What should you do?
You are designing a complex and critical Windows desktop application by using Microsoft .NET Framework 4 and Microsoft Visual Studio 2010.
You plan to implement a logging strategy for the application.
You need to record all unexpected errors that occur in the application.
What should you do?
Which layer should you recommend?
You are designing a testing methodology for an ASP.NET MVC 2 Web application.
The application has a rich domain model that represents the logic and the data of the business.
A faade over the domain model provides a simplified API that is used by the controllers.
A data access layer beneath the domain model is used by the domain model to handle data storage and retrieval. You have the following requirements:
– Centralize business rules.
– Directly validate the accuracy of the business rules.
You need to design tests against the appropriate layer to meet the requirements.
Which layer should you recommend?
What are two possible ways to achieve this goal?
You are developing a Windows Communication Foundation (WCF) service that returns location information
for authorized law enforcement agencies. The service contract is as follows:
[ServiceContract]
public interface IMappingService
{
[OperationContract]
long[] GetLocationCoordinates(String cityName);
[OperationContract]
long[] GetLocationOfCitizen(String ssn);
}
Users are authenticated and impersonated. The system uses ASP.NET roles.
The members of law enforcement are members of the LawEnforcement role.
You need to ensure that only members of the LawEnforcement role can call these methods.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
Which connection string should you add to the .config file?
You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4.0 to create an application.
The application connects to a Microsoft SQL Server 2008 database. The application uses a Microsoft ADO.NET SQL Server managed provider.
When a connection fails, the application logs connection information, including the full connection string.
The information is stored as plain text in a .config file. You need to ensure that the database credentials are secure.
Which connection string should you add to the .config file?
What should you do?
You are designing a sales and inventory tracking system by using Microsoft Visual Studio 2010 and Microsoft SQL Server 2008. The sales, inventory, and shipping tables will reside in different databases on different database servers.
You need to ensure that the tables are updated simultaneously.
What should you do?
Which methodology should you recommend?
You are designing a testing methodology for an ASP.NET MVC 2 Web application. You have the following application testing requirements:
– Verify that security issues are identified as early within the request as possible.
– Verify that the effectiveness of input corruption is minimized.
You need to meet the application testing requirements.
Which methodology should you recommend?
What should you do?
You need to modify a client application that consumes a Windows Communication Foundation (WCF) service.
The service metadata is no longer available. You need to modify the previously generated proxy to include asynchronous calls to the service.
What should you do?
Which connection string should you add to the Web.config file?
You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4.0 to create a Microsoft ASP.NET application.
You want to connect the application to a Microsoft SQL Server Express 2008 database named MyDatabase.
The primary database file is named MyDatabase.mdf and it is stored in the App_Data folder.
You need to define the connection string. Which connection string should you add to the Web.config file?
Which data access technology should you use?
You are designing a Windows application by using Microsoft .NET Framework 4, Microsoft Visual Studio 2010, and Microsoft SQL Server 2008.
You need to design a data access strategy that meets the following requirements:
Automatically tracks changes
Maps the database data model to the object model
Which data access technology should you use?
Which approach should you recommend?
You are designing an ASP.NET Web Forms application that uses a database containing user names and hashed passwords for authentication.
The Web application includes a login form in which users type their user names and passwords.
You need to design a strategy to ensure that the users login credentials cannot be stolen through a man-in-the-middle attack. Which approach should you recommend?