review an application that manages the medical information of patients. The information is confidential and needs to be stored by using the most secure method available. The application encrypts patient data and stores it in database tables. The application stores a document or image that is related to a patient in the following manner:
The name of the item is stored in the database.
The physical document or image is stored in the local file system.
The application locates and retrieves the physical document or image based on the name that is returned from the database when the data for a patient is queried. You need to evaluate whether the current application design uses the most secure method available to store information and provide an appropriate recommendation. What should you recommend?
Which three code segments should you use?
You are customizing a Windows Form to asynchronously update a database. You need to ensure that the form displays a message box to the user that indicates the success or failure of the update.
Which three code segments should you use? (Each correct answer presents part of the solution. Choose three.)
What should you do?
You are an enterprise application developer. You are designing an extranet Web application for a company. The application will be used by the employees around the world. You need to recommend a design by using an ASP.NET Web farm that is highly available. What should you do?
What should you conclude?
You create Web-based client applications. You are modifying an existing program so that it can be scaled out across a load balanced Web farm. The current design stores session specific data in a session variable. You are required to select an appropriate design. You decide to store the session state in a Microsoft SQL Server database that can be accessed by all the Web servers in the Web farm. You need to evaluate whether the design meets the requirements. What should you conclude?
Which code segment should you use?
You are customizing a Windows Form to asynchronously update a database in a method named WorkHandler. You need to ensure that the form displays a message box to the user that indicates the success or failure of the update.
Which code segment should you use?
Which two actions should you perform?
You are an enterprise application developer. You are designing an event logging mechanism for a serviced component. You need to ensure that the event logging mechanism meets the following requirements: All exception data must be logged after the deployment of the serviced component.Access to methods that handle mathematical computations must be logged during development only. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
What should you conclude?
You create Web-based client applications. You are creating an intranet application that reviews customer data. The internal Personally Identifiable Information (PII) policy specifies the following requirements for access to customer data:
Only employees in the customer management group can access the customer data. Access to customer data is limited to computers that are inside company facilities.
The legal team advises that you log information that verifies that you have met the PII requirements. The log might be useful if there is a legal challenge over customer privacy. You must create a design that uses minimum amount of storage. You must also ensure that the design meets all the requirements. You decide to store the Microsoft Windows user name for any user who uses the program to access the customer data. You also decide to store the date and time of the access. You need to decide if the design will meet all the requirements. What should you conclude?
Which method should you use on the DirectorySecurity object?
You create a DirectorySecurity object for the working directory. You need to identify the user accounts and groups that have read and write permissions.
Which method should you use on the DirectorySecurity object?