PrepAway - Latest Free Exam Questions & Answers

Category: 70-549

Exam 70-549: PRO: Designing and Developing Enterprise Applications by Using the Microsoft .NET Framework

Which five actions should you include?

You are an enterprise application developer. You are creating a Web service by using ASP.NET. The Web service estimates insurance premiums based on values passed by the client application. The Web server is on the perimeter network. The Web server uses .NET Remoting to communicate to components on an application server that is on the corporate network. The components on the application server use Microsoft Windows Integrated security to authenticate to the database server.
The perimeter network is configured to ensure that the following restrictions are imposed:

Only port 80 is open between the perimeter network and the external network. Application-specific ports might be opened between the perimeter network and the internal network when necessary.

You need to prepare a deployment verification list and a production verification list. Which five actions should you include? (Each correct answer presents part of the solution. Choose five.)

Which three performance counters should you use?

You are an enterprise application developer. You create a three-tier application for placing orders.
The application permits users to submit search requests by using a Web service. The Web service occasionally times out when search requests are submitted. You conclude that the Web service times out due to high network bandwidth utilization. You plan to create custom counters if
necessary. You need to use performance counters to analyze the data. Which three performance counters should you use? (Each correct answer presents part of the solution. Choose three.)

What should you conclude?

You are an enterprise application developer. You create a layered application. You must deploy the application in a three-tier environment. Tier 1 consists of the presentation components deployed on a Web server. Tier 2 consists of the business objects deployed on an application server. Tier 3 consists of a database deployed on a database server. You create a set of classes in a separate assembly as a data access layer to encapsulate the database access functionality. None of the classes in the data access layer inherits from the MarshalByRefObject class. Your team plans to deploy the data access layer component in tier 3. You need to evaluate whether the deployment plan will meet the requirements. What should you conclude?

Which solution should you recommend?

You are an enterprise application developer. You create a client application. One thousand customer service agents use the application during their core business hours, from
8:00 to 17:00.
The application confirms to the following design details:
The application uses separate business logic components and data access logic components.
The data components run on the client computer and connect to a central Microsoft SQL Server 2005 database server.
When the application starts, it retrieves datasets to populate list boxes, drop-down list boxes, and TreeView controls that have data common to all users. Users are authenticated to the database by using Active Directory.

Users report that the application is slow to start. You need to recommend a solution so that the application starts normally. You want to achieve this goal with the minimum programming effort.
Which solution should you recommend?

What should you conclude?

You are an enterprise application developer. You are designing a Microsoft Windows-based application that will use a third-party library. The third-party library is available in a single assembly. The library contains classes inside the Com.Util namespace. You can access the source code for this library. You must provide additional functionality that is not available in the third-party library. To conform to corporate policy, the additional functionality must be available in
the Com.Util namespace. A developer in your team decides to implement the additional functionality by modifying the source code of the third-party library. You need to evaluate whether
this implementation simplifies maintenance when new versions of the third-party library are released. What should you conclude?

What should you conclude?

You are an enterprise application developer. You are evaluating a database design for a human resource application. The existing database schema meets the following criteria:

The database has an Employee table.
The Employee table has an Employee ID field and several other fields.

You must accommodate the following new requirements:

Employees are either supervisors or line workers.
A supervisor will supervise zero or more line workers. An employee will be supervised by only one supervisor.

A database administrator suggests creating a table named Supervisor and copying the supervisor data from the Employee table to the new table. The database administrator also wants to create a foreign key in the Supervisor table to reference the Employee table. You need to evaluate the suggested change to ensure that there is minimal impact on the existing database schema. What should you conclude?

What should you conclude?

You are an enterprise application developer. You are evaluating a component that monitors a Web-based application.
The component stores monitoring information in a database and performs the following functions:

Retrieves the number of orders placed per second.
Tracks the data for peak usage of the application and displays the data in a tabular form.

Subsequently, monitoring requirements change in the following manner:

Users must be able to view data graphically.
Users must be able to analyze data in real time.
Users must be able to correlate the number of orders placed per second with the memory usage in the Web server.

You need to evaluate whether the component meets the new requirements and propose a solution, if required. What should you conclude?

Which two dependencies should you identify?

You are an enterprise application developer.
You create an application that has three layers:

Layer 1 contains the Microsoft Windows client and the input validation logic. Layer 2 contains business entities, business workflows, and business rules. Layer 3 contains the data access classes and stored procedures.

You need to analyze the layers and identify dependencies that exist between these layers. Which two dependencies should you identify? (Each correct answer presents part of the solution.
Choose two.)

Which technology should you use?

You are an enterprise application developer. You are creating a client/server application. You need to install the application on the company network. The client/server application must meet the following criteria:

The server component is a class library that is created by using the .NET Framework. The client component is a Microsoft Windows-based application that is created by using the .NET Framework.
The client component and the server component must communicate by using a binary protocol.
The fewest possible ports are opened between the client component and the server component.

You need to identify a technology that permits the server to communicate with the client component through the TCP/IP protocol. Which technology should you use?


Page 17 of 21« First...10...1516171819...Last »