PrepAway - Latest Free Exam Questions & Answers

Category: 70-513

Exam 70-513: TS: Windows Communication Foundation Development with Microsoft .NET Framework 4

Which code segment should you use?

You are maintaining a Windows Communication Foundation (WCF) service that uses a custom username password class
to authenticate clients with. The service certificate is hosted in the deployment server store for trusted root certificate authorities
and has a Subject value of TaxServiceKey. Other service certificates hosted on the same server also use TaxServiceKey as a Subject value.
You need to ensure that the service identifies itself with a certificate whose subject name and distinguished names are TaxServiceKey.
Which code segment should you use?

What should you do?

You are hosting a Windows Communication Foundation (WCF) service under Microsoft Interent Information Services (IIS) 7.0.
You have set up a web site in IIS Manager. The physical path is c:\wwwroot\Calendar.
There is a Calendar.svc file in the c:\wwwroot\Calendar folder. It contains the following directive:

<% @ServiceHost Language=”C#” Debug=”true” Service=”Calendar.Calendar” CodeBehind=”CalendarSvc.cs” %>

The CalendarSvc.cs file contains the source for the Calendar class in the Calendar namespace.
You compile this code into the Calendar.dll file. You need to deploy your service to the web site. What should you do?

What should you do?

You are modifying a Windows Communication Foundation (WCF) service that issues security tokens.
The service is accessible through the named pipe protocol. No endpoints are added in the service code.
The configuration file for the service is as follows. (Line numbers are included for reference only)

01 <configuration>
02 <system.serviceModel>
03 <services>
04 <service name=”Contoso.TokenService”>
05 …
06 <host>
07 <baseAddress>
08 …
09 <add baseAddress=”net.pipe://www.contoso.com/tokenpipe” />
10 <baseAddress>
11 </host>
12 </service>
13 </services>
14 </system.serviceModel>
15 </configuration>

You need to ensure that the existing client applications can access the service through HTTP and named pipes.
What should you do?

Which two actions should you perform?

You are adding a Windows Communication Foundation (WCF) service to an existing application.
The application is configured as follows. (Line numbers are included for reference only)

01 <configuration>
02 <system.serviceModel>
03 <services>
04 <service name=”Contoso.Sales.Stock.Service”
05 behaviorConfiguration=”MetadataBehavior”>
06 <host>
07 <baseAddresses>
08 <add baseAddress=”http://contosso.com:8080/StockService” />
09 </baseAddresses>
10 </host>
11 </service>
12 </services>
13 <behaviors>
14 <serviceBehaviors>
15 <behavior name=”MetadataBehavior”>
16 </behavior>
17 </serviceBehaviors>
18 </behaviors>
19 …

You need to configure the service to publish the service metadata.
Which two actions should you perform? (Each answer presents part of the solution. Choose two.)

What should you do?

You are using tracing to diagnose run-time issues.When you look at the traces for the service in SvcTraceViewer.exe,
you see what is shown in the exhibit:


The exception trace is selected in SvcTraceViewer.exe. You need to interpret the trace results to determine where the error occurred and what to do next.
What should you do?

Which XML segment should you add to the system.diagnostics configuration element in the client and server appl

You want to debug the Windows Communication Foundation (WCF) client and server interaction through message and application tracing.
You need to correlate traces generated on the client and the server.
Which XML segment should you add to the system.diagnostics configuration element in the client and server application configuration file?

What should you do?

A Windows Communication Foundation (WCF) service only accepts messages that are signed and encrypted.
A client application is not receiving expected responses from the service.
You need to enable logging to verify that the messages from the client are signed and encrypted.
You also need to see what each message looks like before the message body is deserialized into a NET object. What should you do?


Page 7 of 15« First...56789...Last »