What should you do?
You create Web-based client applications. All Web-based applications are created by using ASP.NET. Larger applications are hosted on Web server farms. The larger applications appear to intermittently lose session state information for users.
You need to correct the problem. What should you do?
Which code segment should you insert?
You create Web-based applications. You are creating an Internet banking application. The application will be used by bank account holders.
You are creating a method to withdraw money from an account. The method must change the account balance according to one of the following rules:
If the amount that is being withdrawn is less than or equal to the account balance, then subtract the amount from the balance.
If the amount that is being withdrawn is greater than the account balance by up to 500 dollars, then subtract the amount and a 35-dollar fee from the balance.
If the amount that is being withdrawn is greater than the account balance by more than 500 dollars, then generate an error.
You are translating the specification given here into pseudo code. You start by writing the following code.
Method
public void Withdraw
Input parameters
decimal amount
Class field
decimal balance
Pseudo code
//your pseudo code
You need to insert the correct pseudo code. Which code segment should you insert?
What should you recommend?
You create Web-based client applications. You review an application that manages the medical information of patients. The information is confidential and needs to be stored by using the most secure method available. The application encrypts patient data and stores it in database tables. The application stores a document or image that is related to a patient in the following manner:
The name of the item is stored in the database.
The physical document or image is stored in the local file system.
The application locates and retrieves the physical document or image based on the name that is returned from the database when the data for a patient is queried. You need to evaluate whether the current application design uses the most secure method available to store information and provide an appropriate recommendation. What should you recommend?
What should you conclude?
You create Web-based client applications. You are modifying an existing program so that it can be scaled out across a load balanced Web farm. The current design stores session specific data in a session variable. You are required to select an appropriate design. You decide to store the session state in a Microsoft SQL Server database that can be accessed by all the Web servers in the Web farm. You need to evaluate whether the design meets the requirements. What should you conclude?
What should you conclude?
You create Web-based client applications. You are creating an intranet application that reviews customer data. The internal Personally Identifiable Information (PII) policy specifies the following requirements for access to customer data:
Only employees in the customer management group can access the customer data. Access to customer data is limited to computers that are inside company facilities.
The legal team advises that you log information that verifies that you have met the PII requirements. The log might be useful if there is a legal challenge over customer privacy. You must create a design that uses minimum amount of storage. You must also ensure that the design meets all the requirements. You decide to store the Microsoft Windows user name for any user who uses the program to access the customer data. You also decide to store the date and time of the access. You need to decide if the design will meet all the requirements. What should you conclude?
What should you do?
You create Web-based client applications. You identify a reusable software component that you need to use in your application. The component contains functionality to retrieve data from a database. However, the component does not include the functionality to change the color of a table cell when the user moves the mouse cursor into the cell. You need to add the effect of mouse cursor movement to the component in the most efficient way possible. What should you do?
Which code segment should you use?
You are developing an application that will use custom authentication and role-based security. You need to write a code segment to make the runtime assign an unauthenticated principal object to each running thread. Which code segment should you use?
What should you do?
You create Web-based client applications. The application permits users to upload files to a network share. When anonymous users use the upload feature from the Web-based application, a custom error page is displayed. You need to ensure that anonymous users are able to use the application. What should you do?
Which permission class should you use?
You are creating an assembly named Assembly1. Assembly1 contains a public method. The global cache contains a second assembly named Assembly2. You must ensure that the public method is only called from Assembly2. Which permission class should you use?
Which code segment should you use?
You are developing an application that will use custom authentication and role-based security. You need to write a code segment to make the runtime assign an unauthenticated principal object to each running thread. Which code segment should you use?