PrepAway - Latest Free Exam Questions & Answers

Category: 70-554

Exam 70-554: UPGRADE: MCSD Microsoft .NET Skills to MCPD Enterprise Application Developer by Using the Microsoft .NET Framework: Part 2

What should you do?

You are an enterprise application developer. You create 10 applications. Your companys application server will host the applications. You are responsible for designing a monitoring solution for the applications.
Your monitoring solution must meet the following criteria:

* The solution must be reusable.
* The solution must aggregate all data into one display.

You need to design a solution to meet the requirements. What should you do?

Which component type should you choose?

You are an enterprise application developer. A Web-based application manages the employee information in your company. A rapid increase in the number of employees renders scalability difficult. You must suggest a component strategy that permits the application to scale as the number of employees grows.
The component must implement the following application features:

* It resides completely behind a company firewall.
* It has complex transactional and auditing requirements.
* It operates across multiple servers within the company.
* It provides runtime identity services for each employee.

You need to choose a component type that implements these features in a scalable manner. You need to achieve this goal by using the least coding effort. Which component type should you choose?

What should you choose?

You are an enterprise application developer. You are developing several Web services that are accessed by smart client applications. The Web services might be installed on different Web servers. The smart client applications must authenticate users by using credentials issued by a single sign-on service. The single sign-on service was developed by a different group in your organization.
The security policy of the application includes the following requirements:

* User identity must be transmitted across application boundaries.
* User identity must be logged for auditing purposes.

You need to choose a strategy to propagate user information securely across the application boundaries.
What should you choose?

What should you choose?

You are an enterprise application developer. You create a distributed invoicing solution. Operating requirements state that the memory that is used by the Microsoft Windows-based applications must not exceed a specified value. Technology requirements state that all execution failures must be reported.
The Windows-based application must meet the following criteria:

* Alert system administrators when the memory usage reaches a critical value.
* Alert system administrators when a technical exception occurs.
* Log processor and disk space usage on all client computers.

You need to select an event management implementation to meet the criteria. What should you choose?

Which approach should you choose?

You are an enterprise application developer. You create a large-scale, managed application that needs a consistent approach to event logging. The application must format and log events to 20 destinations. Events from 15 sources must be collated onto a single computer. The application must perform the following tasks:

* Maintain consistent logging and instrumentation practices, both within an application and across the enterprise.
* Ease the learning curve for developers by using a consistent architectural model.
* Support custom implementations of formatters and event sinks.
* Generate log entries as discrete events or as part of a traced process.

You need to select an appropriate implementation approach. Which approach should you choose?

What should you recommend?

You are an enterprise application developer. You design and develop an event logging strategy for a distributed system. The distributed system consists of a Web-based application, a Microsoft Windows service, and several Microsoft Windows-based applications. The event logging strategy must meet the following requirements:

* All system errors are logged and available to a central administration application.
* The data is available for historical analysis.
* The delivery mechanism is fault-tolerant and reliable.

You need to recommend a system-wide event logging strategy. What should you recommend?

What should you recommend?

You are an enterprise application developer. You are designing an application that manages names and descriptions for your companys products.
To manipulate these items, the application requires the object that holds the strings to meet the following criteria:

* Be dynamically resizable.
* Be able to store duplicate entries.
* Expose methods to find all instances of the same text.

You need to recommend an appropriate container for the strings. What should you recommend?

What should you recommend?

You are an enterprise application developer. You are creating an application to manage the inventories of 1,000 stores in geographically dispersed locations. The stores are connected to the main office through a secure network infrastructure. Inventory data from the store servers must be consolidated at the main office everyday. The main office initiates the consolidation by calling a component at the store. Transactional integrity must be maintained during consolidation. Security policy requires the application to propagate Microsoft Windows security context throughout the system to ensure authorization and authentication. Security policy does not permit Web servers at the stores. You need to recommend a reusable component technology that permits data from the store servers to be consolidated at the main office. You also need to ensure that the security policy requirements are met.
What should you recommend?

What should you do?

You are an enterprise application developer for Woodgrove Bank. You are creating an application to manage different loan types. All loan types share a common implementation for interacting with the financial systems of Woodgrove. Each loan type must implement its own rules for calculating interest. In the first version of the application, you must support car loans and house loans. You need to develop an architecture for the different loan types within your application. What should you do?

What should you do?

You are an enterprise application developer. You create a component that executes queries against Microsoft SQL Server. The queries are executed inside the scope of a transaction. The transaction is started by using the SqlTransaction object. The code executes the query inside a Try block. You need to create an exception handling mechanism that rolls back the transaction under any error condition and notifies the caller of the error. What should you do?


Page 34 of 43« First...1020...3233343536...40...Last »