What should you do?
You are creating a Windows Communication Foundation (WCF) service by using Microsoft .NET Framework 3.5. The WCF service will validate certificates to authorize client applications. You write the following code segment.
class Store: IStore
{
public void RemoveOrder(int ordered)
{}
}
You need to ensure that only those client applications that meet the following criteria can access the RemoveOrder method:
“AdminUser” is the subject in the client certificate. “1bf47e90f00acf4c0089cda65e0aadcf1cedd592” is the thumbprint in the client certificate.
What should you do?
What should you do?
You create an application by using Microsoft Visual Studio .NET 2008 and the .NET Framework 3.5. The application will be used by multiple types of users. The application will also interact with external applications. You need to design the interaction among the application, the users of the application, and the external applications. What should you do?
Which code fragment should you add?
You are creating a Windows Communication Foundation service by using Microsoft .NET Framework 3.5. You write the following code segment.
namespace MyServices
{
[ServiceContract()]
interface IManageOrders
{
…
}
}
The service metadata must be exposed at the relative address named meta.
You need to add an endpoint element to the app.config file of the service host. Which code fragment should you add?
Which three actions should you perform next?
You are creating a Windows Communication Foundation (WCF) service by using Microsoft .NET Framework 3.5. You need to host the WCF service on the IIS Web server. First, you create a new folder for your application files. Next, you use the IIS management tool to create a Web application in the new folder. Which three actions should you perform next? (Each correct answer presents part of the solution. Choose three.)
Which client application settings should you use?
You are creating a distributed application by using Microsoft .NET Framework 3.5. You use Windows Communication Foundation (WCF) to create the application. The operations provided by the WCF server use the remote resources of other computers. These methods use the credentials provided by the client applications. You need to ensure that the WCF server can impersonate the client applications to access the remote resources. Which client application settings should you use?