PrepAway - Latest Free Exam Questions & Answers

Category: 70-565

Exam 70-565: Pro: Designing and Developing Enterprise Applications Using the Microsoft .NET Framework 3.5

What should you do?

You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5.
The application has four modules that query the data that is stored in a database.
You plan to implement an integration testing process for the application.
The testing process must meet the following requirements:
– Test the application data flow early in the process.
– Test the user interface logic early in the process.
– Minimize the requirements for test drivers.
– Minimize the regression tests.
You need to design a strategy to implement the testing process for the application.
What should you do?

What should you do?

You create an ASP.NET application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5.
The application contains data access code that connects to either Microsoft SQL Server 2005 or Microsoft SQL Server 2008.
When the application is connected to SQL Server 2008, it uses the enhanced functionality available only in SQL Server 2008.
You plan to develop a functional testing strategy for the application. You need to ensure that the functional testing strategy meets the following requirements:
– Unit tests are executed properly when connected to either version of SQL Server.
– Unit testing code is reused to the maximum extent possible.
What should you do?

Which type of test should you use?

You create an ASP.NET application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5.
You are developing a test strategy for the application. The application must meet the following requirements:
– Render reports by using Microsoft SQL Server 2005 Reporting Services (SSRS).
– Support 750 concurrent users.
You need to identify a test strategy that ensures that the application meets the requirements.
Which type of test should you use?

What should you do?

You create a Windows Forms application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5.
The application contains the following code segment.
public DataSet GetProductByID(string ProductID)
{
DataSet ds = new DataSet(“ProductList”);
string SqlSelectCommand = “Select * FROM PRODUCTS WHERE PRODUCTID=” + ProductID;
try
{
SqlDataAdapter da = new SqlDataAdapter();
SqlConnection cn = new SqlConnection(GetConnectionString());
SqlCommand cmd = new SqlCommand(SqlSelectCommand);
cmd.CommandType = CommandType.Text;
cn.Open();
da.Fill(ds);
cn.Close();
}
catch (Exception ex)
{
string msg = ex.Message.ToString();
//Perform Exception Handling Here
}
return ds;
}
You need to ensure that the code segment is as secure as possible.
What should you do?

What should you do?

You create applications by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5.
You deploy a new Windows Forms application in a test environment. During the test process, an error message that includes an incomplete stack trace is reported.
You review the following code segment that has caused the error.

public int AddNewMission(DateTime date, string mission, string missionLink)
{
try
{
DALCode pgr = new DALCode(“cnWeb”);
int retcode = pgr.AddNewMission(date, mission, missionLink);
return retcode;
}
catch (Exception ex)
{
throw new Exception(ex.Message);
}
finally
{
pgr.Dispose();
}
}
You need to modify the code segment to display the entire stack trace.
What should you do?

Which technology should you use?

You create an application by using Microsoft Visual Studio 2008 and the .NET Framework 3.5.
You plan to design the business layer of the application. The business layer must meet the following requirements:
– It must expose the business operations as Web services.
– It must provide built-in long-running transaction capabilities.
You need to identify an appropriate technology to implement the business layer.
Which technology should you use?

What should you do?

You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5.
The application will be used on personal computers and mobile-based devices. The current application design is composed of the following three layers:
– User interface layer
– Business layer
– Data access layer
You need to ensure that the application offers a custom experience to the end user based on the type of device used.
You also need to ensure that code duplication is avoided.
What should you do?

What should you do?

You create a Windows Communication Foundation (WCF) application by using Microsoft Visual Studio 2008 and the .NET Framework 3.5.
You create a WCF service by using the following code segment. (Line numbers are included for reference only.)

01 [ServiceContract]
02 public interface IContosoService
03 {
04 [OperationContract]
06 void ProcessTransaction();
07 }
09 public class ContosoService : IContosoService
10 {
11 public void ProcessTransaction() {
12 try {
13 BusinessComponent.ProcessTransaction();
14 }
15 catch (ApplicationException appEx)
17 {}
18 }
19 }

The BusinessComponent.ProcessTransaction method will only throw exceptions from the ApplicationException type.
You plan to debug the WCF service. You need to ensure that the WCF service meets the following requirements:
– Detailed exception information is provided to the client application.
– Subsequent calls can be issued to the service by using the same proxy intance after an exception is caught in the client application.
What should you do?

Which data format should you use?

You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. The application exposes a Windows Communication Foundation (WCF) service. The service will be consumed by a client-side code that runs in the Web pages of an ASP.NET AJAX Web application. You need to ensure that data serialization between the service and the application incurs minimum latency. Which data format should you use?

What should you do?

You create a Windows Communication Foundation (WCF) service by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5.
The service exposes two endpoints. The first endpoint is configured to use the Issued Tokens authentication method. The second endpoint is configured to use the Digital Certificates authentication method. Additional endpoints along with different authentication mechanisms will be created in the future.
You plan to define the authorization strategy for the service. You need to ensure that the WCF service meets the following requirements:
– Authorization rules for validation are the same, regardless of the type of the user credential.
– Users are prevented from executing restricted WCF operations.
– Fine-grained authorization is provided to protected resources.
What should you do?


Page 2 of 1112345...10...Last »