PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What should you conclude?

You create Microsoft Windows-based applications. You are creating a sales management application. This application will permit sales personnel to search for customer information in a Microsoft SQL Server 2005 database. All communication with the database server is done by using an SSL channel.

When a user needs to search for customer information based on a name, the following sequence of actions occurs:

1.The user types a name into a text box.
2.The user clicks a button to initiate the search.
3.The component validates that the value the user types is less than 200 characters.
4.The value that is typed is passed as a string to a component.
5.The component concatenates the typed value to a Select statement in the Where clause of the component.
6.The statement is executed to generate a DataTable object.
7.The DataTable object is used to display the results to the user.

You need to identify the risk factor in this application design.
What should you conclude?

Which two actions should you perform?

You are an enterprise application developer. You create a component that uses unmanaged resources. You need to ensure that the component permits client developers to release the unmanaged resources as soon as they are no longer needed. You also need to guarantee that unmanaged resources are always released, even if a client developer fails to release them. Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)

Which code segment should you insert?

You create Microsoft Windows-based applications. You create a banking application that will be used by the account managers of the bank.

You identify a method to simulate the deposit functionality of a savings account. The method will calculate the final balance when monthly deposit, number of months, and quarterly rate are given. The application requirements state that the following criteria must be used to calculate the balance amount:

Apply the quarterly interest rate to the balance amount of the account every three months. Apply the quarterly interest rate before the monthly deposit is calculated for the third month.

You translate the outlined specification into pseudo code. You write the following lines of code. (Line numbers are included for reference only.)

Method

public static decimal SimulateSavings

Input parameters
int months
decimal monthlyPayment
decimal quarterlyRate

Pseudo code

01 Declare balance variable, initialize it to zero
03 Return balance

You need to insert the appropriate code in line 02. Which code segment should you insert?

What should you do?

You are an enterprise application developer. You are creating a component for a distributed application for your company. The application manages the users access to sensitive company data. The company data is stored in an NTFS file system. Each file has permissions defined for domain users in an access control list (ACL).
The application must meet the following requirements in the same order of priority:
Secure access to sensitive information based on the users credentials.
Log authorization failures.

You need to use an appropriate authorization mechanism for the application. You need to achieve this by using the least amount of development effort. What should you do?

Which code segment should you use?

You are writing code for user authentication and authorization. The username, password, and roles are stored in your application data store. You need to establish a user security context that will be used for authorization checks such as IsInRole. You write the following code segment to authorize the user.

if (!TestPassword(userName, password))
throw new Exception(“could not authenticate user”);
String[] userRolesArray = LookupUserRoles(userName);

You need to complete this code so that it establishes the user security context. Which code segment should you use?

Which two aspects should you consider modifying?

You create Microsoft Windows-based applications. You are creating a sales management application for your company. The application will be used by 250 users on the companys network. In the future, the company will be expanding the user base to include at least 1,000 more users. The application will be stored locally on every computer. The application uses a set of assemblies that are installed in the global assembly cache for business rules. The application retrieves data from a Microsoft SQL Server 2005 database by using a set of methods from a Web service. The SQL Server 2005 database is hosted on a local server. The Web service is maintained at a local IIS 6.0 Server. You need to evaluate which aspects of the physical design can be modified to accommodate more users.
Which two aspects should you consider modifying? (Each answer presents part of the solution. Choose two.)

What are the two possible layers to achieve this goal?

You are an enterprise application developer. You are creating an e-commerce Web application. The application architecture consists of layers as shown in the following diagram. The application layers are described in the following tables.

You need to package the required cryptographic services into a single component. You also need to identify suitable locations for the cryptography component.

What are the two possible layers to achieve this goal? (Each correct answer presents a complete solution. Choose two.)