PrepAway - Latest Free Exam Questions & Answers

Category: 70-569

Exam 70-569: UPGRADE: Transition your MCPD Enterprise Application Developer Skills to MCPD Enterprise Application Developer 3.5, Part 2

Which two actions should you perform?

You create an ASP.NET application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. The application uses the Session object to store data. The application is currently deployed to a single server. You need to ensure that the application is available in the event of failure of any single server. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

Which two secure communication protocols should you use?

You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. The application consists of the following components:

An ASP.NET Web application that is deployed on a Web server named WEB1 An ASMX Web service that is deployed on an application server named APP1 A Microsoft SQL Server database that is deployed on a database server named SQL1 The ASP.NET application connects to an ASMX Web service. The APP1 server hosts several ASMX Web service applications. The ASMX Web service stores and retrieves data from SQL1.

You need to ensure that the secure communication strategy meets the following requirements:

The communication configuration between WEB1 and APP1 must be secured without other applications being affected. Server authentication and data encryption must be performed between APP1 and SQL1. Which two secure communication protocols should you use? (Each correct answer presents part of the solution. Choose two.)

What should you do?

You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. The application processes sales order documents. The application contains a component that retrieves the sales order documents from a FTP server and stores the data in a Microsoft SQL Server database. You need to ensure that the component meets the following requirements:

Periodically polls the FTP server to check for new order documents Executes without dependencies on other software components Executes without user interaction
Executes by using a specific security context

Allows system administrators to change the security context by retaining the same component code What should you do?

Which data format should you use?

You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. The application exposes a Windows Communication Foundation (WCF) service. The service will be consumed by a client-side code that runs in the Web pages of an ASP.NET AJAX Web application. You need to ensure that data serialization between the service and the application incurs minimum latency. Which data format should you use?

What should you do?

You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. You are designing the database schema of the application. The database schema is as shown in the exhibit. (Refer to the Exhibit.)

You need to ensure that the design meets the following requirements:
The database contains no duplicate data.
A category can contain zero or more products.
Each product can be associated with zero or more categories.
What should you do?

What should you do?

You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. The application includes two namespaces named Contoso.Security and Contoso.Log. Classes in the Contoso.Security namespace will be distributed for use in a data access layer component. Classes in the two namespaces will be distributed for use by other client components in the application. Not all client components will use both the Contoso.Security and Contoso.Log classes. You plan to design a strategy for component reuse. You need to ensure that unnecessary code is not distributed to any client application. You also need to ensure that all necessary code is available to dependent components. What should you do?

What should you do?

You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. You plan to add an existing .NET component into the current application. The .NET component has insufficient documentation. The structure of the classes in the component must be analyzed before they are incorporated in the application. You need to analyze the members in the component and the dependencies among them. What should you do?

What should you do?

You are creating a business component by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. The component manages the interest rates on new loans. You need to ensure that all online applications that access the component are notified of the changes as soon as they occur. You need to achieve this goal by using the minimum amount of network bandwidth. What should you do?

What should you do?

You are designing business layer classes by using the .NET Framework 3.5 and Microsoft SQL Server 2008. The business classes will be used by a banking application. The class diagram for the business classes is as shown in the exhibit. (Refer to the Exhibit.)

You need to ensure that the application meets the following requirements:
Users are allowed to select only one of the three operationswithdraw, deposit, and get balance. Access to other members of the business objects is disallowed.
Future types of accounts can be handled.
Use of the operations directly from the class is disallowed.

Child classes inherited from the business layer classes are prevented from overriding these operations. What should you do?

Which two actions should you perform?

You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. You plan to use an existing unmanaged component in the application. The unmanaged component includes two methods to calculate taxes. The first method calculates taxes for individuals and the second method calculates taxes for organizations. You need to provide a single method to calculate taxes. You also need to consume the unmanaged component within

the application. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)


Page 9 of 14« First...7891011...Last »