PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which technology should you use?

You are designing an application by using Microsoft .NET Framework 4 and Microsoft
Visual Studio 2010. The application is used mostly in a disconnected scenario. The
application requires offline data from a Microsoft SQL Server 2008 database. When the
application connects to the network, data will be modified and synchronized. You need to
ensure that the application does not access the database server directly to synchronize data
when online. Which technology should you use?

Which address should you assign?

Your network contains a single Active Directory domain. All servers run Windows Server 2008 R2.
You have an IPv6-only infrastructure that has multiple subnets. You deploy a new server named
Server1. You need to ensure that Server1 can communicate with the client computers in all of the
internal subnets. The solution must use an address that is reserved for internal networks. Which
address should you assign?

Which code segment should you place in the entity’s partial class?

You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to develop an application.
You use the Entity Framework Designer to create the following Entity Data Model.

You write a method named ValidatePostalCode to validate the postal code for the application. You
need to ensure that the ValidatePostalCode method is called before the PostalCode property set
method is completed and before the underlying value has changed. Which code segment should you
place in the entity’s partial class?

What should you recommend?

You plan to upgrade a medium-trust Web application from ASP.NET 2.0 to ASP.NET 4. The
Web application is hosted on a Web server that is running IIS 7.0. You have the following
requirements: Support Multipel permission sets in a single application domain. Honor the
machine-level code access security policy. You need to recommend an approach for
preparing the Web application for the upgrade. What should you recommend?

Which line of code should you use?

You develop a Microsoft .NET Framework 4 application that uses the Entity Framework to store
entities in a Microsoft SQL Server 2008 database. While the application is disconnected from the
database, entities that are added or modified are serialized to a local file. The next time the
application connects to the database, it retrieves a Customer entity from the database by using an
object context named context and stores the entity in a variable named remoteCustomer. The
application then deserializes the Customer entity from the local file and stores the entity in a
variable named localCustomer. The remoteCustomer and the localCustomer variables have the same
entity key. You need to ensure that the offline changes to the Customer entity are persisted in the
database when the ObjectContext.SaveChanges() method is called. Which line of code should you
use?

Which code segments should you add at lines 04 and 05?

You are creating an event receiver. The event receiver will have a field named Title and a field
named Priority. You write the following code segment for the event receiver. (Line numbers are
included for reference only.) 01 public override void ItemUpdating ( SPItemEventProperties prop)
02 { 03 base.ItemUpdating (prop); 04 05 06 } You need to ensure that when the Title field is
changed to include the word IMPORTANT, the Priority field is set to URGENT. Which code
segments should you add at lines 04 and 05?

Which cryptography provider should you use?

You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create an application. The
application connects to a Microsoft SQL Server database. The application stores encrypted credit
card numbers in the database. You need to ensure that credit card numbers can be extracted from
the database. Which cryptography provider should you use?

Which approach should you recommend?

You are designing a knowledge base (KB) solution for a SharePoint 2010 Internet site for
vendors and employees in your organization. The employees have Active Directory (AD)
accounts. You have the following requirements: ·You must incorporate the existing
Windows authentication system based on AD. .Vendors who have no Windows credentials
must have access to the KB. .Content editors must be able to use their Windows credentials
to log on to the site and publish the content. You need to ensure that vendors and content
editors can access the site. Which approach should you recommend?

Which method should you call before persisting changes?

You use Microsoft Visual Studio 2010 and Microsoft .NET Framework 4 to create an application. The
application uses the ADO.NET Entity Framework to model persistence-ignorant entities. The
application operates in a disconnected mode. You need to ensure that changes made to local
entities while the application is in the disconnected mode are correctly persisted. Which method
should you call before persisting changes?

You need to ensure that DHCP clients receive IP addresses from the address range in Scope1 if Server1 is unava

Your network contains two DHCP servers named Server1 and Server2. On Server1, you create a
scope named Scope1. You need to ensure that DHCP clients receive IP addresses from the address
range in Scope1 if Server1 is unavailable. The solution must prevent both servers from assigning
duplicate IP addresses. What should you do from the DHCP console?