What should you do?
You are an enterprise application developer. You develop a Web application by using ASP.NET that runs on Microsoft Windows Server 2003. The ASP.NET application fails to save trace and log
data in an event log. You discover that the application has no write access to the registry. You need to ensure that the trace and log information is saved to the event log. You also need to minimize the risk that is associated with the solution. What should you do?
What should you do?
You create Web-based client applications. You identify a reusable software component that you need to use in your application. The component contains functionality to retrieve data from a database. However, the component does not include the functionality to change the color of a table cell when the user moves the mouse cursor into the cell. You need to add the effect of mouse cursor movement to the component in the most efficient way possible. What should you do?
Which code segment should you use?
A Windows Forms application contains the following code segment.
string SQL = @”SELECT OrderID, ProductID, UnitPrice, Quantity FROM [Order Details]”;
SqlDataAdapter da = new SqlDataAdapter(SQL, connStr);
DataTable dt = new DataTable();
da.Fill(dt);
You need to add a new column to the data table named ItemSubtotal. The ItemSubtotal column must contain the value of the UnitPrice column multiplied by the value of the Quantity column.
Which code segment should you use?
What should you do?
You are an enterprise application developer. You are creating a client-side service component for
an application. The application runs in the security context of the user. The component must store
proprietary information in a secure registry store that requires system service-level access by using the ACL of the user. You need to ensure that the component meets the requirement of the application with a minimum level of security risk. What should you do?
Which code segment should you use?
You are developing an application that will use custom authentication and role-based security. You need to write a code segment to make the runtime assign an unauthenticated principal object to each running thread. Which code segment should you use?
What should you conclude?
You create Microsoft Windows-based applications. You are creating a component that will encapsulate a data source. Dozens of applications will use the component.
The component must meet the following design requirements:
1.The component must be able to be modified within a Rapid Application Development environment.
2.The component must be without a user interface.
You propose to derive the component from the System.Windows.Forms.Control class and to implement the IComponent interface. You need to decide whether the component will meet the requirements.
What should you conclude?
What should you recommend?
You are an enterprise application developer. You create a Web-based application that manages financial transactions for an online investment company. The company requires to meet the following processes:
Log all customer actions.
Log all application execution failures.
The company security policy permits audit events to be logged. The security policy requires that there must be only one local administrator on the Web server. The policy also requires that all code must be run with the least possible privileges. The company uses Microsoft Windows Event Log as the repository for all event information. You need to recommend an appropriate solution to
meet the companys requirements. You also need to ensure that you adhere to the company security policy. What should you recommend?
What should you do?
You create Web-based client applications. The application permits users to upload files to a network share. When anonymous users use the upload feature from the Web-based application, a custom error page is displayed. You need to ensure that anonymous users are able to use the application. What should you do?
What should you recommend?
You create Microsoft Windows-based applications. You need to evaluate the design concept of an application.
The application must meet the following requirements:
The application relies on the operating system for authentication. The application minimizes the amount of data sent over the network when connecting to the database. The application exposes data access code so that the future Web-based and mobile applications can reuse them.
The application permits users to view and edit data contained in tables from a Microsoft SQL Server 2005 database.
The application controls access to the SQL Server 2005 database at the table level.
The design contains the following elements:
The SQL Server 2005 database uses the Windows Authentication mode. A database schema that grants rights to the users at the table level. A stored procedure in Transact-SQL that accesses the necessary data required by the application. A Web service that uses a pre-defined credential to access the database and run the stored procedures. A Microsoft Windows-based application that impersonates the logged-on user and calls the Web service to retrieve and update the data.
You need to evaluate the design and recommend appropriately.
What should you recommend?
Which two actions should you perform?
You are an enterprise application developer. You are creating an ASP.NET e-commerce Web site. Shoppers are able to browse products anonymously and page output caching is enabled.
You are adding monitoring features to the Web site.
You must track the following information:
Products that are being browsed
Promotions that are being clicked on
Shoppers who want to sign out
Shoppers who have completed more than one purchase
The monitoring features are in the form of performance counters. You need to ensure that the monitoring features meet the requirements. Which two actions should you perform? (Each correct
answer presents part of the solution. Choose two.)