What should you do?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. The design of applications forms part of your responsibilities at Domain.com. Domain.com operates as an Internet Service Provider (ISP).
You are currently developing an enterprise application for Domain.com. Domain.com currently offers its customers three services: Web site hosting, Internet connectivity and voice over Internet Protocol (VoIP). The choice of purchasing one or more of these services is up to each customer. Furthermore, multiple customers can purchase the same services. In the event of a customer purchasing a service, a service commencement date, as well as service termination data is set for that customer. The exhibit below illustrates the logical database design for the application.
You now need to normalize the database.
What should you do?
What should you do?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. The design of applications forms part of your responsibilities at Domain.com. Certkiller .COM operates as an insurance company.
You are currently developing an enterprise application that is destined to allow the Domain.com customer to pay their premiums for the insurance services rendered to them. The Domain.com customers have a choice in payment options: credit card or debit order. In your development of this application you took a decision to model the requirements on a class diagram. You now need to choose the appropriate class diagram.
What should you do? (To answer, click on the correct class diagram.)
What conclusion can you draw?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the design and development of application frameworks.
A developer named Clive Wilson is currently writing the following code for an Extensible Markup Language (XML) Web service:
(The line numbers are for reference purposes only.)
01 TraceSwitch generalSwitch = new TraceSwitch(“General”, “General Switch”);
02 Trace.WriteLinelf(generalSwitch.TraceError, “Cannot access mainframe computer”);
03 Trace.WriteLinelf(generalSwitch. TraceInfo, “Creating a new data file”);
Unfortunately the Web service is experiencing problems in production. To this end you decide that both the error message and the informational message need to be written to a Microsoft SQL Server 2005 database. Thus a custom trace listener is configured in the Web.config file to write the trace information to the database. Clive Wilson then sets the trace level to 1 (Error). You need to make a decision as to whether the solution is correct or not.
What conclusion can you draw?
What should you do?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the design and development of application frameworks. Domain.com operates as a medical technological company that manufactures electronic scanning equipment for medical use. You are currently developing a Microsoft Windows Forms application. This application is destined to allow doctors to perform computed Axial Tomography (CAT) scans on patients. When a CAT scan is carried out, it takes over 1,000 two-dimensional scans that are combined to create a three-dimensional image. It takes no more than two seconds to make a two-dimensional scan, however it also takes approximately 20 seconds to combine each image. The Microsoft Windows Forms application that you are developing must allow doctors to take the two-dimensional scans without requiring the patients to wait for a long time. You thus need to choose the appropriate component to meet this requirement.
What should you do? (Choose the correct component.)
What should you do?
You work as the Microsoft.NET developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003.
The development and deployment of Client applications forms part of your responsibilities at Domain.com. You are currently developing a client application that will retrieve data from two Extensible Markup Language (XML) Web Services.
1. The one Web service requires the use of username/password authentication.
2. The other Web service requires the use of Kerberos authentication. You make use of the Web Services Enhancements (WSE) 3.0 proxy generation tool (wsewsdl3.exe) to generate the proxies to the two Web services that requires the different authentications. To this end you create a policy file that specifies the authentication requirements. Now you need to ensure that the requirements are enforces when you call each of the Web services.
What should you do? (Each correct answer presents part of the solution. Choose two.)
What should you do?
You work as the Microsoft.NET developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Domain.com is a Publishing and distribution company and works in joint ventures with many book stores that carries it products.
The provision of stock on hand updates to third party companies (the book stores) forms part of your responsibilities at Domain.com. You are currently developing an Extensible Markup Language (XML) Web Service that provides stock on hand updates. To this end you created a Web method named GetStock that accesses the third party company’s XML Web service to retrieve the required information. Following are some factors that you need to keep in mind:
1. The third parties’ XML Web Service updates it information regarding stocks once every hour.
2. Domain.com is charged for each call to the third party Web service.
It is thus essential that you limit the number of calls that the Domain.com Web service makes to the third party company’s Web service:
1. Thus you apply the Webmethod attribute to the GetStock method.
2. You need to configure the attribute to limit the number of calls to the third party Web service.
3. You must ensure that no cookies are required.
What should you do?
What should you do?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the support and deployment of applications. You are currently developing an enterprise order fulfillment application for Domain.com. Upon completion this application will allow customers to place orders for their respective chosen products that they intend to purchase. At present Domain.com handles its own payment processing. However, it is foreseen that as Domain.com grows, they will make use of a third party company in the future. The exhibit below illustrates the application flow diagram that represents the order process. A factor that should be kept in mind is that the process is subject to future alterations.
You now need to create components to manage the order process.
What should you do?
What should you do?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the support and deployment of applications. You are currently busy developing an enterprise solution for Domain.com. The Domain.com network contains amongst, others two Web servers named Certkiller -WS501 and Certkiller -WS502, as well as a database server named Certkiller -DB01 which you intend to use in the deployment of the solution. Upon completion the solution will consist of a Microsoft ASP.NET Web application, a Microsoft .NET Remoting component, an Extensible Markup Language (XML) Web service, as well as a Microsoft SQL Server 2005 database. The Microsoft ASP.NET Web application and the Extensible Markup Language (XML) Web service make use of the inter-process communication (IPC) channel for connectivity to the .NET Remoting component. The .NET Remoting component in turn accesses data in the database.
Following is the deployment design:
1. Deploy the Microsoft ASP.NET Web application to Certkiller -WS501
2. Deploy the Extensible Markup Language (XML) Web service to Certkiller -W502
3. Deploy the database to Certkiller -DB01
Now you need to make a decision as to where the data access component should be deployed.
What should you do?
What type of attack would result in these inconsistencies?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the support and deployment of applications. Domain.com operates as a company specializing in providing environmental and social impact assessments for civil engineering companies. Domain.com currently offers an Extensible Markup Language (XML) Web service which allows civil engineering companies the ability to submit environmental impact results and the liability and indemnity coverage of projects to a government agency that deals with infrastructure and engineering. A Web method named AddEnvironmentalimpactTestResult is design to accept a String parameter that represents a specific geographical area (GEO); usually identified by means of its coordinates; and a Boolean parameter that indicates that the test was passed. The AddEnvironmentalimpactTestResult method then executes the following query:
INSERT INTO EnvironmentalimpactResult (GEO, Passed) VALUES ((‘{0}’, {1})
The {0} and {1} format placeholders are replaced with the values for the String and Boolean parameters, respectively. The results are stored in a SQL database. An operations engineer named Clive Wilson is responsible for the monitoring of the database. In carrying out his duties, Clive Wilson compares several liability and indemnity coverage records in the database with the paper results. However, Clive Wilson found that there are some inconsistencies in the results. It thus appears that there were some unauthorized changes to data objects in the database. The suspicion is that an attack must have occurred.
What type of attack would result in these inconsistencies?
What conclusion can you draw?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the support and deployment of applications. There is a Microsoft .NET Remoting component that configured to allow a total of five applications to access data in a C-tree database. All aspects seems to be functional however, you have discovered that whenever it happens that an application accesses data, the other four applications are blocked from accessing the data. To this end you monitor the Contention Rate / Sec performance counter in the .NET CLR LocksAndThreads category and measure it to be 50. You now need to analyze this result.
What conclusion can you draw?