PrepAway - Latest Free Exam Questions & Answers

Category: 70-519 (v.2)

Exam 70-519: Pro: Designing and Developing Web Applications Using Microsoft .NET Framework 4 (update October 29th, 2015)

Which configuration should you recommend?

You are designing an ASP.NET Web Forms application. You expect the application to have
high traffic. You plan to use a Web farm to balance the application load across several Web
servers. You have the following requirements: Use round-robin load balancing. Do not use
persistent storage for session data. You need to ensure that your design meets the
requirements. Which configuration should you recommend?

Which approach should you recommend?

You are designing an ASP.NET Web application. The Web application uses a Menu control
to display either a menu of public and private pages to authorized users or a menu of only
public pages to visitors. You need to ensure that the menu options and URLs of the private
pages are not available to unauthorized users. Which approach should you recommend?

You need to design the application to meet the requirements

You are designing an ASP.NET Web application. You have the following requirements: The
application must be usable in partially connected scenarios. Data that is entered into the
application offline must be synchronized with the server the next time the application is
online. You need to design the application to meet the requirements. What should you use?

Which two technologies could you recommend?

You are designing an ASP.NET Web application. You have the following requirements:
Perform rapid development. Maintain cross-browser compatibility. Do not require client-side
installations. You need to recommend a client-side technology that meets the requirements.
Which two technologies could you recommend? (Each correct answer presents a complete
solution. Choose two.)

Which approach should you recommend?

You are designing an ASP.NET Web application to manage and display sensitive
information stored in a Microsoft SQL Server database. The database also provides
authorization information for users. All Web pages that display sensitive information require
an authenticated login. There is no visitor access to these pages. You have the following
requirements: Separate authorization logic from the application. Prevent the application
from directly accessing the database server. You need to design a data access and
authorization solution. Which approach should you recommend?

Which two approaches should you recommend?

You are designing an ASP.NET Web application for online image editing. Users can upload
images to the Web application and edit those images by using utilities provided by the
application. Some utilities are processor intensive and should be offloaded to a Graphics
Processing Unit (GPU). Other utilities require the use of proprietary algorithms that must be
performed on the server. You need to design a solution for minimizing bandwidth usage and
Web server response times during image processing, while providing a responsive
application. Which two approaches should you recommend? (Each correct answer presents
part of the solution. Choose two.)

Which layer should you recommend?

You are designing a testing methodology for an ASP.NET MVC 2 Web application. The
application has a rich domain model that represents the logic and the data of the business.
A facade over the domain model provides a simplified API that is used by the controllers. A
data access layer beneath the domain model is used by the domain model to handle data
storage and retrieval. You have the following requirements: Centralize business rules.
Directly validate the accuracy of the business rules. You need to design tests against the
appropriate layer to meet the requirements. Which layer should you recommend?

Which methodology should you recommend?

You are designing a testing methodology for an ASP.NET MVC 2 Web application. You
have the following application testing requirements: Verify that security issues are identified
as early within the request as possible. Verify that the effectiveness of input corruption is
minimized. You need to meet the application testing requirements. Which methodology
should you recommend?


Page 3 of 2112345...1020...Last »