Which of the following mechanisms is a commonly used technique that allows the .NET process to act as an authe
Which of the following mechanisms is a commonly used technique that allows the .NET process to
act as an authenticated user, or as an arbitrarily specified user?
Which of the following corresponds to the .NET attributes from the System.ServiceModel namespace that you requ
You work as a Windows Developer for PassGuide.com. You need to define a new Service
contract. Which of the following corresponds to the .NET attributes from the System.ServiceModel
namespace that you require when defining your Service contract?
What is the next step that he must take to accomplish the task?
John works as a Windows Application Developer for PassGuide.com. The company uses
Microsoft Visual Studio .NET 2010 as its application development platform for creating
applications. He has been given a task of creating a WCF service based on Framework 4.0. He
has finished creating the WCF service and must now configure the bindings. He requires using
WSHttpBinding binding. He has already defined and implemented the service contract on the
application. What is the next step that he must take to accomplish the task?
Which of the following bindings whould you use to accomplish the task?
You work as a Windows Developer for PassGuide.com. You have been provided with a task to
create a WCF service by using Microsoft .NET Framework 4.0. For this, you need to host the
service in a medium trust environment on a Web server. Which of the following bindings whould
you use to accomplish the task?
Each correct answer represents a complete solution. Choose two.
Which of the following code segments should you use to implement this?
You are working on a WCF service that will have various client sessions connecting to it. You want
a service instance to be created each time a client uses the service. Which of the following code
segments should you use to implement this?
Which of the following security methods should you implement?
You are creating a WCF application that includes a client using a remote WCF service. You are
concerned about security for the communications between client and server. Your application
specifications state that you should have end-to-end security. Which of the following security
methods should you implement?
What is the next step that he must take to accomplish the task?
John works as a Windows Application Developer for PassGuide.com. The company uses
Microsoft Visual Studio .NET 2010 as its application development platform for creating
applications. He has been given a task of creating a WCF service based on Framework 4.0. He
has finished creating the WCF service and must now configure the bindings. He requires using
WSHttpBinding binding. He has already defined and implemented the service contract on the
application. What is the next step that he must take to accomplish the task?
Which of the following properties does the service require, in order to configure endpoints?
John works as a Windows Application Developer for PassGuide.com. The company uses Visual
Studio .NET 2010 as its application development platform. John has been given a task to create a
WCF service for his company using .NET Framework 4.0. Which of the following properties does
the service require, in order to configure endpoints?
Each correct answer represents a part of the solution. Choose all that apply.
What should John do to accomplish the task?
John works as a Windows Developer for PassGuide.com. John has been given a task to create a
WCF 4.0 by using the Microsoft .NET Framework 4.0. The client applications are unable to use
SSL feature.
John here needs to make sure that a client is authenticated by using a token mentioned by a
Security Token Service (STS).
What should John do to accomplish the task?
You need to recognize the cause of the error
You work as a Windows Developer for PassGuide.com. You need to generate a Windows
Communication Foundation service by using Microsoft .NET Framework 4.0. You set up tracing for
the service. The tracing fails because of an error in the service configuration. You need to
recognize the cause of the error. What should you do to accomplish the service without any error?