Which approach should you recommend?
You are designing an ASP.NET Web application.
You are implementing the ASP.NET membership and profile providers to do the following:
– Support retrieval of user passwords within the ASP.NET Web application.
– Access profile data that is stored in two or more Microsoft SQL Server tables.
You need to ensure that the Web application is properly configured to interact with the providers.
Which approach should you recommend?
Which code segment should you use?
A Windows Communication Foundation (WCF) service handles online order processing for your company.
You discover that many requests are being made with invalid account numbers.
You create a class named AccountNumberValidator that has a method named Validate.
Before the message is processed, you need to validate account numbers with AccountNumberValidator and reject messages with invalid account numbers.
You create a new class that implements the IParameterInspector interface. Which code segment should you use?
What should you do?
You use Microsoft Visual Studio 2010 and Microsoft ADO.NET Framework 4.0 to create an application.
The application connects to a Microsoft SQL Server 2008 database.
You use the ADO.NET LINQ to SQL model to retrieve data from the database. You use stored procedures to return multiple result sets.
You need to ensure that the result sets are returned as strongly typed values. What should you do?
What should you do following?
You are making a Windows software by employing Microsoft .Net Framework 4 and Microsoft Visual Studio 2010.The business logic layer of the software is applied by using Windows Communication Groundwork(WCF).
You produce a WCF services that consists of a single operation to upload big binary information files. You configure
the binding of the WCF support to allow information streaming. You need to guarantee that the WCF service operation gets binary info files along with a string parameter that contains the description of each file.
You generate a service operation that gets a single parameter. What should you do following?
Which approach should you recommend?
You need to plan for authentication and authorization of Web application users.
Which approach should you recommend?
You need to ensure that the service publishes the WSDL description at http://services.contoso.com/OrderLookupS
Your company has a Windows Communication Foundation (WCF) service at the URL http://services.contoso.com/OrderLookupService.svc.
The <system.serviceModel> section of the configuration file is as follows. (Line numbers are included for reference only.)
01 <system.serviceModel>
02 <behaviors>
03 <serviceBehaviors>
04 <behavior>
05 <serviceDebug includeExceptionDetailInFaults=”false” />
06 …
07 </behavior>
08 </serviceBehaviors>
09 </behaviors>
10 <serviceHostingEnvironment multipleSiteBindingsEnabled=”true” />
11 </system.serviceModel>
You need to ensure that the service publishes the WSDL description at http://services.contoso.com/OrderLookupService.svc?wsdl.
What should you do?
What should you do?
You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4.0 to create an application.
The application connects to a Microsoft SQL Server 2008 database. The database includes a table that contains information about all the employees.
The database table has a field named EmployeeType that identifies whether an employee is a Contractor or a Permanent employee.
You declare the Employee entity base type. You create a new Association entity named Contractor that inherits the Employee base type.
You need to ensure that all Contractors are bound to the Contractor class. What should you do?
Which two actions should you recommend?
You are designed solution that connects to MSSQL 2008. You plan to deploy the database to development machine and a staging database server from within MSSQL2008. You plan to setup separate build configuration for development and staging. You also plan to deploy multiple production database server managed by an outside vendor. You must not allow the outside vendor to access the Visual Studio project. You need to recommend an approach to configuring and deploying the production management server.
Which two actions should you recommend?
Which two approaches should you recommend?
You need to design a solution for incorporating NTFS permissions in the Web application.
Which two approaches should you recommend?
(Each correct answer presents part of the solution. Choose two.)
Which code segment should you use?
You are developing a Windows Communication Foundation (WCF) service.
The service operation takes a customer number as the only argument and returns information about the customer.
The service requires a security token in the header of the message. You need to create a message contract for the service.
Which code segment should you use?