PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which approach should you recommend?

You are adding functionality to an ASP.NET MVC 2 Web application. You have the following
requirements when passing form data to the server: • Provide a simple way to map posted
form values to a custom class object. • Control the deserialization of custom class objects
that are passed to the server. You need to design the application to meet the requirements.
Which approach should you recommend?

Which command should you run on WKS1?

Your company has an IPv4 Ethernet network.
A router named R1 connects your segment to the Internet. A router named R2 joins your subnet
with a segment named Private1. The Private1 segment has a network address of 10.128.4.0/26. Your
computer named WKS1 requires access to servers on the Private1 network. The WKS1 computer
configuration is as shown in the following table.
Network Addresses
IPv4 Address 10.128.64.113
Subnet mask 255.255.252.0
Default Gateway 10.128.64.1
The routers are configured as shown in the following table.
Router ID Addresses
R1 – interface 1 10.128.64.1
R1 – interface 2 (To Internet) 131.107.108.37
R2 – interface 1 10.128.64.10
R2 – interface 2 10.128.4.1
WKS1 is unable to connect to the Private1 network by using the current configuration. You need to
add a persistent route for the Private1 network to the routing table on WKS1. Which command
should you run on WKS1?

Which approach should you recommend?

You have an existing ASP.NET Web Forms application All the Create, Read, Update, and
Delete (CRUD) operations are implemented by using Windows Communication Foundation
(WCF). The Web application has the following requirements: • Minimize network traffic. •
Intrinsically support change tracking. • Do not use post backs. You need to design a Web
form to manage inventory. Which approach should you recommend?

Which two approaches could you recommend?

You are designing an ASRNET Web application that allows users to specify a file to be
uploaded by entering the URL of the file. Only files that contain information in a specific
internal metadata field are allowed. You need to design a solution to reject URLs of
disallowed files. Which two approaches could you recommend? (Each correct answer
presents a complete solution. Choose two.)

You need to ensure that users can connect to Server1

Your network consists of a single Active Directory domain. The domain contains a server named
Server1 that runs Windows Server 2008 R2. All client computers run Windows 7. All computers are
members of the Active Directory domain. You assign the Secure Server (Require Security) IPsec
policy to Server1 by using a Group Policy object (GPO). Users report that they fail to connect to
Server1. You need to ensure that users can connect to Server1. All connections to Server1 must be
encrypted. What should you do?