PrepAway - Latest Free Exam Questions & Answers

Category: 70-503

Exam 70-503: TS: Microsoft .NET Framework 3.5 – Windows Communication Foundation Application Development

What should you do to ensure that only the AddStock() SOAP messages are logged?

You create an inventory management service by using Microsoft .NET Framework 3.5. You use Windows Communication Foundation to create the service.
Client applications that call the AddStock() method fail occasionally. You attempt to diagnose the problem by logging all the incoming SOAP messages.
The simultaneous receipt of a large volume of CheckStock() SOAP messages makes it difficult to isolate the problem.
You need to ensure that only the AddStock() SOAP messages are logged.
What should you do?

What should you do to ensure that the WCF service provides interoperable and secure…?

You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. The application exposes a Windows Communication Foundation (WCF) Web service. The Web service is consumed by third-party applications. You need to ensure that the WCF service provides interoperable and secure end-to-end communications. What should you do?

What should you do to implement the design strategy by using the minimum amount of development effort?

You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. The component will return custom business objects. You plan to develop a design strategy that meets the following requirements:

The component can be accessed by the .NET Windows applications and JavaScript-based Web applications. The component can be consumed by the client applications by using the minimum amount of code. The least amount of network bandwidth is consumed. You need to implement the design strategy by using the minimum amount of development effort. What should you do?

What should you do to perform custom validation of the user name and password ?

You are creating an application by using Microsoft .NET Framework 3.5. You use Windows Communication Foundation (WCF) to create the application. The YourUserNamePasswordValidator class is implemented in the host application of the WCF service. The host application is named YourServiceHost.exe. You write the following code segment.

namespace YourSecureService
{
class YourUserNamePasswordValidator : UserNamePasswordValidator {
public override void Validate(string userName, string password)
{

}}
}

You need to perform custom validation of the user name and password by using the YourUserNamePasswordValidator class. What should you do?

What should you do to change the security context by retaining the same component code?

You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. The application processes sales order documents. The application contains a component that retrieves the sales order documents from a FTP server and stores the data in a Microsoft SQL Server database. You need to ensure that the component meets the following requirements:

Periodically polls the FTP server to check for new order documents Executes without dependencies on other software components Executes without user interaction
Executes by using a specific security context

Allows system administrators to change the security context by retaining the same component code What should you do?

What should you do to ensure that only those client applications that provide credentials belonging to?

You are creating a distributed application by using Microsoft .NET Framework 3.5.
You use Windows Communication Foundation to create the application.
You plan to perform the following tasks:
Authenticate the client applications by using Microsoft ASP.NET membership provider.
Authorize the client applications by using Microsoft ASP.NET role provider.
You write the following code segment.

[ServiceContract]
public interface IService
{
[OperationContract]
void Remove(int id);
}
public class Service : IService
{
public void Remove(int id){ }
}

You need to ensure that only those client applications that provide credentials belonging to the AdminGroup role can access the Remove method.
What should you do?


Page 1 of 1112345...10...Last »