PrepAway - Latest Free Exam Questions & Answers

Category: 70-549

Exam 70-549: PRO: Designing and Developing Enterprise Applications by Using the Microsoft .NET Framework

Which monitoring feature should you use?

You are an enterprise application developer. You are designing monitoring features for an ASP.NET Web-based application.
The monitoring features must meet the following requirements:

Log events to a data source for later review.
Read configuration settings from the Web.config file. Monitor the application after deployment to production.

You decide to use a monitoring feature built into Microsoft .NET Framework. You need to choose
an appropriate monitoring feature. Which monitoring feature should you use?

Which three tasks should you perform?

You are an enterprise application developer. You are creating a component that will be deployed as part of a class library. The component must meet the following specifications:

The interface of the component must be accessible to components outside the hosting assembly.
The interface of the component must be interoperable with components written in any other .NET Framework languages.
The implementation of the component cannot be expanded upon by a derived class.

You need to design the interface of the component.
Which three tasks should you perform? (Each correct answer presents part of the solution.
Choose three.)

What should you do?

You are an enterprise application developer. You review the design of a component. The component processes billing for an online store application. The application is developed by using
ASP.NET 2.0. The component must be highly available during business hours. You need to ensure that the component meets the following requirements: It reads all orders that must be billed. It sends an e-mail notification to the users.It receives confirmation for credit card and bank account transactions. What should you do?

What should you do?

You are an enterprise application developer. You are creating a client-side service component for
an application. The application runs in the security context of the user. The component must store
proprietary information in a secure registry store that requires system service-level access by using the ACL of the user. You need to ensure that the component meets the requirement of the application with a minimum level of security risk. What should you do?

Which monitoring feature should you use?

You are an enterprise application developer. You are designing monitoring features for an ASP.NET Web-based application.
The monitoring features must meet the following requirements:

Log events to a data source for later review.
Read configuration settings from the Web.config file. Monitor the application after deployment to production.

You decide to use a monitoring feature built into Microsoft .NET Framework. You need to choose
an appropriate monitoring feature. Which monitoring feature should you use?

What should you conclude and recommend?

You are an enterprise application developer. You create a data access layer for an order processing application.
The data access layer meets the following criteria:

The data access layer contains a GetConnectionString method to retrieve and return the connection string for the database.
The data access layer contains a stored procedure named GetTotalOrderAmount. The stored procedure runs a select query to return only the sum of the OrderAmount column for the active orders. At times, there might be no active orders.

You create the following method to execute the stored procedure and return the total.

public double GetTotalOrderAmount() {
SqlConnection con = new SqlConnection(GetConnectionString()); string sql = GetTotalOrderAmount;
SqlCommand cmd = new SqlCommand(sql,con);
IDataReader rd; con.Open(); rd = cmd.ExecuteReader(); double amt = 0.0;
if (rd.Read()) {
amt = rd.GetDouble(0);
}
rd.Close();
con.Close();
return amt;
}

You need to review the code and recommend modifications to simplify the code and improve performance, if necessary. What should you conclude and recommend?

Which object should you choose?

You are an enterprise application developer. You create a distributed application that transfers data across tiers. The application transfers multiple rows of data per transaction to business components through a Microsoft .NET Framework remoting channel. The application binds this data to user interface components. The .NET Framework remoting channel is configured to use binary serialization.
After the data is retrieved from the data source, the data is not changed. The distributed application must meet the following criteria:

Consume minimum memory for any data location.
Make minimum use of the processor for any data location.

You need to identify the type of object to serialize. Which object should you choose?

What should you do?

You are an enterprise application developer. You create 10 applications. Your companys application server will host the applications. You are responsible for designing a monitoring solution for the applications.
Your monitoring solution must meet the following criteria:

The solution must be reusable.
The solution must aggregate all data into one display.

You need to design a solution to meet the requirements. What should you do?

What should you choose?

You are an enterprise application developer. You create a distributed invoicing solution. Operating requirements state that the memory that is used by the Microsoft Windows-based applications must not exceed a specified value. Technology requirements state that all execution failures must be reported.
The Windows-based application must meet the following criteria:

Alert system administrators when the memory usage reaches a critical value. Alert system administrators when a technical exception occurs. Log processor and disk space usage on all client computers.

You need to select an event management implementation to meet the criteria. What should you choose?

What should you recommend?

You are an enterprise application developer. You are creating an application to manage the inventories of 1,000 stores in geographically dispersed locations. The stores are connected to the main office through a secure network infrastructure. Inventory data from the store servers must be consolidated at the main office everyday. The main office initiates the consolidation by calling a component at the store. Transactional integrity must be maintained during consolidation. Security policy requires the application to propagate Microsoft Windows security context throughout the system to ensure authorization and authentication. Security policy does not permit Web servers at the stores. You need to recommend a reusable component technology that permits data from the store servers to be consolidated at the main office. You also need to ensure that the security policy requirements are met.
What should you recommend?


Page 1 of 2112345...1020...Last »