PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which data access technology or technologies should you recommend?

You are designing an ASP.NET Web application. The application must provide a data
access method that supports HTTP, MTOM, SOAP, and TCP. You need to ensure that
customers can integrate their applications with the data sources and business rules for your
Web application. Which data access technology or technologies should you recommend?

How should you complete the relevant code?

###BeginCaseStudy###
Case Study: 2
Contoso, Ltd
Background
Contoso, Ltd. is developing a patient monitoring solution for a hospital. The solution consists
of an Azure website and a set of mobile applications that health care providers use to monitor
patients remotely.
Monitoring devices that run the embedded version of Windows will be attached to patients.
The devices will collect information from patients and will transmit real-time continuous data
to a service that runs on Azure. The service collects and distributes data. The data that the
service provides must be accessible by the website and by the mobile applications.
Business Requirements
Patients
All patient data must be stored securely on Azure. Data security must meet or exceed Health
Insurance Portability and Accountability Act of 1996 (HIPAA) standards in the United States
and must meet or exceed ISO/ICE 27002 data security standards in the rest of the world.
Contractors
Third-party contractors will develop the mobile applications. All contractors must develop
the applications by using virtual machines (VMs) that are hosted on Azure. Only authorized
contractors and authorized IP addresses are permitted to access the VMs. The contractors can

use Near Field Communication (NFC) tags to launch Remote Desktop (RD) connections to
the VMs from NFC-enabled devices. For testing purposes, contractors must be able to run
multiple instances of mobile applications within the VMs.
Data Collection and Distribution Service
The service must monitor the patient data and send out alerts to health care providers when
specific conditions are detected. The service must send the alerts to mobile applications and
to the website in real time so that doctors, nurses, and caregivers can attend to the patient.
Partner organizations and diagnostic laboratories must be able to securely access the data and
the website from remote locations.
Current Issues
A partner that is testing a prototype of the website reports that after signing in to the website,
the partner is redirected to the settings page instead of to the home page.
The data from the patient devices is slow to appear on the website and does not always
appear. All patient devices online have active connections to the data collection service.
Technical Requirements
Contractors
All contractors will use virtual machines that are initially configured as size A3. Contractors
must sign in to the assigned VM by using IP addresses from a list of preapproved addresses.
Data Collection and Distribution Service
• The service runs Node.js in a worker role.
• The service must use at least 2048-bit encryption and must use port 8888.
• All patient information must be encrypted and stored by using a NoSQL data store.
• Data must be stored and retrieved securely by using RESTful endpoints.
• Data must NOT be stored within a virtual machine.
All deployed services must send an alert email to watchguard@contoso.com when any of the
following conditions is met:
• The CPU Percentage metric is at or above 85 percent for at least 10 minutes.
• The Network In metric is at or above 2 KB for at least 10 minutes.
• The Network Out metric is at or above 2 KB for at least 10 minutes.
• The Disk Write metric is at or above 1 KB/sec for at least 30 minutes.
• The Disk Read metric is at or above 1 KB/sec for at least 30 minutes.
Website and Mobile Devices
The website must be secure and must be accessible only within the hospital’s physical
grounds. All mobile applications and websites must be responsive. All websites must produce
error logs that can be viewed remotely.
Virtual Machines
• All Azure instances must be deployed and tested on staging instances before they are
deployed to production instances.
• All deployed instances must scale up to the next available CPU instance at a CPU
usage threshold of 90 percent and scale down when the usage is below 10 percent.
Application Structure
Relevant portions of the application files are shown in the following code segments. Line
numbers in the code segments are included for reference only and include a two-character
prefix that denotes the specific file to which they belong.

###EndCaseStudy###

HOTSPOT
You need to implement the worker role to support the real-time continuous data-collection service.
How should you complete the relevant code? To answer, select the appropriate option or options in the
answer area.

Which approach should you recommend?

You are designing a SharePoint 2010 application to store 50 GB of digital assets, including
audio and video files that are up to 20 MB in size. You have the following requirements:
·The disk storage system must use standard hard drives and must be configured to optimize
read performance. .The SharePoint 2010 database uses Microsoft SQL Server Express
2008. .The application must leverage standard SharePoint 2010 components to limit the
requirement for custom development. You need to design a storage solution that meets all
of these requirements. Which approach should you recommend?

Which header and request type should you use in the application?

You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows
Communication Foundation (WCF) Data Services service. You discover that when an application
submits a PUT or DELETE request to the Data Services service, it receives an error. You need to
ensure that the application can access the service. Which header and request type should you use in
the application?

You need to implement data storage for patient information

###BeginCaseStudy###
Case Study: 2
Contoso, Ltd
Background
Contoso, Ltd. is developing a patient monitoring solution for a hospital. The solution consists
of an Azure website and a set of mobile applications that health care providers use to monitor
patients remotely.
Monitoring devices that run the embedded version of Windows will be attached to patients.
The devices will collect information from patients and will transmit real-time continuous data
to a service that runs on Azure. The service collects and distributes data. The data that the
service provides must be accessible by the website and by the mobile applications.
Business Requirements
Patients
All patient data must be stored securely on Azure. Data security must meet or exceed Health
Insurance Portability and Accountability Act of 1996 (HIPAA) standards in the United States
and must meet or exceed ISO/ICE 27002 data security standards in the rest of the world.
Contractors
Third-party contractors will develop the mobile applications. All contractors must develop
the applications by using virtual machines (VMs) that are hosted on Azure. Only authorized
contractors and authorized IP addresses are permitted to access the VMs. The contractors can

use Near Field Communication (NFC) tags to launch Remote Desktop (RD) connections to
the VMs from NFC-enabled devices. For testing purposes, contractors must be able to run
multiple instances of mobile applications within the VMs.
Data Collection and Distribution Service
The service must monitor the patient data and send out alerts to health care providers when
specific conditions are detected. The service must send the alerts to mobile applications and
to the website in real time so that doctors, nurses, and caregivers can attend to the patient.
Partner organizations and diagnostic laboratories must be able to securely access the data and
the website from remote locations.
Current Issues
A partner that is testing a prototype of the website reports that after signing in to the website,
the partner is redirected to the settings page instead of to the home page.
The data from the patient devices is slow to appear on the website and does not always
appear. All patient devices online have active connections to the data collection service.
Technical Requirements
Contractors
All contractors will use virtual machines that are initially configured as size A3. Contractors
must sign in to the assigned VM by using IP addresses from a list of preapproved addresses.
Data Collection and Distribution Service
• The service runs Node.js in a worker role.
• The service must use at least 2048-bit encryption and must use port 8888.
• All patient information must be encrypted and stored by using a NoSQL data store.
• Data must be stored and retrieved securely by using RESTful endpoints.
• Data must NOT be stored within a virtual machine.
All deployed services must send an alert email to watchguard@contoso.com when any of the
following conditions is met:
• The CPU Percentage metric is at or above 85 percent for at least 10 minutes.
• The Network In metric is at or above 2 KB for at least 10 minutes.
• The Network Out metric is at or above 2 KB for at least 10 minutes.
• The Disk Write metric is at or above 1 KB/sec for at least 30 minutes.
• The Disk Read metric is at or above 1 KB/sec for at least 30 minutes.
Website and Mobile Devices
The website must be secure and must be accessible only within the hospital’s physical
grounds. All mobile applications and websites must be responsive. All websites must produce
error logs that can be viewed remotely.
Virtual Machines
• All Azure instances must be deployed and tested on staging instances before they are
deployed to production instances.
• All deployed instances must scale up to the next available CPU instance at a CPU
usage threshold of 90 percent and scale down when the usage is below 10 percent.
Application Structure
Relevant portions of the application files are shown in the following code segments. Line
numbers in the code segments are included for reference only and include a two-character
prefix that denotes the specific file to which they belong.

###EndCaseStudy###

You need to implement data storage for patient information.

What should you do?

You need to ensure that you can update and delete entities on the production server

You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create a Windows
Communication Foundation (WCF) Data Services service. The service connects to a Microsoft SQL
Server 2008 database. The service is hosted by an Internet Information Services (IIS) 6.0 Web server.
The application works correctly in the development environment. However, when you connect to
the service on the production server, attempting to update or delete an entity results in an error.
You need to ensure that you can update and delete entities on the production server. What should
you do?

Which two actions should you perform?

You are developing a Windows application by using Microsoft .NET Framework 4, Microsoft
Visual Studio 2010, and Microsoft SQL Server 2008. New features that require changes to
be made to the database schema are added to the application every week. You need to
ensure that the changes made to the database schema do not require the application to be
recompiled. Which two actions should you perform? (Each correct answer presents part of
the solution. Choose two.)

Which Windows PowerShell command should you use?

###BeginCaseStudy###
Case Study: 2
Contoso, Ltd
Background
Contoso, Ltd. is developing a patient monitoring solution for a hospital. The solution consists
of an Azure website and a set of mobile applications that health care providers use to monitor
patients remotely.
Monitoring devices that run the embedded version of Windows will be attached to patients.
The devices will collect information from patients and will transmit real-time continuous data
to a service that runs on Azure. The service collects and distributes data. The data that the
service provides must be accessible by the website and by the mobile applications.
Business Requirements
Patients
All patient data must be stored securely on Azure. Data security must meet or exceed Health
Insurance Portability and Accountability Act of 1996 (HIPAA) standards in the United States
and must meet or exceed ISO/ICE 27002 data security standards in the rest of the world.
Contractors
Third-party contractors will develop the mobile applications. All contractors must develop
the applications by using virtual machines (VMs) that are hosted on Azure. Only authorized
contractors and authorized IP addresses are permitted to access the VMs. The contractors can

use Near Field Communication (NFC) tags to launch Remote Desktop (RD) connections to
the VMs from NFC-enabled devices. For testing purposes, contractors must be able to run
multiple instances of mobile applications within the VMs.
Data Collection and Distribution Service
The service must monitor the patient data and send out alerts to health care providers when
specific conditions are detected. The service must send the alerts to mobile applications and
to the website in real time so that doctors, nurses, and caregivers can attend to the patient.
Partner organizations and diagnostic laboratories must be able to securely access the data and
the website from remote locations.
Current Issues
A partner that is testing a prototype of the website reports that after signing in to the website,
the partner is redirected to the settings page instead of to the home page.
The data from the patient devices is slow to appear on the website and does not always
appear. All patient devices online have active connections to the data collection service.
Technical Requirements
Contractors
All contractors will use virtual machines that are initially configured as size A3. Contractors
must sign in to the assigned VM by using IP addresses from a list of preapproved addresses.
Data Collection and Distribution Service
• The service runs Node.js in a worker role.
• The service must use at least 2048-bit encryption and must use port 8888.
• All patient information must be encrypted and stored by using a NoSQL data store.
• Data must be stored and retrieved securely by using RESTful endpoints.
• Data must NOT be stored within a virtual machine.
All deployed services must send an alert email to watchguard@contoso.com when any of the
following conditions is met:
• The CPU Percentage metric is at or above 85 percent for at least 10 minutes.
• The Network In metric is at or above 2 KB for at least 10 minutes.
• The Network Out metric is at or above 2 KB for at least 10 minutes.
• The Disk Write metric is at or above 1 KB/sec for at least 30 minutes.
• The Disk Read metric is at or above 1 KB/sec for at least 30 minutes.
Website and Mobile Devices
The website must be secure and must be accessible only within the hospital’s physical
grounds. All mobile applications and websites must be responsive. All websites must produce
error logs that can be viewed remotely.
Virtual Machines
• All Azure instances must be deployed and tested on staging instances before they are
deployed to production instances.
• All deployed instances must scale up to the next available CPU instance at a CPU
usage threshold of 90 percent and scale down when the usage is below 10 percent.
Application Structure
Relevant portions of the application files are shown in the following code segments. Line
numbers in the code segments are included for reference only and include a two-character
prefix that denotes the specific file to which they belong.

###EndCaseStudy###

You create a VM named cVM_005 for a newly hired contractor.
The contractor reports that the VM runs out of memory when the contractor attempts to test the mobile
applications.
You need to double the memory that is available for the VM.
Which Windows PowerShell command should you use?

What should you add to the connection string?

You use Microsoft .NET Framework 4 to develop an application that connects to a Microsoft SQL
Server 2008 database by using SQL Server authentication. The application contains the following
connection string. SERVER=DBSERVER-01; DATABASE=pubs; uid=sa; pwd=secret; You need to
ensure that the password value in the connection string property of a SqlConnection object does not
exist after the Open method is called. What should you add to the connection string?