Monday, July 15, 2013

Microsoft 70-549 PDF download - Education - Study Techniques

PRO: Designing and Developing Enterprise Applications by Using the Microsoft .NET Framework 70-549 Test

Exam Code: 70-549 (C#)Practice Questions and Answers: 183Question: 1You are an enterprise application developer. You design a data access component that interactswith a Microsoft SQL Server database. The component uses a database connection string. Thedatabase connection string is stored in clear text in the ConnectionStrings section of theapplication configuration file. During testing, you discover that the component might be vulnerableto SQL injection attacks. You need to adopt a strategy to protect the component from SQLinjection attacks. What should you do?

A. Replace all dynamic SQL statements with parameterized SQL statements that use strongly typed SQL parameters.B. Construct all dynamic SQL statements by using a SecureString object.C. Modify the method so that it throws an exception if the SQL statement does not return any rows.D. Encrypt the ConnectionStrings section of the configuration file.

Answer: A

Question: 2You are an enterprise application developer. You are implementing a new component for anapplication. The component accesses a database to populate a list of customer objects andexposes a method that is named GetAllCustomers. The component uses a design pattern toaccess the database only on an as-needed basis. A caching mechanism exists in a lower tier ofthe application architecture. The component must not cache data. You need to implement thelogic for populating a list of customer objects by using a database query. You also need to ensurethat you meet the company guidelines for the component design pattern. What should you do?

A. Execute a query in the constructor of the component to populate a field of type List. Return the List reference in the call to the GetAllCustomers method.B. Execute a query in the static constructor of the component to populate a static field of type List. Return the List reference in the call to the GetAllCustomers method.C. Execute a query in the GetAllCustomers method to populate a local variable of type List. Return the List reference.D. Execute a query in the GetAllCustomers method to populate a field of type List only if the field is null. Return the List reference.

Answer: C

Question: 3You are an enterprise application developer. You are creating the first version of an application tomanage rich text documents.The application must meet the following design requirements:

Support the file system and a Microsoft SQL Server database as data stores. Ensure the following for future versions: o Add support for additional data stores, including network storage. o Acquire the ability to interface with third-party-distributed authoring and versioning tools.

Bring additional storage options online without having to redeploy the entire application.

You need to identify an appropriate approach to meet these requirements. Which approachshould you choose?

A. Create a single Document component to represent the rich text content of a document and include methods on the component to persist and retrieve rich text for each type of data store.B. Create a single Document component to represent the rich text content of a document and an enumeration to represent each available data store. Include a parameter of the enumerated type in methods interfacing with a data store.C. Create a single Document component to represent the rich text content of a document and an enumeration to represent each available data store. Include a property on the Document component to permit the selection of a data store.D. Create a Document component to represent the rich text content of a document. Create a DocumentRepository component to manage the various data stores.

Answer: D

Question: 4You are an enterprise application developer. You are creating an application that has a layeredarchitecture as shown in the following diagram.

A component that resides in the workflow layer manages transactions across one or moreactivities in the business logic layer. You need to make modifications to the component. You needto identify the layers that might require modification when the component in the workflow layer ismodified. Which two layers should you identify? (Each correct answer presents part of thesolution. Choose two.)

A. Presentation layerB. Service fa?ade layerC. Business logic layerD. Data access layer

Answer: A, B

Question: 5You are an enterprise application developer. You are creating a .NET Remoting component. TheVersion 1.0 of the component is deployed as a well-known server-activated object. The strong-named component is installed into the global assembly cache. Ten distributed applications in yourcompany utilize the component, and each application has an independent schedule for upgradesand deployment. You add new features to the component. These additions will change thesignatures of the public methods on the component. You need to devise a deployment strategyfor the component. What should you do?

A. Deploy the component in place of the existing well-known object.B. Deploy the component as a well-known object.C. Increment the version number of the component assembly. Deploy the component in place of the existing well-known object.D. Increment the version number of the component assembly. Deploy the component as a new well-known object.

Answer: B

Question: 6You are an enterprise application developer. You are creating a component that processes loanrequests. Your component will be used inside Microsoft Windows Forms client applications. Theloan request form is complex and time consuming to complete. Loan data is saved to a MicrosoftSQL Server 2005 database. You need to ensure that in case of a system failure the loan officerdoes not need to re-enter any loan data. What should you do?

A. Implement a private Save method that saves all property values to the database. Call the Save method from inside your components finalizer.B. Implement code inside the Set accessor for each property that saves the property value to the database.C. Implement a public Save method that saves all property values to a static variable.D. Implement code inside the Set accessor that saves the property value to a static variable.

Answer: B

Question: 7You are an enterprise application developer. You create a component that generates medicaldocuments. Your component is used by multiple document management systems.Users generate documents throughout the entire day and most documents are generated duringbusiness hours. You notice that user load is increasing and performance is degrading. You needto identify sections of code on which to focus performance tuning efforts. Which two actionsshould you recommend? (Each correct answer presents part of the solution. Choose two.)

A. Analyze the resource usage for the objects created in the component.B. Analyze the execution time for methods in the component.C. Analyze the time periods of peak frequency of document creation.D. Analyze which application users are generating the greatest number of documents.E. Analyze which client applications are generating the greatest number of documents.

Answer: A, B

Question: 8You are an enterprise application developer. You are creating a component that will be used in anorder fulfillment process.The component performs the following two tasks:

Modifies data in a local Microsoft SQL Server database Adds data to a remote SQL Server database

The application that uses the component is multithreaded. Each application thread that uses thecomponent creates its own instances of the component classes. You need to ensure that thecomponent either performs both tasks successfully or performs neither task. What should youdo?

A. Use the System.Threading.Monitor class to synchronize the code segment that performs the data modifications and submits the message.B. Use classes in the System.Transactions namespace to enlist both tasks in a distributed transaction.C. Enable Multiple Active Result Sets (MARS) for each database connection.D. Use ADO.NET DataAdapter objects that are configured to support batch updates.

Answer: B

Question: 9You are an enterprise application developer. You are creating a component that will be deployedas part of a class library. The component must meet the following specifications:

The interface of the component must be accessible to components outside the hosting assembly. The interface of the component must be interoperable with components written in any other .NET Framework languages. The implementation of the component cannot be expanded upon by a derived class.

You need to design the interface of the component.Which three tasks should you perform? (Each correct answer presents part of the solution.Choose three.)

A. Apply the CLSCompliant(true) attribute to the assembly and component definition.B. Apply the abstract keyword to the component definition.C. Apply the ComVisible(true) attribute to the assembly and component definition.D. Create a primary interop assembly for the assembly that hosts your component.E. Apply the sealed keyword to the component definition.F. Apply the public keyword to the component definition.

Answer: A, E, F

Question: 10You are an enterprise application developer. You are creating an application that will deploy anon-demand training program. The training is a combination of documents and video files that theuser can access from an internal server on the LAN. Users might access this application throughtheir home computers when they are connected to the corporate network through a virtual privatenetwork (VPN). You need to design the video portion for the on-demand training program. Youalso need to ensure that users can view the videos without making modifications to theircomputer configuration. Which two actions should you perform? (Each correct answer presentspart of the solution. Choose two.)

A. Create one file for all demonstrations.B. Create a set of files that have different qualities for different connection speeds.C. Create a set of files that have different formats for different players.D. Create a set of files for the corporate office and one set for the branch offices.E. Create a set of files for the VPN users.F. Create a set of files that require license keys to protect the content.

Answer: B, C

Question: 11You are an enterprise application developer. You create a component that executes queriesagainst Microsoft SQL Server. The queries are executed inside the scope of a transaction. Thetransaction is started by using the SqlTransaction object. The code executes the query inside aTry block. You need to create an exception handling mechanism that rolls back the transactionunder any error condition and notifies the caller of the error. What should you do?A. Use a catch block to catch all exceptions. Roll back the transaction and rethrow the exception inside the catch block.B. Place code to roll back the transaction inside a finally block.C. Place the SqlTransaction object inside a using statement.D. Use a catch block to catch all exceptions. Rethrow the exception inside the catch block and roll back the transaction in the finally block.

Answer: A

Question: 12You are an enterprise application developer for Woodgrove Bank. You are creating an applicationto manage different loan types. All loan types share a common implementation for interacting withthe financial systems of Woodgrove. Each loan type must implement its own rules for calculatinginterest. In the first version of the application, you must support car loans and house loans.You need to develop an architecture for the different loan types within your application. Whatshould you do?

A. Implement Loan as an abstract class. Implement CarLoan and HouseLoan as concrete classes.B. Implement Loan as an interface. Implement CarLoan and HouseLoan as concrete classes.C. Implement Loan as a concrete class. Implement CarLoan and HouseLoan as interfaces.D. Implement Loan as a sealed class. Implement CarLoan and HouseLoan as abstract classes.

Answer: A

Question: 13You are an enterprise application developer. You are creating an application to manage theinventories of 1,000 stores in geographically dispersed locations. The stores are connected to themain office through a secure network infrastructure. Inventory data from the store servers mustbe consolidated at the main office everyday. The main office initiates the consolidation by callinga component at the store. Transactional integrity must be maintained during consolidation.Security policy requires the application to propagate Microsoft Windows security contextthroughout the system to ensure authorization and authentication. Security policy does not permitWeb servers at the stores. You need to recommend a reusable component technology thatpermits data from the store servers to be consolidated at the main office. You also need to ensurethat the security policy requirements are met.What should you recommend?

A. Web servicesB. Serviced componentsC. .NET Remoting over HTTPD. .NET Windows service

Answer: B

Question: 14You are an enterprise application developer. You are designing an application that managesnames and descriptions for your companys products.To manipulate these items, the application requires the object that holds the strings to meet thefollowing criteria:

Be dynamically resizable. Be able to store duplicate entries. Expose methods to find all instances of the same text.

Original Resource :

Visit 70-549 Link : 70-549 Download PDF Link : 70-549





No comments:

Post a Comment