What should you do?
You are an enterprise application developer. You are creating a component that processes loan requests. Your component will be used inside Microsoft Windows Forms client applications. The loan request form is complex and time consuming to complete. Loan data is saved to a Microsoft SQL Server 2005 database. You need to ensure that in case of a system failure the loan officer does not need to re-enter any loan data. What should you do?
What should you do?
You are an enterprise application developer. You are creating a .NET Remoting component. The Version 1.0 of the component is deployed as a well-known server-activated object. The strong- named component is installed into the global assembly cache. Ten distributed applications in your
company utilize the component, and each application has an independent schedule for upgrades and deployment. You add new features to the component. These additions will change the signatures of the public methods on the component. You need to devise a deployment strategy for the component. What should you do?
Which two layers should you identify?
You are an enterprise application developer. You are creating an application that has a layered architecture as shown in the following diagram.
A component that resides in the workflow layer manages transactions across one or more activities in the business logic layer. You need to make modifications to the component. You need to identify the layers that might require modification when the component in the workflow layer is modified. Which two layers should you identify? (Each correct answer presents part of the solution. Choose two.)
Which approach should you choose?
You are an enterprise application developer. You are creating the first version of an application to manage rich text documents.
The application must meet the following design requirements:
Support the file system and a Microsoft SQL Server database as data stores.
Ensure the following for future versions:
o Add support for additional data stores, including network storage. o Acquire the ability to interface with third-party-distributed authoring and versioning tools.
Bring additional storage options online without having to redeploy the entire application. You need to identify an appropriate approach to meet these requirements. Which approach should you choose?
What should you do?
You are an enterprise application developer. You are implementing a new component for an application. The component accesses a database to populate a list of customer objects and exposes a method that is named GetAllCustomers. The component uses a design pattern to access the database only on an as-needed basis. A caching mechanism exists in a lower tier of the application architecture. The component must not cache data. You need to implement the logic for populating a list of customer objects by using a database query. You also need to ensure that you meet the company guidelines for the component design pattern. What should you do?
What should you do?
You are an enterprise application developer. You design a data access component that interacts with a Microsoft SQL Server database. The component uses a database connection string. The database connection string is stored in clear text in the ConnectionStrings section of the application configuration file. During testing, you discover that the component might be vulnerable
to SQL injection attacks. You need to adopt a strategy to protect the component from SQL injection attacks. What should you do?
What should you do?
A client application must connect to a .NET Framework remoting class that is running in a Windows service that is deployed to a computer named APPSERVER1.
The class is named SimpleMathClass and it exists within a namespace named SimpleMath in an assembly named SimpleMathLib.
It is exposed through the TCP and it is configured with the objectUri attribute set to SimpleMath.rem.
You write the following XML configuration settings in the App.config file of the client application.
<configuration>
<system.runtime.remoting>
<application>
</application>
</system.runtime.remoting>
</configuration>
You need to ensure that the client application can connect to the remoting class.
What should you do?
What should you do?
You are writing a .NET Framework remoting client application.
The server application raises events to the client application using an interface named IBroadcaster and an event wrapper.
The event wrapper and the interface are located in an assembly named General that is common to the client and server.
The server configuration file is as follows:
<system.runtime.remoting>
<application>
<channels>
<channel ref=”http” port=”2020″>
<serverProviders>
<formatter ref=”binary” typeFilterLevel=”Full” />
</serverProviders>
<clientProviders>
<formatter ref=”binary” />
</clientProviders>
</channel>
</channels>
<service>
<wellknown mode=”Singleton” type=”Server.Broadcaster, Server” objectUri=”Broadcaster.soap” />
</service>
</application>
</system.runtime.remoting>
You need to ensure that the server can raise events on the client application.
What should you do?
What are two possible ways to achieve this goal?
You use Microsoft Visual Studio 2005 to create a custom Web service discovery system that contains Disco files for your Web services.
You need to have the Disco file for each of your Web services for auditing purposes.
What are two possible ways to achieve this goal? (Each correct answer presents a complete solution. Choose two.)
Which code segment should you use?
You create a Web service that exposes a Web method named CalculateStatistics.
The response returned by the CalculateStatistics method for each set of input parameters changes every 60 seconds.
You need to ensure that all requests to the CalculateStatistics method that have the same set of input parameters, and that occur within a 60-second time period, calculate the statistics only once.
Which code segment should you use?