What should you do?
You are an enterprise application developer. You develop a Web application by using ASP.NET that runs on Microsoft Windows Server 2003. The ASP.NET application fails to save trace and log
data in an event log. You discover that the application has no write access to the registry. You need to ensure that the trace and log information is saved to the event log. You also need to minimize the risk that is associated with the solution. What should you do?
What should you do?
You are an enterprise application developer. You are creating a client-side service component for
an application. The application runs in the security context of the user. The component must store
proprietary information in a secure registry store that requires system service-level access by using the ACL of the user. You need to ensure that the component meets the requirement of the application with a minimum level of security risk. What should you do?
What should you recommend?
You are an enterprise application developer. You create a Web-based application that manages financial transactions for an online investment company. The company requires to meet the following processes:
Log all customer actions.
Log all application execution failures.
The company security policy permits audit events to be logged. The security policy requires that there must be only one local administrator on the Web server. The policy also requires that all code must be run with the least possible privileges. The company uses Microsoft Windows Event Log as the repository for all event information. You need to recommend an appropriate solution to
meet the companys requirements. You also need to ensure that you adhere to the company security policy. What should you recommend?
Which two actions should you perform?
You are an enterprise application developer. You are creating an ASP.NET e-commerce Web site. Shoppers are able to browse products anonymously and page output caching is enabled.
You are adding monitoring features to the Web site.
You must track the following information:
Products that are being browsed
Promotions that are being clicked on
Shoppers who want to sign out
Shoppers who have completed more than one purchase
The monitoring features are in the form of performance counters. You need to ensure that the monitoring features meet the requirements. Which two actions should you perform? (Each correct
answer presents part of the solution. Choose two.)
What should you do?
You are an enterprise application developer. You are creating a Microsoft Windows-based client application that manages investment portfolios and permits users to monitor stock market data. The application must meet the following requirements:
It must provide asynchronous processing of transactions. It must prevent pending transactions from blocking new transactions.
It must execute transactions immediately.
You need to use an appropriate component implementation approach to meet the requirements.
What should you do?
What should you do?
You are an enterprise application developer. You create a Microsoft Windows client application that consumes a third-party Web service. The Web service is secure and requires user credentials to be passed through SOAP headers. The Web service is currently in its beta. The URL of the Web service will change after it goes live. The beta Web service will be available after the Web service goes live. You need to ensure that the Windows application can switch between the beta version and the live version of the Web service, if required. You need to achieve this goal by using the least maintenance and coding effort. What should you do?
Which option should you choose?
You are an enterprise application developer. You create a Microsoft Windows-based application for a high-volume call center.
The Windows-based application performs the following tasks:
The application manages incoming customer calls and requests. The application delivers event information to a company server that consolidates the call statistics into reports.
Your design team recommends an event logging solution for the application to meet the following
requirements:
Minimize customer wait times and increase the number of calls that are handled during the workdays.
Record and log all user activity for historical reporting and auditing. Reliably deliver all event information to a central server. Consolidate all event information on a central server.
You need to identify a delivery mechanism and a data storage solution for event information.
Which option should you choose?
Which monitoring feature should you use?
You are an enterprise application developer. You are designing monitoring features for an ASP.NET Web-based application.
The monitoring features must meet the following requirements:
Log events to a data source for later review.
Read configuration settings from the Web.config file. Monitor the application after deployment to production.
You decide to use a monitoring feature built into Microsoft .NET Framework. You need to choose
an appropriate monitoring feature. Which monitoring feature should you use?
What should you conclude?
You are an enterprise application developer. You create a three-tier Web-based application that accesses 10 external Web services to retrieve currency rates. You need to calculate product prices in ten currencies. A smart client invoicing application accesses the business tier to retrieve and use the product prices in 10 currencies. The business tier calls the 10 external Web services. You create a separate service agent component to encapsulate the logic of which Web service to call. This component also makes it easier to change the Web references when required. Your team plans to deploy this service agent in the Web presentation tier. You need to evaluate whether your teams deployment plan meets the requirements and recommend accordingly. What should you conclude?
Which implementation approach should you choose?
You are an enterprise application developer. You are creating a distributed application that requires asynchronous communication between the UI layer and the business layer. The application must ensure reliable delivery of messages between the components. There are no restrictions on the format. Messages are limited to 4 MB in size. For scalability reasons, you create the business logic components as serviced components. You need to choose the most appropriate component implementation for your business logic components. You want to achieve this goal by using the least development effort. Which implementation approach should you choose?