Which actions should your design specify?
You are designing a public-facing SharePoint 2010 Web site for an elementary school that
has many events each year. School administrators plan events for students and their
parents. You need to create a design for meeting the following requirements: ·Parents must
be able to log on to the site and sign up for events electronically, regardless of the software
they have installed on their computers or the browsers they are using. .Each event
registration needs to be saved in a list or library on the site. .School personnel responsible
for making changes need to be able to customize each new event registration form with
images and text. Which actions should your design specify? (Each correct answer presents
a complete solution. Choose two.)
Which attribute should you configure?
You create a custom workflow by using Microsoft Visual Studio 2010. You need to specify a
custom InfoPath workflow initiation form in the workflow element manifest file. Which attribute
should you configure?
Which layer should you recommend?
You are designing a testing methodology for an ASP.NET MVC 2 Web application. The
application has a simple domain model that provides a thin wrapper over a data access
layer. Controllers interact with the domain model directly and use methods on repository
objects to save and retrieve objects from the data access layer. You have the following
requirements: • Centralize data operations. • Directly validate data access rules. You need
to design tests against the appropriate layer to meet the requirements. Which layer should
you recommend?
You need to ensure that User1 can upload files to C: \Data
Your network contains a server that runs Windows Server 2008 R2. You have a shared folder named
Data that is located on the C drive. The permissions for the Data folder are configured as shown in
the following table.
A user named User1 is a member of Group1 and Group3. User1 reports that she cannot upload files
to the share. You need to ensure that User1 can upload files to C: \Data. The solution must minimize
the number of permissions assigned to all users. What should you do?
Which approach should you recommend?
You are designing a data capture approach for a SharePoint 2010 intranet site. You need to
specify the data capture design elements in the user interface to meet the following
requirements: ·The site must provide data-entry forms for users to update list dat a. .The
users should be allowed to take the submission form offline. Which approach should you
recommend?
You need to ensure that all domain users can access the share
Your network contains an Active Directory domain. The domain contains a member server that runs
Windows Server 2008 R2. You have a folder named Data that is located on the C drive. The folder
has the default NTFS permissions configured. A support technician shares C:\Data by using the File
Sharing Wizard and specifies the default settings. Users report that they cannot access the shared
folder. You need to ensure that all domain users can access the share. What should you do?
Which methodology should you recommend?
You are designing a testing methodology for an ASP.NET MVC 2 Web application. You
have the following application testing requirements: • Verify that security issues are
identified as early within the request as possible. • Verify that the effectiveness of input
corruption is minimized. You need to meet the application testing requirements. Which
methodology should you recommend?
You need to receive an e-mail notification if WF1 is postponed
You create a workflow named WF1. WF1 is attached to a list named List1. You need to receive an
e-mail notification if WF1 is postponed. What should you do?
Which approach should you recommend?
You are designing a SharePoint 2010 site for your organization to capture customer contact
information. The contact information for customers is stored in a Microsoft Dynamics CRM
4.0 database. You need to design a solution with no custom code that meets the following
requirements: ·Sales department employees must be able to perform create, retrieve,
update, and delete (CRUD) operations for their customer information records on the
SharePoint site. .The data in the SharePoint site must be synchronized with the data in the
CRM Dynamics database because most customers do not have direct access to the CRM
system. .SharePoint users from the Sales department must be able to work with data while
they are working offline. Which approach should you recommend?
You need to prevent the users from accessing EFS-encrypted files when their smart cards are removed
Your network contains an Active Directory domain named contoso.com. All servers run Windows
Server 2008 R2. All client computers run Windows 7. You discover that users can use Encrypting File
System (EFS) when the smart cards on their computers are removed. You need to prevent the users
from accessing EFS-encrypted files when their smart cards are removed. From the EFS properties,
you click Require a smart card for EFS. What should you do next?