What should you do?
You are an enterprise application developer. You are creating a component for a distributed application for your company. The application manages the users access to sensitive company data. The company data is stored in an NTFS file system. Each file has permissions defined for domain users in an access control list (ACL).
The application must meet the following requirements in the same order of priority:
* Secure access to sensitive information based on the users credentials.
* Log authorization failures.
You need to use an appropriate authorization mechanism for the application. You need to achieve this by using the least amount of development effort.
What should you do?
What are the two possible layers to achieve this goal?
You are an enterprise application developer. You are creating an e-commerce Web application. The application architecture consists of layers as shown in the following diagram. The application layers are described in the following tables.
You need to package the required cryptographic services into a single component. You also need to identify suitable locations for the cryptography component.
What are the two possible layers to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
What should you do?
You are an enterprise application developer. You are creating a component to process geospatial data. The component retrieves large sets of data from a Microsoft
SQL Server database. Each data point consists of two decimal values: one value represents longitude and the other value represents latitude. You need to design a data format that minimizes the managed heap memory allocation needed for each data point within the component.
What should you do?
What should you do?
You are an enterprise application developer. You create a component that exposes a static method. The static method performs a complex business algorithm and the method must support concurrent callers. You use asynchronous processing to implement the method. You need to ensure that the client application is notified about the completion of the method.
What should you do?
Which action should you recommend?
You are an enterprise application developer. You are creating a financial application that includes a data access component. This component executes queries against a Microsoft SQL Server database. Application performance deteriorates as the volume of data in the database increases. You need to identify which database queries require the greatest time to execute. You need to minimize the impact on application performance while gathering this information.
Which action should you recommend?
What should you do?
You are an enterprise application developer. You are designing a data access component to meet the following criteria:
The data access component provides data to several business components. The data access component contains methods that retrieve data. The methods retrieve data from a Microsoft SQL Server database.
The data is modified infrequently.
You need to ensure that the data access component provides current data to the business components.
You also need to minimize the number of requests sent to the SQL Server database for this data.
What should you do?
What should you do?
You are debugging a Web service application that uses Web Services Enhancements (WSE) 3.0.
When you attempt to view tracing information for the Web service requests, you discover that the log file is not being updated as expected.
You need to ensure that the log file is updated.
What should you do?
What should you do?
You write an XML Web service.
The XML Web service contains Web methods that return large amounts of non-sensitive public data.
The data is transferred over the Internet.
You need to be able to detect if the data was tampered with during transit.
The implementation must be configurable at run time.
Your solution must minimize the impact on the performance of the Web service.
What should you do?
What should you do?
You are creating a Windows-based application that allows users to store photographs remotely by using a Web service.
The Web service is configured to use Web Services Enhancements (WSE) 3.0, and it has the following configuration XML in its Web.config file.
<microsoft.web.services3>
<messaging>
<mtom serverMode=”always”/>
</messaging>
</microsoft.web.services3>
You need to configure the application to ensure that a photograph can be sent to the Web service.
What should you do?
What should you do?
You write a Web service that uses Web Services Enhancements (WSE) 3.0 for security.
The Web service must support both the kerberosSecurity policy and the mutualCertificateSecurity policy.
Both policies have the same options set for encryption and signatures.
You need to ensure that the Web service can use either policy.
What should you do?