What should you do?
You work as the Microsoft.NET developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003.
The development and deployment of Client applications forms part of your responsibilities at Domain.com. You are currently developing a client application that will retrieve data from two Extensible Markup Language (XML) Web Services.
1. The one Web service requires the use of username/password authentication.
2. The other Web service requires the use of Kerberos authentication. You make use of the Web Services Enhancements (WSE) 3.0 proxy generation tool (wsewsdl3.exe) to generate the proxies to the two Web services that requires the different authentications. To this end you create a policy file that specifies the authentication requirements. Now you need to ensure that the requirements are enforces when you call each of the Web services.
What should you do? (Each correct answer presents part of the solution. Choose two.)
What should you do?
You work as the Microsoft.NET developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Domain.com is a Publishing and distribution company and works in joint ventures with many book stores that carries it products.
The provision of stock on hand updates to third party companies (the book stores) forms part of your responsibilities at Domain.com. You are currently developing an Extensible Markup Language (XML) Web Service that provides stock on hand updates. To this end you created a Web method named GetStock that accesses the third party company’s XML Web service to retrieve the required information. Following are some factors that you need to keep in mind:
1. The third parties’ XML Web Service updates it information regarding stocks once every hour.
2. Domain.com is charged for each call to the third party Web service.
It is thus essential that you limit the number of calls that the Domain.com Web service makes to the third party company’s Web service:
1. Thus you apply the Webmethod attribute to the GetStock method.
2. You need to configure the attribute to limit the number of calls to the third party Web service.
3. You must ensure that no cookies are required.
What should you do?
What should you do?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the support and deployment of applications. You are currently developing an enterprise order fulfillment application for Domain.com. Upon completion this application will allow customers to place orders for their respective chosen products that they intend to purchase. At present Domain.com handles its own payment processing. However, it is foreseen that as Domain.com grows, they will make use of a third party company in the future. The exhibit below illustrates the application flow diagram that represents the order process. A factor that should be kept in mind is that the process is subject to future alterations.
You now need to create components to manage the order process.
What should you do?
What should you do?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the support and deployment of applications. You are currently busy developing an enterprise solution for Domain.com. The Domain.com network contains amongst, others two Web servers named Certkiller -WS501 and Certkiller -WS502, as well as a database server named Certkiller -DB01 which you intend to use in the deployment of the solution. Upon completion the solution will consist of a Microsoft ASP.NET Web application, a Microsoft .NET Remoting component, an Extensible Markup Language (XML) Web service, as well as a Microsoft SQL Server 2005 database. The Microsoft ASP.NET Web application and the Extensible Markup Language (XML) Web service make use of the inter-process communication (IPC) channel for connectivity to the .NET Remoting component. The .NET Remoting component in turn accesses data in the database.
Following is the deployment design:
1. Deploy the Microsoft ASP.NET Web application to Certkiller -WS501
2. Deploy the Extensible Markup Language (XML) Web service to Certkiller -W502
3. Deploy the database to Certkiller -DB01
Now you need to make a decision as to where the data access component should be deployed.
What should you do?
What type of attack would result in these inconsistencies?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the support and deployment of applications. Domain.com operates as a company specializing in providing environmental and social impact assessments for civil engineering companies. Domain.com currently offers an Extensible Markup Language (XML) Web service which allows civil engineering companies the ability to submit environmental impact results and the liability and indemnity coverage of projects to a government agency that deals with infrastructure and engineering. A Web method named AddEnvironmentalimpactTestResult is design to accept a String parameter that represents a specific geographical area (GEO); usually identified by means of its coordinates; and a Boolean parameter that indicates that the test was passed. The AddEnvironmentalimpactTestResult method then executes the following query:
INSERT INTO EnvironmentalimpactResult (GEO, Passed) VALUES ((‘{0}’, {1})
The {0} and {1} format placeholders are replaced with the values for the String and Boolean parameters, respectively. The results are stored in a SQL database. An operations engineer named Clive Wilson is responsible for the monitoring of the database. In carrying out his duties, Clive Wilson compares several liability and indemnity coverage records in the database with the paper results. However, Clive Wilson found that there are some inconsistencies in the results. It thus appears that there were some unauthorized changes to data objects in the database. The suspicion is that an attack must have occurred.
What type of attack would result in these inconsistencies?
What conclusion can you draw?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the support and deployment of applications. There is a Microsoft .NET Remoting component that configured to allow a total of five applications to access data in a C-tree database. All aspects seems to be functional however, you have discovered that whenever it happens that an application accesses data, the other four applications are blocked from accessing the data. To this end you monitor the Contention Rate / Sec performance counter in the .NET CLR LocksAndThreads category and measure it to be 50. You now need to analyze this result.
What conclusion can you draw?
What conclusion can you draw?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the support and deployment of applications.
Domain.com operates as a credit bureau.
You are currently developing an Extensible Markup Language (XML) Web service that is destined to allow companies to retrieve credit reports from Domain.com. You created a Performance Session in Microsoft Visual Studio 2005 Team Edition for Software Developers. Following are the measurements you obtained from a Web method named ObtainCreditReport:
* When the Web method is called once: execution time for the method is measured to be 8,340.211 milliseconds memory consumption is measured to be 10,200 Kilobytes (K).
* When the Web method is called twice: total execution time for the method is measured to be 33,360.844 milliseconds memory consumption is measured to be 10.296K.
* When the Web method is called thrice: total execution time for the method is measured to be 133,443.376 milliseconds memory consumption is measured to be 10,264 K.
You need to analyze the performance trends.
What conclusion can you draw?
What should your first step be?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the testing and stabilization of applications.
Domain.com operates as a retailer. You are currently developing a sales management application. You are making use of Microsoft ASP.NET Web and the application will be hosted on a Production Web server that runs Microsoft Internet Information Services (IIS) 6.0. Another Domain.com tester named Rory Allen discovered a bug and reported as follows:
If 30 users access the application simultaneously, an error page is displayed. At present this is unacceptable since Domain.com requirements state that the application should support up to 60 concurrent users. You are thus required to address the issue. To this end you need to reproduce and isolate the bug.
What should your first step be?
What should you do?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the support and deployment of applications. You completed the development of a Microsoft ASP.NET Web application using Microsoft Visual Studio 2005 Team Edition for Software Developers. You then deploy the Microsoft ASP.NET Web application to a production server. Then you discover that the central processing unit (CPU) usage on the Web server sometimes reaches 100%. You then assume that the Web application can be the cause of the sudden increase of CPU usage, but you have no idea of where in the application the problem can be.
You now need to ascertain the reason why this performance spike occurs.
What should you do?
What should you do?
You work as the Enterprise application developer at Domain.com. The Domain.com network consists of a single Active Directory domain named Domain.com. All servers in the domain run Windows Server 2003. Your responsibilities at Domain.com include the testing and stabilization of applications. Domain.com operates in the international retail environment. Domain.com works in joint ventures with courier companies world-wide due to the nature of the business. These courier companies are responsible for the delivery of the order. A method named Ship is implemented to invoke a Web method of an Extensible Markup Language (XML) Web service at these courier companies. You are currently developing an order fulfillment solution for Domain.com. In this solution, the Domain.com customer’s order is represented by the Order class. The Order class in turn has a Web method named Ship. The Ship method is designed as follows:
1. It accepts a DateTime instance that represents the earliest date that an order should be shipped.
2. It throws an exception if it is passed a data that is earlier than the current date.
3. It allows multiple threads to call it at the same time.
4. It invokes the Web method of the Web service asynchronously.
You are required to unit test and conclude that the previous design aspects are implemented correctly. To this end you need to perform an additional unit test so as to ensure that the Ship method will be functional under all production scenarios.
What should you do?