PrepAway - Latest Free Exam Questions & Answers

Category: 70-549

Exam 70-549: PRO: Designing and Developing Enterprise Applications by Using the Microsoft .NET Framework

What should you do?

You are an enterprise application developer. You develop a Web application by using ASP.NET that runs on Microsoft Windows Server 2003. The ASP.NET application fails to save trace and log
data in an event log. You discover that the application has no write access to the registry. You need to ensure that the trace and log information is saved to the event log. You also need to minimize the risk that is associated with the solution. What should you do?

What should you recommend?

You are an enterprise application developer. Your company operates a Microsoft Windows-based
client application. The application is deployed to 50 client computers on the network. The application uses a separate class library as a data access layer. The data access layer is currently deployed to the application folder of the client application. It is time consuming to deploy
new versions of the data access layer. You need to evaluate the current physical design of the application and recommend changes to speed up deployment of new versions of the data access layer. What should you recommend?

What should you do?

You are an enterprise application developer. You are implementing a new component for an application. The component accesses a database to populate a list of customer objects and exposes a method that is named GetAllCustomers. The component uses a design pattern to access the database only on an as-needed basis. A caching mechanism exists in a lower tier of the application architecture. The component must not cache data. You need to implement the logic for populating a list of customer objects by using a database query. You also need to ensure that you meet the company guidelines for the component design pattern. What should you do?

What should you recommend?

You are an enterprise application developer. You create a Web-based application that manages financial transactions for an online investment company. The company requires to meet the following processes:

Log all customer actions.
Log all application execution failures.

The company security policy permits audit events to be logged. The security policy requires that there must be only one local administrator on the Web server. The policy also requires that all code must be run with the least possible privileges. The company uses Microsoft Windows Event Log as the repository for all event information. You need to recommend an appropriate solution to
meet the companys requirements. You also need to ensure that you adhere to the company security policy. What should you recommend?

What should you conclude to evaluate whether your teams deployment plan meets the requirements and recommend a

You are an enterprise application developer. You create a three-tier Web-based application that accesses 10 external Web services to retrieve currency rates. You need to calculate product prices in ten currencies. A smart client invoicing application accesses the business tier to retrieve and use the product prices in 10 currencies. The business tier calls the 10 external Web services. You create a separate service agent component to encapsulate the logic of which Web service to call. This component also makes it easier to change the Web references when required. Your team plans to deploy this service agent in the Web presentation tier. You need to evaluate whether your teams deployment plan meets the requirements and recommend accordingly. What should you conclude?

Which approach should you choose?

You are an enterprise application developer. You create a large-scale, managed application that needs a consistent approach to event logging. The application must format and log events to 20 destinations. Events from 15 sources must be collated onto a single computer. The application must perform the following tasks: Maintain consistent logging and instrumentation practices, both
within an application and across the enterprise.Ease the learning curve for developers by using a consistent architectural model.Support custom implementations of formatters and event sinks.Generate log entries as discrete events or as part of a traced process. You need to select an appropriate implementation approach. Which approach should you choose?

Which monitoring mechanism should you use?

You are an enterprise application developer. You are designing a monitoring mechanism for an enterprise application. You need to ensure that the monitoring mechanism meets the following requirements: Logs errors and warningsConfigures source for eventsEnables logging for particular countersTraces the execution path of a process through multiple physical tiers Which monitoring mechanism should you use?

What should you do?

You are an enterprise application developer. You plan to design the component architecture for a new large-scale enterprise application. You need to design a component architecture that meets the following requirements: The components must share common method implementations.The components must be able to support custom implementation of specific methods. What should you do?

What should you recommend?

You are an enterprise application developer. You create a Web-based application that manages financial transactions for an online investment company. The company requires to meet the following processes:

Log all customer actions.
Log all application execution failures.

The company security policy permits audit events to be logged. The security policy requires that there must be only one local administrator on the Web server. The policy also requires that all code must be run with the least possible privileges. The company uses Microsoft Windows Event Log as the repository for all event information. You need to recommend an appropriate solution to
meet the companys requirements. You also need to ensure that you adhere to the company security policy. What should you recommend?

Which three sets of unit tests should you write?

You are an enterprise application developer. You are designing unit test cases for an account management system of a regional bank. Before creating the application, you create the unit test scenarios by using use cases. Three high-level use cases are outlined as shown in the following exhibit.

You need to write unit tests to test the functionality inside the system.
Which three sets of unit tests should you write? (Each correct answer presents part of the solution. Choose three.)


Page 3 of 2112345...1020...Last »