What should you do?
You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. The application communicates with other systems by using a proprietary messaging format. The company must monitor the response-time of the communication. The monitoring strategy of the application must meet the following requirements:
Information must be logged to a central location.
Historical data must not be overwritten without administrator action.
Information can be displayed in real time.
Information can be displayed in graphical format.
Information can be displayed along with system-supplied performance data.
You need to design a strategy that monitors response-times to meet the requirements. What should you do?
What should you do?
You are creating an application by using Microsoft .NET Framework 3.5. You use Windows Communication Foundation (WCF) to create the application. The YourUserNamePasswordValidator class is implemented in the host application of the WCF service. The host application is named YourServiceHost.exe. You write the following code segment.
namespace YourSecureService
{
class YourUserNamePasswordValidator : UserNamePasswordValidator {
public override void Validate(string userName, string password)
{
…
}}
}
You need to perform custom validation of the user name and password by using the YourUserNamePasswordValidator class. What should you do?
Which code segment should you insert at line 15?
You are creating a Windows Communication Foundation (WCF) service by using Microsoft .NET Framework 3.5. The service will authenticate the client applications by using Personal Information Cards. You write the following code segment. (Line numbers are included for reference only.)
01 public class CustomServiceAuthorizationManager :
02 ServiceAuthorizationManager {
03 protected override bool CheckAccessCore(OperationContext 04 operationContext)
05 {
06 string action=
07 operationContext.RequestContext.RequestMessage.
08 Headers.Action;
09 if (action == “http://tempuri.org/IEngine/Update”) 10 {
11 foreach (ClaimSet cs in
12 operationContext.ServiceSecurityContext.AuthorizationContext.
13 ClaimSets)
14 {
16 }
17 return false;
18 }
19 return true;
20 }
21 bool IsEmailValid(string email)
22 {
23 //e-mail validation is performed here;
24 return true;
25 }
You need to ensure that only those client applications that provide a valid e-mail address can execute the Update method. Which code segment should you insert at line 15?
Which binding mode should you use?
You are creating a distributed application by using Microsoft .NET Framework 3.5. The application uses Windows Communication Foundation (WCF). The distributed application provides point-to-point security. You need to ensure that the distributed application provides end- to-end security instead of point-to-point security. Which binding mode should you use?
What should you do?
You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. The application includes a component. The component will be referenced by the .NET and COM applications.
The component contains the following code segment.
public class Employee
{
public Employee(string name)
{}
}
The .NET and COM applications must perform the following tasks:
Create objects of the Employee type.
Use these objects to access the employee details.
You need to ensure that the .NET and COM applications can consume the managed component.
What should you do?
What are two possible ways to achieve this goal?
You are creating a distributed application by using Microsoft .NET Framework 3.5. The application uses the Windows Communication Foundation model.
You need to ensure that the following requirements are met:
User authentication is performed at the message level.
Data protection is performed at the transport level.
Server authentication is performed at the transport level.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
What should you do?
You are creating a Windows Communication Foundation service by using Microsoft .NET Framework 3.5. The client applications are unable to use SSL. You need to ensure that clients authenticate by using a token provided by a Security Token Service (STS). What should you do?
What should you do?
You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. The application will be used on personal computers and mobile-based devices. The current application design is composed of the following three layers:
User interface layer
Business layer
Data access layer
You need to ensure that the application offers a custom experience to the end user based on the type of device used. You also need to ensure that code duplication is avoided. What should you do?
What should you do?
You are designing a class library by using the .NET Framework 3.5 and Microsoft SQL Server 2008. The class library will be used by several .NET applications. The class library will contain a utility class that executes advanced mathematical operations. You need to design the utility class to meet the following requirements:
It can be accessed only by other classes in the same .NET assembly.
It can be instantiated only once.
What should you do?
Which hosting environment should you use?
You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. You configure the Windows Communication Foundation (WCF) service to be exposed by using the HTTP and TCP endpoints. You plan to deploy the WCF service. You need to identify the host environment that provides the following services:
Message-based activation
Health management
Process recycling capabilities
Which hosting environment should you use?