Microsoft Certifications Interview Questions

 
1.
If you need to configure Outlook Web Access to allow Microsoft Office documents to be opened but
not saved on public computers. What should you do?
A. Enable direct file access for public computers.
B. Enable Force WebReady Document Viewing when a converter is available for public
computers.
C. Add the Office file formats to the supported document types for WebReady Document
Viewing.
D. Add the Office file formats to the direct file access Block list.
2.
Suppose you need to configure the minimum permissions necessary for a user to be able to configure
mailbox databases on an Exchange Server 2007 computer. What should you do?
A. Delegate Exchange Administrator privileges to the user account at the organization level.
B. Add the user account to the Exchange Server Administrators role.
C. Add the user account to the Exchange Recipient Administrators role.
D. Add the user account to the Exchange Organization Administrators role.
3.
In your Exchange Server 2007 environment, a users mailbox was purged from the mailbox
server, and a backup of the mailbox database was restored to a recovery storage group. You
need to recover the purged mailbox to a production database. What should you do?
A. Run the Connect-Mailbox cmdlet from the Exchange server.
B. Run the Restore-Mailbox cmdlet from the Exchange server.
C. Run the Enable-Mailbox cmdlet from the Exchange server.
D. Run the Exmerge utility from the Exchange server.
4.
What is h-look and v-look
5.
You are creating a cluster continuous replication (CCR) cluster. You create a failover cluster and
you install the Mailbox server role named ExchMB1 on the active node. You need to install the
Mailbox server role on the passive node. What are two possible ways to achieve this goal? (Each
correct answer presents a complete solution. Choose two.)
A. Run the Enable-StorageGroupCopy -Identity ExchMB1SG1 command.
B. Run the Setup /roles:Mailbox command.
C. Run the Setup /newcms /CMSname:ExchMB1 command.
D. Select the Passive Clustered Mailbox Role check box in the Exchange Server 2007 Setup
6.
Explain Which of the following Receive connector usage types uses Exchange Server authentication as
its default authentication mechanism?
A. Client
B. Internal
C. Internet
D. Partner
7.
You need to find out the total size of a users mailbox. What should you do?
A. Run the Database Troubleshooter in the Exchange Troubleshooting Assistant.
B. Run the Get-MailboxDatabase cmdlet.
.C. Run the Get-MailboxStatistics cmdlet
D. Run the Get-Mailbox cmdlet.
8.
You are preparing to install the Mailbox server role on a new Exchange Server 2007 computer.
You need to optimize read and write performance on this server. You also need to provide
redundancy on this server. On which type of array should you place the mailbox database?
A. RAID 1 containing the operating system partition
B. RAID 1 dedicated
C. RAID 0 dedicated
D. RAID 10 dedicated
9.
Explain Users report that they are unable to access their mailboxes on an Exchange Server 2007
computer named Exch1. You verify that connectivity to the server is functioning and that server
hardware is functioning normally. Access to global catalogs is also functioning normally. You
need to report on the status of all required Exchange-specific and Exchange-dependent services.
What should you do?
A. From the Exchange Troubleshooting Assistant, run the Database Troubleshooter.
B. Run the Test-ServiceHealth -Server Exch1 cmdlet.
C. Run the Test-SystemHealth -Server Exch1 cmdlet.
D. Run the Get-ExchangeServer-ldentityExch1 cmdlet.
10.
Explain Your company normally does not allow out-of-office messages to be sent to users outside of your
Exchange 2007 organization. The company makes an exception for a business partner named
Northwind Traders. The SMTP domain for Northwind Traders is northwindtraders.com. You need
to configure your Exchange organization to allow out-of-office messages to be sent to e-mail
addresses in the northwindtraders.com domain. What should you do?
A. Add northwindtraders.com as a remote domain and set the appropriate options.
B. Add northwindtraders.com as an accepted domain and set the appropriate options.
C. Create a transport rule and set the appropriate options.
D. Create a Send connector for northwindtraders.com and set the appropriate options.
11.
If You want to trigger an alert when the number of messages in the mailbox stores receive queue
on an Exchange Server 2007 server reaches a defined value. What counter do you select when
configuring the alert? (The question uses the notation :.)
A. MSExchangeIS:Messages Queued For Submission
B. MSExchangeIS:Receive Queue Size
C. MSExchangeIS Mailbox:Messages Queued For Submission
D. MSExchangeIS Mailbox:Receive Queue Size
12.
If You move a conference room mailbox named ConfRm 1 from an Exchange Server 2003
computer to an Exchange Server 2007 computer. You need to convert the ConfRm 1 mailbox to
an Exchange 2007 resource mailbox. You need to ensure that the mailbox can be scheduled as a
resource. Which two cmdlets should you run? (Each correct answer presents part of the solution.
Choose two.)
A. Set-Mailbox-Identity Conf Rm1 -Type Room
B. Set-Mailbox-Identity Conf Rm1 -Type Regular
C. Set- MailboxCalendarSettings -Identity Conf Rm1 - AutomateProcessing AutoAccept
D. Set- MailboxCalendarSettings -Identity Conf Rm1 - AutomateProcessing Auto Update
13.
Marc is Marias assistant. Marc needs to be able to view all of the folders and subfolders in Marias
mailbox and to open and respond to Marias e-mail. You need to assign Marc the appropriate
permissions. What should you do?
A. Run the Add-ADPermission -Identity Maria User Marc AccessRights Self ExtendedRights
Send-As cmdlet.
B. Run the Add-MailboxPermission Identity Maria User Marc AccessRights ExternalAccount
cmdlet
C. Run the Add-MailboxPermission Identity Maria User Marc AccessRights FullAccess
cmdlet.
D. In the Active Directory Users and Computers management console, assign Marc the Allow-
Full Control permission for Marias user account.
14.
A senior manager at your company is under suspicion of forwarding sensitive information to a
competitor. The chief executive officer (CEO) wants to be provided with a copy of all messages
that the senior manager sends but does not want the senior manager to be aware that he is
under surveillance. Which of the following actions would you configure when setting up a
transport rule to screen the senior managers messages?
A. Blind carbon copy (Bcc) the message to addresses
B. Add a recipient in the To field addresses
C. Redirect the message To addresses
D. Silently drop the message
15.
You need to generate a report on all of the Exchange Server 2007 computer s in your Exchange
organization. The report must include:
Operating system version
Number of processors
Total physical memory
Number of storage groups
Number of mailbox databases
What should you do?
A. Run the Get-ExchangeServer | Format-List cmdlet.
B. Run the Get-OrganizationConfig cmdlet.
C. Run the Test-SystemHealth cmdlet.
D. Run the Health Check scan in the Exchange Best Practices Analyzer.
16.
Your Exchange Server 2007 environment is configured with cluster continuous replication (CCR).
The Microsoft Windows Cluster service (MSCS) is installed on two servers named Server1 and
Server2. The default cluster that runs on the MSCS cluster is named Clus1. The cluster mailbox
server (CMS) is named ExchCMS1. Currently Clus1 and ExchCMS1 are running on the Server1
cluster node, and the CCR replica is running on the Server2 cluster node. You need to back up
the CCR replica. In the backup application, which name should you specify?
A. Server1
B. Server2
C. ExchCMS1
D. Clus1
17.
A users e-mail account is configured to use POP3. The users mailbox is accidentally purged from
the Exchange Server 2007 Mailbox server. You restore a backup copy of the database that
contained the mailbox to a recovery storage group on the same server. The user reports that he
can not access his mailbox. You need to ensure that the user can access his mailbox. Before you
reconnect the mailbox, what should you do?
A. Enable POP3 access on the mailbox.
B. Move the mailbox to a standard storage group.
C. Instruct the user to use IMAP to connect to the mailbox.
D. Instruct the user to use Outlook Web Access to connect to the mailbox.
18.
You need to find out if users can log on to your Mailbox server directly by using Microsoft Office
Outlook. Which cmdlet should you run on the client network?
A. Test- ServiceHealth
B. Test- SystemHealth
C. Test- MAPIConnectivity
D. Test- OutlookWebServices
19.
Windows NT 4.0 is currently installed on the system you are using on an NTFS partition. You want to install Windows 2000 Professional and dual boot NT 4.0 and 2000 professional. What do you need to do?

A. Install Windows 2000 on the same folder that Windows NT is installed in
B. Install Windows 2000 on a separate partition from Windows NT 4.0
C. Upgrade Windows NT 4.0 to SP4 or later then install Windows 2000.
D. This cannot be accomplished
20.
A mailbox has 40 KB of mailbox rules. You need to move the mailbox from your Exchange Server
2007 computer to an Exchange Server 2003 computer at a remote site. How should you achieve
this goal?
A. Use the Exchange Task wizard in Exchange Server 2003.
B. Use the Move Mailbox wizard in Exchange Server 2007.
C. Run the Move-Mailbox cmdlet with the IgnoreRuleLimitErrors parameter.
D. Run the Move-Mailbox cmdlet with the IgnorePolicyMatch parameter.
21.
An Exchange Server 2007 computer name d Exch1 fails. You build a new Microsoft Windows
Server 2003 computer named Exch1 to replace the failed computer. Before you restore the
mailbox databases from backup, you need to restore the Exchange Mailbox server role on Exch1.
What should you do?
A. Restore the System State data and the Microsoft Information Store data.
B. Run the Setup /NewProvisionedServer/role:Mailbox command.
C. Run the Setup /m:lnstall /role: Mailbox command.
D. Run the Setup /m:RecoverServer command.
22.
You need to identify the Exchange Server 2007 server role that must be installed on a stand-
alone server. Which server role should you identity?
A. ClientAccess
B. Edge Transport
C. Hub Transport
D. Mailbox
23.
You need to configure your Exchange Server 2007 computer so that a specific distribution group
will allow out-of-office responses from the mailboxes of members of the distribution group. What
should you do?
A. On the distribution group properties, enable out-of-office responses to be sent to message
senders.
B. On the distribution group properties, enable delivery reports to be sent to message senders.
C. On the default remote domain policy, enable out-of-office responses.
D. Re-create the distribution group as a security group.
24.
What does the following command do?
Set-PublicFolder OHuman ResourcesO -ReplicationSchedule "Saturday.12:00 AM -
Monday.12:00
AMO
A. Specifies that the Human Resources public folder replicates only on Saturday and Sunday.
B. Specifies that the Human Resources public folder replicates only on Saturday, Sunday, and
Monday.
C. Specifies that the Human Resources public folder replicates only on Sunday.
D. Specifies that the Human Resources public folder always uses the default replication schedule
of the public folder database.
25.
Your environment contains t he following servers:
Mailbox server named ExchMb1
Client Access server named ExchCAS1
Standby Microsoft Windows Server 2003 computer named Server2
Two Hub Transport server s named ExchHub1 and ExchHub2 ExchHub1 fails.
You need to restore ExchHub1 to its pre- failure configuration
What should you do?
A. Rename Server2 to ExchHub1, and run the Setup /m:RecoverServer command on ExchHub1.
B. Rename Server2 to ExchHub1, and run the Setup /m:lnstall /role:HT command on ExchHub1.
C. On ExchHub2, run the Setup /m:RecoverServer command.
D. On ExchHub2, run the Setup /m:lnstall /role:HT command.
26.
What does the following Exchange Management Shell command do?
New-DistributionGroup -Name "Manufacturing" -OrganizationalUnit Users SAMAccountName
Manufacturing -Type Security
A. Creates a mail-enabled local security group called Manufacturing
B. Creates a mail-enabled universal security group called Manufacturing
C. Creates a universal distribution group called Manufacturing
D. Creates a dynamic distribution group called Manufacturing
27.
What is MCDBA
28.
Suppose You are the SMS administrator for ComPany.com. You use SMS 2003 SP1 and the Security
Update Inventory Tool for patch management. The Security Update Inventory Tool is installed
and configured with the default settings. The package created by the tool is named Security. you
force the security sync advertisement to run and download new information on updates. you force
the security advertisement to run on a test server named 1 to collect software update data. three
hours later you discover that there is no new data. you need to ensure that the current software
update data is sent from 1 to the sms server as soon as possible. What should you do?
A. Change the Security advertisement to run the Security program.
B. Change the Security program to run Scanwrapper.exe /cache /kick.
C. force 1 to run a hardware inventory cycle.
D. force 1 to run a software inventory cycle.
29.
You are the SMS administrator for ComPany.com. You use SMS 2003 SP1 and the Security
Update Inventory Tool for patch management. The Security Update Inventory Tool is installed
and configured with the default settings. A new set of updates is available.
You need to identify which computers are not compliant with a specific update. You want to
achieve this goal by using the least amount of administrative effort. What should you do?
A. View the Software Updates container of the SMS Administrator console to find the computers
that need the updates.
B. View Resource Explorer for each computer to identify applicable updates.
C. Create a query that selects computers that need the updates.
D. Run the Computers where a specific software update is applicable report to find the
computers that need the updates.
30.
You are the SMS administrator for ComPany.com. The company has a single SMS site. All site
roles are enabled. The Hardware Inventory Client Agent and the Software Inventory Client Agent
are disabled. The SMS Advanced Client is installed on all computers in the network. You want to
create a list of the computers on the network. The list must include the computer name, IP
address, last logged on user, and MAC address for each computer. You want all users on your
team to have access to this list. You are the only user on your team who has access to the SMS
Administrator console. You need to configure SMS to automatically create the list. Which two
actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create a report to display the required data.
B. Create a query to display the required data.
C. Configure permissions on the created report to allow users to view it.
D. Configure permissions on the created query to allow users to view it.
31.
You are the SMS administrator for ComPany.com. All servers run Microsoft Windows Server
2003. All desktop computers run Windows 98. You plan to deploy the SMS client software to all
desktop computers on the network. You want to install the SMS client software based on the
logon credentials. You need to create a logon script that will automatically install the SMS client
on all desktop computers. What are two possible ways to achieve this goal? (Each correct answer
presents a complete solution. Choose two.)
A. Configure the logon script to run Capinst.exe.
B. Configure the logon script to run CCMSetup.exe.
C. Configure the logon script to run Client.msi.
D. Configure the logon script to run Smsman.exe.
32.
Suppose You are the SMS administrator for ComPany.com. All servers run Microsoft Windows Server
2003. All desktop computers run Windows XP Professional. You install SMS 2003 SP1. You
configure the SMS site with advanced security. You install the SMS Advanced Client on all
computers. You need to discover all SMS clients by using Network Discovery.
Which Network Discovery method will be unavailable?br />A. DHCP
B. Domains
C. SNMP
D. SNMP Devices
E. Subnets
33.
Suppose You are the SMS administrator for ComPany.com. The SMS 2003 site hierarchy consists of a
single primary site. Servers run Microsoft Windows Server 2003. Desktop computers run
Windows XP Professional. Users who are members of a group named Help Desk want to access
computers remotely. The Remote Tools Client Agent is configured as shown in the exhibit.
**MISSING**
Users in the Help Desk group have full access rights on the Remote Assistance tool and SMS
Remote Tools. All SMS client computers use the default settings for the Remote Desktop service.
You need to instruct the users in the Help Desk group how to access computers remotely. What
should you instruct them to do?
A. In the SMS Administrator console, start Windows Diagnostics.
B. In the SMS Administrator console, start Remote Tools.
C. In the SMS Administrator console, start Remote Assistance.
D. In the SMS Administrator console, start Remote Desktop Client.
34.
Explain You are the SMS administrator for ComPany.com. All servers run Microsoft Windows Server
2003. All desktop computers run Windows XP Professional. The company has a single SMS 2.0
SP3 site. You plan to upgrade the SMS 2.0 site to SMS 2003 SP1.
You need to test specific upgrade tasks before implementing SMS 2003 SP1 in the production
environment. Which task should you avoid performing in a production environment?
A. installingInternet Information Services
B. upgrading to SMS 2.0 SP4
C. running the Deployment Readiness Wizard
D. runningSetup.exe /testdbupgrade SMS_
35.
Tell me You are the SMS administrator for ComPany.com. All servers run Microsoft Windows Server
2003. All desktop computers run Windows XP Professional. You want to install the SMS
Advanced Client on all computers on the network. You use the Client Push
Installation Wizard to install the SMS client software on the computers. You discover that some of
the computers failed to install the SMS client. You need to identify the cause of the problem.
Which three log files could you examine on both the SMS client and the SMS site server? (Each
correct answer presents a complete solution. Choose three.)
A. Ccm.log
B. Ccmsetup.log
C. Cidm.log
D. Client.msi.log
E. Ddm.log
F. Smsexec.log
36.
Can you explain You are the SMS administrator for ComPany.com. Your network consists of a single Active
Directory domain. The network contains a Microsoft SQL Server 7.0 SP3 computer. The SMS site
server runs Microsoft Windows 2000 Server SP3. The SMS site server is configured as a
management point, client access point, server locator point, and reporting point. You want to use
a server that runs Microsoft Windows NT Server 4.0 SP4 as a distribution point. The SMS site
currently uses the standard security mode. You need to migrate from the standard security mode
to the advanced security mode. You want to achieve this goal by using the least amount of
administrative effort. Which two actions should you perform? (Each correct answer presents part
of the solution. Choose two.)
A. Upgrade the computer you want to configure as a distribution point to Windows NT Server
4.0 SP6.
B. Upgrade the computer you want to configure as a distribution point to Windows 2000 Server
SP3.
C. Upgrade the SQL Server computer to SQL Server 2000 SP3a.Upgrade the SMS site server
to Windows Server 2003.
D. Extend the Active Directory schema.
37.
You are the SMS administrator for ComPany.com. Your SMS hierarchy consists of a single
primary site. Your SMS site consists of a single site server configured as a management point, a
client access point, a server locator point, and a distribution point. Employees use Pocket PC
devices. They only access the company network over a wireless connection. You want to use
SMS to manage the Pocket PC devices. You install and configure the Device Management
Feature Pack on the SMS site server. You now need to deploy the client software to the mobile
devices. What should you do?
A. Create an advertisement to install the Device Client on the computers running Microsoft
ActiveSync.
B. Create an advertisement to install the Device Client on the mobile devices.
C. Use Client Push Installation to install the Device Client.
D. Use a Web site to make the Device Client installation available.
38.
You are the SMS administrator for ComPany.com. The SMS 2003 site hierarchy consists of a
single primary site. The SMS site server is configured as a management point, client access
point, server locator point, and distribution point. The hardware on the management point must be
replaced. You need to transfer the management point
role to a different server. The only computer available for this purpose runs Microsoft Windows
NT Server 4.0 SP4. You need to prepare this computer to be a management point. What should
you do?
A. Install Windows 2000 Server SP3 and IIS.
B. Install Windows Server 2003 with the default settings.
C. Install SP6 for Windows NT Server 4.0 and IIS
D. Install Windows 2000 Server SP2.
39.
You are the SMS administrator for ComPany.com. All domain controllers run Microsoft Windows
Server 2003. All desktop computers run Windows XP Professional. You plan to install SMS 2003
SP1. You need to instruct the Active Directory administrator how to prepare Active Directory for
SMS integration. What instruction or instructions should you convey to the Active Directory
administrator? (Choose all that apply.)
A. Create the System Management container.
B. Create the SMS 2003 container.
C. Give appropriate rights to the System Management container.
D. Give appropriate rights to the SMS 2003 container.
E. Log on by using a user account that is a member of the Schema Admins group.
F. Run ExtADSchem.exe
40.
If You are the SMS administrator for ComPany.com. The Hardware Inventory Client Agent is
enabled with the default configuration settings. You need to ensure that the Hardware Inventory
Client Agent is run every Tuesday at 19:00. What should you do?
A. Configure the Hardware Inventory Client Agent to use a Full schedule.
B. Add an IDMIF file to each client that sets the new schedule.
C. Configure the Hardware Inventory Client Agent to use a Simple schedule.
D. Change the SMS_def.mof to comply with the new schedule.
41.
You are the SMS administrator for ComPany.com. The SMS hierarchy consists of a single
primary site. You use SMS to deploy a program that examines the latest version of the antivirus
software that is used by the computers on the network. Two advertisements use this program.
One advertisement runs daily on servers and portable computers. Another advertisement runs
weekly on desktop computers. You discover a security flaw in the program that collects the
antivirus software information. You need to prevent computers from running the program until you
fix the security flaw. You need to ensure that all other advertisements function normally. You want
to achieve this goal by using the least amount of administrative effort. What should you do?
A. Disable the program.
B. Delete the program.
C. Disable the Advertised Programs Client Agent.
D. Delete each advertisement.
42.
You are the SMS administrator for ComPany.com. ComPany uses Active Directory System
Discovery when configuring SMS to discover computers. The Organizational Unit (OU) structure
is shown in the following exhibit
**MISSING**
You need to configure Active Directory System Discovery to discover the computers in the
Information Services OU, but not the Help Desk OU.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A. Ensure that the Recursive search option is selected.
B. Query the local domain location.
C. Query the local forest location.
D. Ensure that the Recursive search option is not selected.
E. Create a custom LDAP or GC query that points to the Information Services OU.
43.
You are the SMS administrator for ComPany.com. All servers run Microsoft Windows Server
2003. All desktop computers run Microsoft Windows XP Professional. The company has a single
SMS site. The SMS Advanced Client is installed on all computers on the network. You need to
inventory the network to discover only the followinG.
1. The version of Microsoft Word that is being used by each computer
2. A list of applications that is installed on each computer
3. The version of the definition file named Av.dat that is used by the antivirus software
You need to modify the default settings for the SMS Software Inventory Client Agent to collect
this information. You need to achieve this goal by using the least amount of administrative effort.
Which entry or entries should you add? (Choose all that apply.)
A. *.exe
B. Av.dat
C. Winword.exe
D. *.*
44.
You are the SMS administrator for ComPany.com. The company has a single SMS site.
Employees use Windows mobile devices. You use the Device Client to manage these devices
with the SMS Device Management Feature Pack. You want to ensure that the mobile devices
meet the following security guidelines:
1. Passwords comply with complexity requirements.
2. Desktop computers use digital certificates while connecting over the virtual private
network (VPN).
You need to configure the mobile devices to comply with these guidelines.
Which two tasks should you perform? (Each correct answer presents part of the solution. Choose
two.)
A. Use an advertisement to run a Microsoft Visual Basic Scripting Edition (VBScript) script to
configure VPN settings.
B. Use an advertisement to run a Microsoft Visual Basic .NET assembly to configure VPN
settings.
C. Use Device Settings Manager to configure the VPN settings.
D. Use Device Settings Manager to configure the password policy.
45.
Suppose You need to ensure that transportation brokers are authenticated when they access the broker
Web site. Which action or actions should you take? (Choose all that apply)
A. Create a distribution list of authenticated users
B. Provide a facility for online registration
C. Provide a facility to view passwords
D. Provide secure storage of user names and passwords
E. Secure the exchange of user names and passwords between the client computer and the
server
F. Enable e-mail access for transportation brokers
Answer: B, D, E
46.
Suppose You are completing the technical specification for the new reservation application.
Which technique should you recommend for state management?
A. ASP.NET ViewState
B. Server-side database
C. Client-side cookies
D. Application cache
47.
Explain Which new business process or processes should be supported by the new solution?
(Choose all that apply)
A. Brokers can order transportation services
B. Vehicle scheduling capability is provided
C. Bar code readers are supported
D. Use of space on vehicles can be tracked
E. Brokers can track shipments
F. Customers can track parcels
Answer: A, D, E
48.
Suppose You are writing a list of integration requirements for your solution. Which requirement or
requirements should you include? (Choose all that apply)
A. Order data must be read from the accounting application
B. Shipment tracking must be read from an XML Web service
C. Customers must be redirected to another Web site to track shipments
D. Customers must be able to place orders by using an XML Web service
E. Order data must be written to the accounting application
F. Order data must be e-mailed to the salespeople
Answer: A, B, E
49.
Suppose You are creating the logical design for a use case named Customer updates customer profiles?.
Which object or objects should you include in the design? (Choose all that apply)
A. Data access object
B. Customer object
C. Flight object
D. Logging object
E. Airline object
50.
Suppose You need to enable brokers to track their own shipment. To meet this requirement, you need to
consider various specifications. Which four specifications should you consider? (Each correct
answer presents part of the solution)
A. Provide a Web-accessible form to authenticate brokers against a table of registered users
B. Provide a Web-accessible form to enable brokers to request vehicle routes for their shipments
C. Provide a Web-accessible form to query the database for broker shipments
D. Provide a Web-accessible form to generate waybill numbers
E. Identify a parcel in the database as part of a broker shipment
F. Relate a parcel to a specific broker
G. Track the weight of a parcel in the database
51.
Explain The invoice creation process must be dynamically monitored to track the following information:
Average number of seconds to create an invoice
Number of invoices created per second
Total number of successfully created invoices
Total number of failed attempts to create an invoice
Monitoring should occur with a minimum of development effort. What should you do?
A. Write statistics to the database and use SQL Query Analyzer to dynamically monitor the
statistics
B. Create a removable Microsoft .NET class to contain statistics. Configure the class as singleton
class. Write a utility that retrieves statistical information from this class
C. Write statistics to the application event log
D. Use custom performance counters
52.
Suppose You are writing the technical specification for your solution. You need to select a technology for
the new timesheet application. Which technology should you use?
A. an XML Web service
B. a Web application
C. a console application
D. a Windows Forms application
53.
Suppose You are preparing the functional specification for the new reservation application. Which two
functionalities should you specify? (Each correct answer presents part of the solution. Choose
two)
A. Localization
B. Monitoring of application performance
C. Secure storage of customer profile information
D. Availability of application for mobile phones and personal digital assistants
E. Integration with Active Directory
54.
Suppose You are writing the primary scenario of a use case named Customer retrieves a saved itinerary.
Which action or actions should be included?(Choose all that apply)
A. Application informs customers that no itineraries exist
B. Application informs customers that a saved flight is no longer available
C. Customer asks for saved itineraries
D. Application offers alternate flights
E. Application queries the database for saved itineraries
F. Application displays retrieved itineraries
55.
Explain Which business constraint poses the greatest potential risk to completing your project for Blue
Yonder Airlines?
A. The current IT staff must support the solution in the future
B. All testing scenarios and all necessary rework must be completed during the one-month testing
period.
C. The scheduling vendor will begin providing access by XML Web service in three months
D. The application must be completed within a five-month development period before it is tested
56.
Suppose Web application used by Team Leads and Business Planners requires an authentication
mechanism. Which pair of authentication technologies should you recommend?
A. IIS Anonymous authentication with ASP.NET Passport authentication
B. IIS Anonymous authentication with ASP.NET Forms authentication
C. IIS Basic authentication with SSL and ASP.NET Windows authentication
D. IIS Integrated Windows authentication with ASP.NET Windows authentication
E. IIS Basic authentication with SSL and ASP.NET Forms authentication
57.
Suppose You are writing a conceptual diagram of the modules that must be developed for your solution.
Which module or modules should be included?(Choose all that apply)
A. a Web application for Team Leads and Business Planners
B. a timesheet entry database
C. a billing database
D. a notification engine that sends timesheet entry reminders
E. a timesheet entry application
F. a Windows CE application
G. a utility that uploads information to the billing application
58.
Explain When the new solution is in place, parcel information and parcel history information must be
stored. You need to estimate the amount of data that will be generated by the new solution during
its first year of use. What is the approximate amount?
A. 824MB
B. 5GB
C. 8GB
D. 50GB
59.
Suppose You need to decide whether your conceptual design represents a complete solution.
Which four design artifacts are relevant to your decision? (Each correct answer presents part of
the solution. Choose four)
A. Unit test for authenticating brokers
B. Component prototypes for tracking shipments
C. Functional requirements for tracking shipments
D. Unit test cases for tracking shipments
E. Use cases for authenticating brokers
F. Functional requirements authenticating brokers
G. Component prototypes for authenticating brokers
H. Use cases for tracking shipments
60.
Suppose You are listing the operational requirements for the new reservation application.
Which requirement should you include?
A. Extensibility
B. Localization
C. Mantainability
D. Availability
E. Deployability
61.
Suppose You are writing the operational requirements document for your solution. Which should you
include?
A. The application must encrypt all time entry data on client computers and in the database, and
data must be encrypted when transmitted over the internet
B. The IT staff will be responsible for fixing bugs in the code
C. The IT staff must be alerted to application problems
D. The application can have no single point of failure
62.
Suppose You are writing the technical specification for your solution. Your new timesheet application must
be able to access timesheet entry data. You need to specify the technology that will be used for
accessing this data. Your solution must require the minimum development effort. Which
technology should you use?
A. a SQLConnection class
B. a .NET Remoting object that uses TCP channel and binary formatting
C. an XML Web service proxy class
D. an interop assembly
63.
Suppose You are establishing a policy to measure the effectiveness of your deployment process.
You decide to track one or more phases of development to identify defects. Which phase or
phases should you track?(Choose all that apply)
A. Design and analysis
B. Development
C. Stabilization
D. Requirements
64.
You are validating the physical design for your solution. Which element or elements should be
included in the design?(Choose all that apply)
A. algorithms for scheduling vehicles
B. scalability to meet increased usage
C. authentication of transportation brokers
D. online registration facility for transportation brokers
E. interface to the bar code readers
65.
If you are writing the functional specification for your solution. You must include the customer
pricing requirements. Which requirement or requirements should you include? (Choose all that
apply)
A. Pricing data must be encrypted
B. Each user must be uniquely identified
C. Content must be personalized by user
D. Order data must be read from the accounting application
66.
Suppose You are designing a strategy to migrate data from the existing timesheet application to the new
application. Which tool or technology should you use?
A. XML Schema Definition tool (xsd.exe)
B. COM interoperability
C. Microsoft SQL Server Data Transformation Services (DTS)
D. Microsoft SQL Server replication
67.
Explain Which new module or modules should you develop for Trey Research? (Choose all that apply.)
A. An application to export laboratory results
B. A data store
C. A Web application for trucking supervisors
D. An automated report generator
E. An application to import laboratory reports
F. An OCR interface
G. An IVR application
68.
Before you release the solution, you need to develop a process to validate and enforce an
appropriate level of quality. Which three statistics should you use?
(Each correct answer presents part of the solution)
A. Number of defects per component
B. Number of defects per thousand lines of source code
C. Number of defects by developer
D. Percentage of successful builds
E. Percentage of requirements tested
F. Number of defects detected to date
G. Number of defects corrected to date.
69.
Suppose You are validating the physical design of a data a data layer class that will return a set of time
entries from the timesheet database. This class will be used by the Web application for Team
Leads and Business Planners and, indirectly, by the new timesheet application.
The class must use connection pooling, and it must be as secure and as flexible as possible. You
need to specify a Microsoft SQL Server authentication strategy that meets these requirements.
Which strategy should you use?
A. The data class uses SQL Server authentication with an application specific SQL Server
account. The account name and password are embedded in a connection string
B. The data class uses Windows authentication when connecting to the database and
impersonates a specific account created for operations on the database
C. The data class uses Windows authentication when connecting to the database and
impersonates the application user
D. The data class uses SQL Server authentication with the SQL Server sa account
70.
Suppose You are creating the physical design for the customer category data model. For reporting
purposes, you want to optimize access to customer category data. You define a Customer table
and a Category table. What should you do next?
A. Define three foreign key columns in the Category table, such that each column references a
different parent row in the Customer table. Define indexes on the foreign key columns.
B. Define three foreign key columns in the Customer table, such that each column references a
different parent row in the Category table. Define indexes on the foreign key columns.
C. Define a foreign key column in the Category table that references the parent row in the
Customer table. Define an index on the foreign key column.
D. Define a foreign key column in the Customer table that references the parent row in the
Category table. Define an index on the foreign key column.
71.
Suppose You need to recommend standard development processes for your solution. Your
recommendations must assist the development team in learning to use the Microsoft .NET
Framework as quickly as possible. Which process or processes should you recommend?(Choose
all that apply)
A. Create an automated build process
B. Install error-tracking software
C. Ensure that all assemblies pass unit testing
D. Permit individual developers to use any Microsoft .NET language
E. Hold regular code reviews
72.
Suppose Your team builds a daily release of the timesheet application for testing by the quality assurance
(QA) team. You find that the volume of bugs is threatening your project schedule. The following
example is a typical bug:
One method should return a dataset that is based on a date range given as input parameters.
However, when the method queries the database, it erroneously interchanges the beginning date
and the end date. An empty dataset is always returned.
You need to minimize these kinds of bugs using a minimum of development effort and
QA effort. What should you do?
A. Require more frequent builds
B. Require the QA team to perform more integration testing
C. Require engineers to perform complete integration testing before submitting code
D. Require engineers to perform adequate unit tests before submitting code
73.
Suppose You need to create a physical design that meets the monitoring requirements of Fabrikam, INC.
What should you do?
A. Create and use a new event log to record each customer logon event
B. Use the built-in ASP.NET performance counters to monitor application load
C. Use the Trace class to record each customer logon event
D. Create and use new NumberOfItems performance counters to monitor active customer sessions
74.
Suppose A database architect on your team prepares a logical data model. The model includes entries that
correspond to clients, projects and timesheet entries. You are reviewing the model. Which entity
relationship or relationships should be included?(Choose all that apply)
A. a Project entity is the parent of a TimesheetEntry entity
B. a Client entity is the child of a TimesheetEntry entity
C. a many-to-many relationship exists between a Client entity and a Project entity
D. a many-to-many relationship exists between a Project entity and a Timesheet Entry entity
E. a Client entity is the parent of a Project entity
F. a Client entity is the parent of a TimesheetEntry entity
75.
Suppose You are validating your physical design. You need to ensure that the design maps to the
categorization requirements for customer pricing. Which member should you include in the
design?
A. A GetPrice method of a Product class with no parameters
B. A Price property of a Product class
C. A Price property of a Customer class
D. A GetPrice method of a Product class with a single Customer Object parameter
76.
Suppose You are analyzing the feasibility of your solution. You need additional information to decide
whether the solution is technically possible. Which additional information do you need?
A. A copy of the existing timesheet application
B. A prototype of the Web application that will be used by Team Leads and Business Planners
C. A list of the different models of Windows CE devices that need to be supported
D. API information and requirements related to integration with the billing application
77.
Explain The Web application used by Business Planners generates many types of reports. One type
displays billing information over specified timeframes. The other selects a lawyer and a timeframe
and the report displays the average number of minutes billed by that lawyer per day and the
average number of minutes billed to each client per day over that timeframe. You must ensure
that this report is generated with a minimum network traffic. What should you do?
A. Use Microsoft SQL Server indexes to optimize the data calculations
B. Implement the calculations in a business layer class
C. Implement the calculations in a data layer class
D. Use Microsoft SQL Server stored procedures for the data calculations
78.
Suppose You need to implement online interactive user assistance for the new reservation application.
What should you do?
A. Create a manual that can be downloaded from the Web site
B. Create a compiled help module and use context-sensitive help for all screen elements
C. Implement ToolTips to provide information about all screen elements
D. Use the ALT attribute to provide a short textual description for all images and audio files.
79.
Explain Your functional specification includes the following statement: User identity and a tirnestarnp
must be captured when a driver authenticates to the IVR application or the driver Web
application. In your technical specification, you need to specify the target where logged
messages should be written. Which target should you specify?
A. The sysmessages table in the Microsoft SOL Server master database
B. The Security event log
C. A table in the applications Microsoft SOL Server database
D. A custom event log
80.
Suppose You need to select a strategy that will provide detailed usage information for the new reservation
application. Information must be provided with a minimum development effort. What should you
do?
A. Use Microsoft .NET performance counters in the application
B. Create a Microsoft Management Console(MMC) snap-in for the application
C. Add Windows Management instrumentation to the application
D. Use the application?s configuration file to enable and disable logging
81.
Suppose You are writing a document that identifies potential project risks. Which business constraint poses
the greatest potential risk?
A. The solution must be hosted by Fabrikam, Inc
B. Testing and deployment of the customer Web site must be complete in six months
C. The shipping partner will deploy the XML Web service in four months
D. All customers will try to place orders at the end of the month
82.
Suppose You are designing the implementation of the interface to the accounting application. You need to
ensure that the new application can communicate with the accounting application. What should
you do?
A. Create an XML Web service class
B. Create TcpClient objects
C. Create TcpListener objects
D. Create an XML Web service proxy class by using Wsdl.exe
83.
You must ensure that the new reservation application can be monitored while it is running. Which
approach should you use?
A. TraceSwitch objects
B. Diagnostic tools
C. PerformanceCounter objects
D. Windows Management Instrumentation Job Object provider
84.
If you are creating the logical design for the new reservation application. Which entity or entities should you include? (Choose all options that apply)
A. Airport
B. Flight
C. Customer
D. Gate
E. City
85.
Suppose You are validating your conceptual design in terms of scalability. Which requirement will probably
have the greatest impact on scalability?
A. Scheduling additional vehicles
B. Using the interface to bar code readers
C. Reporting use of space in vehicles
D. Handling additional broker shipments
86.
Explain Which data item or items should you add to the existing applications? (Choose all that apply)
A. Waybill information
B. Broker identification information
C. Depot information
D. Parcel dimensions
E. Parcel routing information
F. Information about use of space on vehicles
87.
Explain Which performance standard should you use for your solution?
A. Vehicle usage of at least 80 percent of total capacity
B. Database size of less than one terabyte
C. CPU utilization of less than 50 percent in the database server
D. Screen response time of two seconds or less
88.
Suppose You create a Visual Studio .NET setup project to distribute an application. You add a SQL script
named XYZDB.SQL. You must ensure that the SQL script is executed during the installation
process. What should you do?
A. Add a custom action to your setup project.
Select XYZDB.SQL as the source path.
B. Add a batch file to your setup project to execute XYZDB.SQL.
Add a launch condition to the setup project.
Set the Condition property to the batch file.
C. Create a new Visual Studio .NET project that executes XYZDB.SQL.
Include the new project with your setup project.
Add a custom action that launches the new project during installation.
D. Add a launch condition to your setup project.
Set the Condition property to XYZDB.SQL.
89.
Suppose You use Visual Studio .NET to develop a Windows-based application. Your application will
display customer order information from a Microsoft SQL Server database. The orders will be
displayed on a Windows Form that includes a DataGrid control named XYZGrid1. XYZGrid1 is
bound to a DataView object. Users will be able to edit order information directly in XYZGrid1.
You must give users the option of displaying only edited customer orders and updated values in
XYZGrid1.
What should you do?
A. Set the RowStateFilter property of the DataView object to
DataViewRowState.ModifiedOriginal.
B. Set the RowStateFilter property of the DataView object to DataViewRowState.ModifiedCurrent.
C. Set the RowFilter property of the DataView object to DataViewRowState.ModifiedOriginal.
D. Set the RowFilter property of the DataView object to DataViewRowState.ModifiedCurrent.
90.
Suppose You develop a Windows-based application XYZ App by using Visual Studio .NET. XYZApp
implements ADO.NET objects to call Microsoft SQL Server stored procedures. Your database
administrator is responsible for coding and maintaining all stored procedures. Periodically, the
administrator modifies the stored procedures.
At run time, your application code must discover any changes in the way that values are passed
to and returned from the stored procedures.
Which ADO.NET object and method should you use?
A. CommandBuilder.RefreshSchema
B. CommandBuilder.DeriveParameters
C. SqlCommand.CreateParameter
D. SqlDataAdapter.GetFillParameters
91.
Suppose You develop a Windows-based application XYZiApp by using Visual Studio .NET. XYZiApp uses
a SqlConnection object for database access.
You typically run XYZiApp on a computer that has limited RAM and hard disk space. After the
code finishes using the SqlConnection object, you must ensure that the connection is closed and
that any resources consumed by the object are released immediately.
What should you do?
A. Call the Finalize method of the SqlConnection object.
B. Call the Dispose method of the SqlConnection object.
C. Set the SqlConnection object equal to Nothing.
D. Set the SqlConnection object equal to
92.
Suppose You execute a query on your external Oracle database named XYZSalesDate by using an
OleDbCommand object. The query uses the Average function to return a single value that
represents the average price of products in the inventory table. You want to optimize performance
when you execute this query.
To execute this query from your ADO.NET code, you need to use a method of the
OleDbCommand object. Which method should you use?
A. ExecuteNonQuery
B. ExecuteScalar
C. ToString
D. ExecuteReader
93.
Suppose You develop a Windows-based application XYZApp that includes several menus. Every top-level
menu contains several menu items, and certain menus contain items that are mutually exclusive.
You decide to distinguish the single most important item in each menu by changing its caption
text to bold type.
What should you do?
A. Set the DefaultItem property to True.
B. Set the Text property to ?True?.
C. Set the Checked property to True.
D. Set the OwnerDraw property to True.
94.
Suppose You use Visual Studio .NET to create a Windows-based application for XYZ Inc. The application
includes a form that contains several controls, including a button named exitButton. After you
finish designing the form, you select all controls and then select Lock Controls from the Format
menu.
Later, you discover that exitButton is too small. You need to enlarge its vertical dimension with
the least possible effort, and without disrupting the other controls.
First you select exitButton in the Windows Forms Designer. What should you do next?
A. Set the Locked property to False.
Set the Size property to the required size.
Set the Locked property to True.
B. Set the Locked property to False.
Use the mouse to resize the control.
Set the Locked property to True.
C. Set the Size property to the required size.
D. Use the mouse to resize the control.
95.
Suppose You develop a Windows-based application that includes the following code segment. (Line
numbers are included for reference only.)
01 Public Sub password_Validating (ByVal sender As _
02 Object, ByVal e As _.
03 System.ComponentModel.CancelEventArgs)
04 Handles password.Validating
05 If ValidPassword() = False Then
06 Insert new code.
07 End If
08 End Sub
You must ensure that users cannot move control focus away from textPassword if
ValidPassword returns a value of False. You will add the required code on line 6.
Which code segment should you use?
A. e.Cancel = True
B. sender = textName
C. password.AcceptsTab = False
D. password.CausesValidation =False
96.
Suppose You develop a Windows Form that provides online help for users. You want the help functionality
to be available when users press the F1 key. Help text will be displayed in a pop-up window for
the text box that has focus.
To implement this functionality, you need to call a method of the HelpProvider control and pass
the text box and the help text.
Which method should you call?
A. SetShowHelp
B. SetHelpString
C. SetHelpKeyword
D. ToString
97.
You are preparing a localized version of a Windows Form named XYZLocal. Users of XYZLocal
speak a language that prints text from right to left. User interface elements on the form need to
conform to this alignment.
You must ensure that all user interface elements are properly formatted when the localized
Windows Form runs. You must also ensure that XYZLocal is easy to update and maintain.
What should you do?
A. Set the RightToLeft property of each control on the form to Yes.
B. Set the RightToLeft property of the form to Yes.
C. Set the Language property of the form to the appropriate language.
D. Set the Localizable property of the form to True.
98.
As a developer at XYZ you develop a new sales analysis application that reuses existing data
access components. One of these components returns a DataSet object that contains the data for
all customer orders for the previous year.
You want your application to display orders for individual product numbers. Users will specify the
appropriate product numbers at run time.
What should you do?
A. Use the DataSet.Reset method.
B. Set the RowFilter property of the DataSet object by using a filter expression.
C. Create a DataView object and set the RowFilter property by using a filter expression.
D. Create a DataView object and set the RowStateFilter property by using a filter expression..
99.
Suppose You develop a Windows-based application. The application uses a DataSet object that contains
two DataTable objects. The application will display data from the two data tables. One table
contains customer information, which must be displayed in a data-bound ListBox control. The
other table contains order information, which must be displayed in a DataGrid control.
You need to modify your application to enable the list box functionality. What should you do?
A. Use the DataSet.Merge method.
B. Define primary keys for the DataTable objects.
C. Create a foreign key constraint on the DataSet object.
D. Add a DataRelation object to the Relation collection of the DataSet object.
100.
Tell me What is the difference between Remoting and Client/Server application?
101.
Suppose You create three Windows services named EXService1, EXService2, and EXService3. You want
to install all three services on a computer named XYZA by using the Installer tool (Installutil.exe).
On the command line of XYZA, you enter and run the following command:
Installutil EXService1 EXService2 EXService3
During the installation process, EXService3 throws an installation error. The installation process
completes.
How many of the three services are now installed on XYZ1?
A. None
B. One
C. Two
D. Three.
102.
Suppose You are planning to create a DataSet object named EXDataSet to be used in a bond-trading
application.
Several developers will need to write code to manipulate EXDataSet, and you want to ensure that
myDataSet is easy for them to use. You decide to create EXDataSet as a strongly typed data set.
Which two actions should you take? (Each correct answer presents part of the solution. Choose
two)
A. Create an XSD schema that defines EXDataSet.
B. Create an XDR schema that defines EXDataSet.
C. Create a class for EXDataSet that is based on the schema and that inherits from the DataSet
class.
D. Create a class for EXDataSet that is based on the schema and that inherits from the
XmlSchema class.
E. Create a key pair for EXDataSet by using the Strong Name tool (Sn.exe).
103.
Suppose You create a serviced component named Scheduler. Scheduler is registered in a library
application. The Scheduler methods parse String objects into Date Time objects.
You write a console application named EXCoverage.exe to test each method in Scheduler. You
want Coverage.exe to test Scheduler for multiple cultures to verify its globalization support.
What should you do?
A. Create a CultureInfo object for each culture locale before calling the Scheduler methods.
B. Create a RegionInfo object for each culture locale before calling the Scheduler methods.
C. Set the current thread?s CurrentCulture property to each culture locale before calling the
Scheduler methods.
D. Create a EXCoverage.exe.config file and add a element to the configuration file for
each culture locale.
104.
Suppose You are creating an XML Web service named ListBoxService. This service provides content,
such as states, countries, and geographical regions, for use in drop-down list boxes.
ListBoxService contains a Web method named RetrieveRegionsListBox. This method runs a
DataSet object that contains every geographical region in the world.
RetrieveRegionsListBox calls a Microsoft SQL Server database to load the DataSet object with
region data. You want to minimize the amount of time the method takes to return to the caller.
What should you do?
A. Use a stored procedure to return the data.
B. Store each DataSet object by using the Session object.
C. Set the BufferResponse property of the WebMethod attribute to false.
D. Set the CacheDuration property of the WebMethod attribute to an interval greater than zero.
105.
Suppose You are debugging a visual studio .Net application named XYZApp. The application produces an
Xml documents object and then consumes the same object. This object moves data in the
application. The object has no schema, but it contains a declaration line that you must inspect.
You decide to transform the XML code and its declaration into a string for easy inspection.
What should you do?
A. Assign the ToString method of the Xml Document object to a string variable.
B. Assign the OuterXml property of the Xml document object to a string variable
C. Assign the OuterXml property of the Xml document element property of the Xml document
object to a string variable.
D. Use the WriteContentTo method of the XmlDocument object to write the document into a
MemoryStream object. Use the GetXml method of the DataSet object to get a string version of
the document.
106.
Suppose You create a Windows service that processes XML messages placed in a MSMQ queue. You
discover that the service is not functioning properly.
You need to debug the service to correct the program.
What should you do?
A. Start the Windows service.
Then attach a debugger to the process.
B. Attach a debugger to the Windows service.
Then start the Windows service.
C. Start the Windows service.
Then run the .NET Services Installation tool (Regsvcs.exe).
D. Place a breakpoint in the Main method of the Windows service.
Then run the application within the Visual Studio .NET integrated development environment
(IDE).
107.
You create a .NET Remoting object named EXPatientinfo that exposes medical patient
information.
Because of the confidential nature of the information, you must ensure that the data remains
secure.
You want client applications to connect to EXPatientinfo over a secure communication channel.
You want to accomplish this task by writing the minimum amount of code.
What should you do?
A. Create your own host application and use a TcpChannel and BinaryFormatter.
B. Create your own host application and use an HttpChannel and a SoapFormatter.
C. Install EXPatientinfo in an Internet Information Services (IIS) virtual directory.
Configure EXPatientinfo to use a TcpChannel and a BinaryFormatter.
Configure IIS to use SSL.
D. Install EXPatientinfo in an Internet Information Services (IIS) virtual directory.
Configure EXPatientinfo to use an HttpChannel and a SoapFormatter.
Configure IIS to use SSL.
108.
You are creating an XML Web service that processes highly confidential messages. The service
exposed a Web method named RetrieveMessage that takes as input a code name and returns an
encrypted message.
You create a SOAP extension and override the extension?s ProcessMessage method so that you
can encrypt the message before it is sent back to the caller.
You need to encrypt only the data within the RetrieveMessageResult node of the SOAP
response. You create a function named EncryptMessage that encrypts the
RetrieveMessageResult node. You need to ensure that this method gets called before sending
the message back to the caller.
During which SoapMessageStage should you call EncryptMessage?
A. BeforeSerialize
B. AfterSerialize
C. BeforeDeserialize
D. AfterDeserialize
109.
You have DataSet object named LoanCustomersDataSet that contains customers serviced by the
loan department of XYZ. You receive a second DataSet that contains customers serviced by the
asset management department of XYZ. Both objects have the same structure.
You want to merge assetCustomersDataSet into LoanCustomersDataSet and preserve the
original values in loanCustomersDataSet.
Which code segment should you use?
A. loanCustomersDataSet.Merge (assetCustomersDataSet)
B. loanCustomersDataSet.Merge (assetCustomersDataSet, True)
C. assetCustomersDataSet.Merge (loanCustomersDataSet)
D. assetCustomersDataSet.Merge (loanCustomersDataSet, True)
110.
You are creating an XML Web service named XYZService. This service has a function named
WriteMessage that writes messages to a flat file in the C:EXServiceLog directory..
You want to implement security for WriteMessage so that WriteMessage and all the code it calls
can write messages only to the EXServiceLog directory.
Which code segment should you use?
A. Dim filePermission As New
FileIOPermission_(FileIOPermissionAccess.Write, ?C:EXServiceLog?)
filePermission.Demand()
B. Dim filePermission As New
FileIOPermission_(FileIOPermissionAccess.Write, ?C:EXServiceLog?)
filePermission.Deny()
C. Dim filePermission As New
FileIOPermission_(FileIOPermissionAccess.Write, ?C:EXServiceLog?)
filePermission.PermitOnly()
D. Dim filePermission As New
FileIOPermission_(FileIOPermissionAccess.Write, ?C:EXServiceLog?)
filePermission.Assert()
111.
You have a DataSet object named myDataSet. This object contains two DataTable objects
named Customers and Orders. Customers has a column named CustomerID, which is unique to
each customer.
Orders also has a column named CustomerID. You want to use the GetChildRows method of the
DataRow object to get all orders for the current customers.
What should you do?
A. Add a foreign key constraint on CustomerID of Orders between Customers and Orders.
B. Add a data relation to myDataSet on OrderID between Customers and Orders.
C. Create a unique constraint on CustomerID of Customers..
D. Create a primary key on CustomerID of Customers.
112.
Your company frequently receives product information from external vendors in the form of XML
data.
You receive XML document files, an .xdr schema file, and an .xsd schema file.
You need to write code that will create a typed DataSet object on the basis of product information.
Your code will be used in several Visual studio .NET applications to speed up data processing.
You need to create this code as quickly as possible.
What should you do?
A. Create the code manually.
B. Use XmlSerializer.Serialize to generate the code.
C. Use the XmlSerializer.Deserialize to generate the code.
D. Use the Xml Schema Definition tool (Xsd.exe) to generate the code.
113.
Suppose You are creating an XML Web service that provides a daily quotation from literary works to its
customers. This quotation is requested in many different languages, thousands of times every
day, and by thousands of Web sites operating many different platform.
A Web method named GetEXQuotes takes a languageID as input. GetEXQuotes uses this
language ID to retrieve a translated version of the daily quotation from a Microsoft SQL Server
database and to return that quotation to the customer.
You want to minimize the time it takes to return the translated version.
What should you do?
A. Store each translated quotation by using the Cache object.
B. Store each translated quotation by using the Session object.
C. Set the BufferResponse property of the WebMethod attribute to false.
D. Set the CacheDuration property of the WebMethod attribute to an interval greater than zero.
114.
How to create a serviced component named SessionDispenser. This computer is in the XYZ.Utilities
assembly and is registered in a COM+ server application. SessionDispenser has multiple callers.
You discover that there are logic problems in the Create New Session method. You want to
debug any calls to this method.
What should you do?
A. Open the SessionDispenser solution.
Set a breakpoint on the CreateNewSession method.
Start the debugger.
B. Attach the debugger to the client process.
Set a breakpoint on the SessionDispenser.CreateNewSession method.
C. Attach the debugger to the XYZ.Utilites.exe process.
Set a breakpoint on the CreateNewSession method.
D. Attach the debugger to a Dllhost.exe process.
Set a breakpoint on the CreateNewSession method.
115.
Suppose You create an XML Web service named WeatherService. This service contains a Web method
named RetrieveWeather. RetrieveWeather takes as input a city named and returns the current
weather conditions for that city.
You need to provide callers of this service with the URL they need to issue an HTTP-GET against
WeatherService.
Which URL should you use?
A. http://XYZSrv/AppPath/WeatherService.asmx/cityname=somecity
B. http://XYZSrv/AppPath/WeatherService.asmx/RetrieveWeather?cityname=somecity
C. http://XYZSrv/AppPath/WeatherService/RetreieveWeather.asmx?cityname=somecity
D. http://XYZSrv/AppPath/WeatherService/RetrieveWeather?cityname=somecity
116.
Suppose XYZ Inc. provides a credit card processing application for its customers. The current application
supports only computers that run on a Microsoft Windows operating system.
You are asked to rewrite the current application as a .NET application. This .NET application
does not need to be backward compatible with the current application.
You must ensure that this new application meets the following requirements:
? Must support asynchronous processing.
? Must be able to pass data through firewalls.
? Must pass only SOAP-Compliant formatted data validated by using an XSD schema.
? Must not be limited to client computers running on a Microsoft operating system.
You want to accomplish this task by using the minimum amount of development effort.
Which type of .NET application should you use?
A. Windows service
B. XML Web service
C. Serviced component
D. .NET Remoting object
117.
Suppose You are creating a .NET Remoting object named PropertyCache. PropertyCache will hold a
Hashtable object or name/value pairs.
A variety of remote client applications will communicate with PropertyCache to set and get
property values. You need to ensure that properties set by one client application are also
accessible to other client applications.
Which two actions should you take? (Each correct answer presents part of the solution. Choose
two)
A. Configure PropertyCache to be a client-activated object.
B. Configure PropertyCache to be a server-activated Singleton object.
C. Configure PropertyCache to be a server-activated SingleCall object.
D. Derive the PropertyCache class from MarshalByRefObject and override
InitializeLifetimeService() to return null.
E. Mark the PropertyCache class with the Serializable attribute.
Implement the ISponsor interface in the PropertyCache class.
F. Implement the ISerializable and ILease interfaces in the PropertyCache class.
Implement ILease.CurrentLeaseTime to return Int32.MaxValue.
118.
You create an XML Web service named TimeService. Each time TimeService is started, it checks
for the existence of an event log named TimeServiceLog. If TimeServiceLog does not exist,
TimeService creates it.
You discover that when TimeService creates TimeServiceLog, it throws a
System.Security.SecurityException. The exception includes the following message: ?Requested
registry access is not allowed?. You need to resolve this problem.
What should you do?.
A. Configure Inetinfo.exe to run as the local administrator user account.
B. Create an installer for TimeService, and create the new event log in the installer code.
C. Modify the Web.config file by adding an identity element to impersonate the LOGON user
specified by Internet Information Services (IIS).
D. Modify the permissions of the
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesEventlog registry key to give
full control to the IUSR_computername user account.
119.
Suppose You create an XML Web service named XYZService. You must ensure that this service meets
the following URL authorization requirements.
? Anonymous access must be disabled for XYZService.
? An authenticated user named User1 cannot access XYZService.
? All other authenticared users can access XYZService.
You configure Internet Information Services (IIS) to meet these requirements. You now need to
configure the authorization section in the Web.config file to properly authorize the users.
Which code segment should you use?
A. .

B.

C.


D.

120.
Suppose You are creating an ASP.NET page for selling movie tickets. Users select a region, and then they
select from a list of cities in that region. The site displays the names and locations of movie
theaters in the city selected by the user.
Your company, XYZ Brothers, maintains a list of theaters in a database table that includes the
city, name, and street address of each theater. You want to minimize the time required to retrieve
and display the list of theater names after a user selects the region and city.
What should you do?
A. Modify the connection string to add the packet size property and set its values to 8192.
B. Add the following directive to the page:
OutputCache VaryByParam=?city?
C. Add the following directive to the page:
OutputCache VaryByControl=?region;city?
D. Modify the connection string to keep your database?s connection pool as small as possible.
121.
Suppose You are creating an ASP.NET page for XYZ. You create a DataGrid control that displays past
purchases made by the user. The DataGrid control is populated from an existing database when
the page is created.
The page contains TextBox controls that allow users to update their personal information, such as
address and telephone number.
You need to ensure that the page is refreshed as quickly as possible when users update their
contact information.
What should you do?
A. Set the Enable property of the DataGrid control to false.
B. Set the EnableViewState property of the DataGrid to false.
C. Write code in the Page.Load event handler that populates the DataGrid control only when the
IsPostBack property of the page is false.
D. Write in the Page.Load event handler that populates the DataGrid control only when the
IsPostBack property of the page is true.
122.
You ASP.NET application manages order entry data by using a DataSet object named
EXorderEntry. The EXorderEntry object includes two DataTable objects named orderNames and
OrderDetails. A ForeignKeyConstraint object named orderDetailsKey is defined between the two
DataTable objects.
You attempt to delete a row in orderNames while there are related rows in OrderDetails, and an
exception is generated.
What is the most likely cause of the problem?
A. The current value of OrderDetails.KeyDeleteRule is Rule.Cascade.
B. The current value of OrderDetails.KeyDeleteRule is Rule.SetNull.
C. The current value of OrderDetails.KeyDeleteRule is Rule.SetDefault.
D. The current value of OrderDetails.KeyDeleteRule is Rule.None.
123.
You create an ASP.NET page that uses images to identify areas where a user can click to initiate
actions. The users of the application use Internet Explorer.
You want to provide a pop-up window when the user moves the mouse pointer over an image.
You want the pop-up window to display text that identifies the action that will be taken if the user
clicks the image.
What should you do?
A. For each image, set the AlternateText property to specify the text you want to display, and set
the ToolTip property to True.
B. For each image, set the ToolTip property to specify the text you want to display.
C. In the onmouseover event handler for each image, add code that calls the RaiseBubbleEvent()
method of the System.Web.UI.WebControls.Image class.
D. In the onmouseover event handler for each image, add code that calls the ToString() method
of the System.Web.UI.WebControls.Image class.
124.
You create an ASP.NET application that produces sales reports for the XYZ corporation.
The sales data is stored in a Microsoft SQL Server database that is used for transaction
processing. The application consists of complex Transact-SQL statements.
Many users report that the report generation is taking longer to run each day. You need to
improve response times.
What are two possible ways to achieve this goal? (Each correct answer presents a complete
solution. Choose two)
A. Use an OleDbDataAdapter indexes exist on the SQL Server tables.
B. Ensure that appropriate indexes exist in the SQL Server tables.
C. Rewrite your SQL statements to use aliases for all table names.
D. Rewrite your direct SQL statements as stored procedures and call the stored procedures from
your application.
E. Configure queries to run in the security context of the user who is running the query.
125.
You are creating a Web site for XYZ. You receive product lists in the form of XML documents.
You are creating a procedure to extract information from these XML documents according to
criteria that your users will select.
When a user makes a request, you want the results of these requests to be returned as quickly
as possible. What should you do?
A. Create an XmlDataDocument object and load it with the XML data.
Use the DataSet property of the object to create a DataSet object.
Use a SQL SELECT statement to extract the requested data.
B. Create an XmlDataDocument object and load it with the XML data.
Use the SelectNodes method of the object to extract the requested data.
C. Create an XPathDocument object and load it with the XML data.
Call the CreateNavigator method to create an XPathNavigator object.
Call the Select method of the XPathNavigator object to run an XPath query that extracts the
requested data.
D. Create an XmlReader object.
Use the Read method of the object to stream through the XML data and to apply an Xpath
expression to extract the requested data.
126.
You are creating an ASP.NET page for a travel service. The page contains a CheckBoxList
control that contains travel destinations. Customer can select favorite destinations to receive
weekly e-mail updates of travel packages.
The CheckBoxList control is bound to a database table of possible destinations. Each destination
is ranked according to its popularity. You modify the page to sort the destination list by rank, from
the most popular to the least popular. The list has three columns.
You want the most popular destination to be on the top row of the check box list at run time.
Which property setting should you use for the CheckBoxList control?
A. Set the RepeatDirection property to Vertical.
B. Set the RepeatDirection property to Horizontal.
C. Set the RepeatLayout property to Flow.
D. Set the RepeatLayout property to Table.
127.
Suppose You ASP.NET application manages order entry data by using a DataSet object named
EXorderEntry. The EXorderEntry object includes two DataTable objects named orderNames and
OrderDetails. A ForeignKeyConstraint object named orderDetailsKey is defined between the two
DataTable objects.
You attempt to delete a row in orderNames while there are related rows in OrderDetails, and an
exception is generated.
What is the most likely cause of the problem?
A. The current value of OrderDetails.KeyDeleteRule is Rule.Cascade.
B. The current value of OrderDetails.KeyDeleteRule is Rule.SetNull.
C. The current value of OrderDetails.KeyDeleteRule is Rule.SetDefault.
D. The current value of OrderDetails.KeyDeleteRule is Rule.None.
128.
Suppose You are planning the deployment of an ASP.NET application named XYZApp. XYZApp uses a
Visual Studio .NET component named DataAccess that will be shared with other applications on
your Web server.
You are using Visual Studio .NET to create a Windows Installer package. You need to deploy
DataAccess and the ASP.NET application so that they can be uninstalled later if necessary.
What should you do?
A. Create a setup project for DataAccess.
Add the ASP.NET application in a custom action.
B. Create a setup project for the ASP.NET application.
Create another setup project for DataAccess.
C. Create a Web setup project for the ASP.NET application.
Add a project output for DataAccess.
D. Create a Web setup project for the ASP.NET application.
Add a merge module for DataAccess.
129.
Suppose You are creating an ASP.NET application for XYZ. Your application will call an XML Web service
run by Wide World Importers. The XML Web service will return an ADO.NET DataSet object
containing a list of companies that purchase wine.
You need to make the XML Web service available to your application.
What should you do?
A. On the .NET tab of the Reference dialog box, select System.Web.Services.dll.
B. In the Web References dialog box, type the address of the XML Web service.
C. Add a using statement to your Global.asax.cs file, and specify the address of the XML Web
service.
D. Write an event handler in the Global.asax.cs file to import the .wsdl and .disco files associated
with the XML Web service.
130.
Suppose You create English, French, and German versions of a test engine ASP.NET application you are
developing for XYZ Inc. You have separate resource files for each language version.
You need to deploy the appropriate resource file based on the language settings of the server.
What should you do?
A. Create an installer and set the Installer.Context property for each version of your application.
B. Create an installer that has a launch condition to verify the locale settings.
C. Create an installer that has a custom action to install only location-specific files.
D. Create an installer that has an MsiConfigureProduct function to install the appropriate version.
131.
Suppose You are creating an ASP.NET application for XYZ. An earlier version of the application uses
ActiveX components that are written in Visual Basic 6.0. The new ASP.NET application will
continue to use the ActiveX components.
You want the marshaling of data between your ASP.NET application and the ActiveX
components to occur as quickly as possible.
Which two actions should you take? (Each correct answer presents part of the solution. Choose
two)
A. Use ODBC binding.
B. Use late binding.
C. Use early binding
D. Set the AspCompat attribute of the Page directive to true.
E. Set the AspCompat attribute of the Page directive to false.
132.
You are creating an ASP.NET application to track XYZ sales orders. The application uses an
ADO.NET DataSet object that contains two DataTable objects. One table is named Orders, and
the other table is named OrderDetails. The application displays data from the Orders table in a list
box. You want the order details for an order to be displayed in a grid when a user selects the
order in the list box. You want to modify these objects to enable your code to find all the order
details for the selected order.
What should you do?
A. Add a DataRelation object to the Relations collection of the DataSet object.
B. Use the DataSet.Merge method to connect the Orders table and the OrderDetails table to each
other.
C. Add a ForeignKeyConstraint to the OrderDetails table.
D. Add a keyref constraint to the DataSet schema.
133.
Suppose You are configuring your ASP.NET application XYZApp. XYZApp will be hosted on a Web server
that also runs other applications.
You want to prevent any changes to the configuration settings of your application after the
application is deployed.
What should you do?
A. In the Machine.config file, set the allowOverride attribute in the location element to False.
Make no other changes to the Machine.config file.
B. In the Web.config file, set the allowOverride attribute in the location element to False.
Make no other changes to the Web.config file.
C. In the Machine.config file, set the allowOverride attribute in the appSettings element to False.
Make no other changes to the Machine.config file.
D. In the Web.config file, set the allowOverride attribute in the appSettings element to False.
Make not other changes to the Web.config file.
134.
Suppose You create an ASP.NET application to provide corporate news and information to XYZ?s
employees. The application is used by employees in New Zealand.
Default.aspx has a Web Form label control named currentDateLabel. The Page.Load event
handler for Default.aspx included the following line of code:
currentDateLabel.Text = DateTime.Now.ToString(?D?)
You need to ensure that the data is displayed correctly for employees in New Zealand. What
should you do?
A. In the Web.config file for the application, set the culture attribute of the globalization element to
en-NZ.
B. In the Web.config file for the application, set the uiCulture attribute of the globalization element
to en-NZ.
C. In Visual Studio .NET, set the responseEncoding attribute in the page directive for
Default.aspx to UTF-8.
D. In Visual Studio .NET, save the Default.aspx page for both versions of the application by
selecting Advanced Save Options from the File menu and selecting UTF-8.
135.
Suppose You are creating an ASP.NET page for XYZ. The page uses string concatenation to gather data
from multiple e-mail messages and format the data for display on the page.
You want to ensure that the page displays as quickly as possible.
What should you do?
A. Write code that uses the Append method of the StringBuilder object.
B. Write code that uses the Substring method of the String object.
C. Write code that uses the Concat method of the String object.
D. Write code that uses the plus-sign (+) operator to concatenate the strings.
136.
Suppose You develop a Windows-based application by using Visual Studio .NET. The application includes
a form named XYZForm and a class named Contact. XYZForm includes a button named
cmdCreateContact. You must ensure that your application creates an instance of Contact when a
user clicks this button. You want to write the most efficient code possible.
Which code segment should you use?
A. Contact contact = new Object();
B. Contact contact = new Contact;
C. Object contact = new Contact;
D. Contact contact = new Object;
137.
You use Visual Studio .NET to create an assembly, called XYZAssembly, that will be used by
other applications, including a standard COM client application.
You must deploy your assembly on the COM application to a client computer. You must ensure
that the COM application can instantiate components within the assembly as COM components.
What should you do?
A. Create a strong name of the assembly by using the Strong Name tool (Sn.exe).
B. Generate a registry file for the assembly by using the Assembly Registration tool
(Regasm.exe)
Register the file on the client computer.
C. Generate a type library for the assembly by using the Type Library Importer (Tlbimp.exe).
Register the file on the client computer.
D. Deploy the assembly to the global assembly cache on the client computer.
Add a reference to the assembly in the COM client application.
138.
You plan to develop a customer information application CustomEX that uses a Microsoft SQL
Server database. CustomEX will be used frequently by a large number of users. Your application
code must obtain the fastest possible performance when accessing the database and retrieving
large amounts of data. You must accomplish this goal with the minimum amount of code.
How should you design CustomEX?
A. Use classes in the System.Data.OleDb namespace.
B. Use classes in the System.Data.SqlClient namespace.
C. Use remoting to connect to the SQL Server computer.
D. Use interoperability to include legacy COM-based data access components.
139.
Suppose As a developer at XYZ you develop a new sales analysis application that reuses existing data
access components. One of these components returns a DataSet object that contains the data for
all customer orders for the previous year.
You want your application to display orders for individual product numbers. Users will specify the
appropriate product numbers at run time..
What should you do?
A. Use the DataSet.Reset method.
B. Set the RowFilter property of the DataSet object by using a filter expression.
C. Create a DataView object and set the RowFilter property by using a filter expression.
D. Create a DataView object and set the RowStateFilter property by using a filter expression.
140.
You develop a Windows-based application XYZ. XYZ uses a DataSet object that contains two
DataTable objects. XYZ will display data from two data tables. One table contains customer
information, which must be displayed in a data-bound ListBox control. The other table contains
order information, which must be displayed in a DataGrid control.
You need to modify XYZ to enable the list box functionality.
What should you do?
A. Use the DataSet.Merge method.
B. Define primary keys for the Data Table objects.
C. Create a foreign key constraint on the DataSet object.
D. Add a DataRelation object to the Relations collection of the DataSet object.
141.
Suppose As a programmer at XYZ inc, you use Visual Studio .NET to create several applications that will
be deployed commercially over the Internet. You must ensure that customers can verify the
authenticity of your software.
Which action or actions should you take? (Choose all that apply.)
A. Sign your portable executables by using Signcode.exe.
B. Generate an X.509 certificate by using Makecert.exe.
C. Purchase an X.509 certificate from a certificate authority.
D. Purchase a Software Publisher Certificate from a certificate authority.
E. Convert your certificate to a Software Publisher Certificate by using Cert2spc.exe.
142.
You execute a query on your external Oracle database named XYZSalesDate by using an
OleDbCommand object. The query uses the Average function to return a single value that
represents the average price of products in the inventory table. You want to optimize performance
when you execute this query.
To execute this query from your ADO.NET code, you need to use a method of the
OleDbCommand object. Which method should you use?
A. ExecuteNonQuery
B. ExecuteScalar
C. ToString
D. ExecuteReader
143.
Suppose You use Visual Studio .NET to create a Windows-based application that will track camera sales.
The applications main object is named Camera. The Camera class is created by the following
definition:
public class Camera {
}
You write code that sets properties for the Camera class. This code must be executed as soon as
an instance of the Camera class is created. Now you need to create a procedure in which you
can place your code. Which code segment should you use?
A. public Camera()
B. public void Camera()
C. public bool Camera()
D. public New()
E. public Camera New()
F. public Camera Camera()
144.
Suppose You use Visual Studio .NET to create a Windows-based application. The application includes a
form named XYZProcedures (EXP). EXP allows users to enter very lengthy text into a database.
When users click the Print button located on EXP, this text must be printed by the default printer.
You implement the printing functionality by using the native .NET System Class Libraries with all
default settings.
Users report that only the first page of the text is being printed.
How should you correct this problem?
A. In the BeginPrint event, set the HasMorePages property of the PrintEventArgs object to True.
B. In the EndPrint event, set the HasMorePages property of the PrintEventArgs object to True.
C. In the PrintPage event, set the HasMorePages property of the PrintPageEventArgs object to
True.
D. In the QueryPageSettings event, set the HasMorePages property of the
QueryPageSettingEventArgs object to True.
145.
You use Visual .NET to develop a Windows-based application whose project name is XYZMgmt.
You create an application configuration file that will be installed on the client computer along with
XYZMgmt.
You must ensure that the settings in the application configuration file are applied when
XYZMgmt is executed.
What should you do?
A. Name the configuration file XYZMgmt.exe.confing and copy it to the WindowsSystem32
folder.
B. Name the configuration file XYZMgmt.config and copy it to the WindowsSystem32 folder.
C. Name the configuration file XYZMgmt.exe.config and copy it to the application folder.
D. Name the configuration file XYZMgmt.config and copy it to the application folder.
E. Name the configuration file XYZMgmt.exe.config and copy it to the global assembly cache.
146.
You are a developer for a XYZ Inc that provides free software over the Internet. You are
developing en e-mail application that users all over the world can download.
The application displays text strings in the user interface. At run time, these text strings must
appear in the language that is appropriate to the locale setting of the computer running the
application.
You have resources to develop versions of the application for only four different cultures. You
must ensure that your application will also be usable by people of other cultures.
How should you prepare the application for deployment?
A. Package a different assembly for each culture.
B. Package a different executable file for each culture.
C. Package a main assembly for source code and the default culture.
Package satellite assemblies for the other cultures.
D. Package a main assembly for source code.
Package satellite assemblies for each culture.
147.
Suppose You use Visual Studio .NET to create a control that will be used on several forms in your
application.
It is a custom label control that retrieves and displays your company?s current stock price.
The control will be displayed on many forms that have different backgrounds. You want the
control to show as much of the underlying form as possible. You want to ensure that only the
stock price is visible. The rectangular control itself should not be visible.
You need to add code to the Load event of the control to fulfill these requirements. Which two
code segments should you use? (Each correct answer presents part of the solution. Choose two)
A. this.BackColor = Color.Transparent;
B. this.ForeColor = Color.Transparent;
C. this.BackImage = null;
D. this.SetStyle(ControlStyles.UserPaint, false);
E. this.SetStyle(ControlStyles.SupportsTransparentBackColor, true);
148.
Suppose You develop a Windows-based application by using Visual Studio .NET. The application includes
numerous method calls at startup. After optimizing your application code, you test the application
on a variety of client computers. However, the startup time is too slow.
You must ensure that your application starts as quickly as possible the first time it runs. What
should you do?
A. Precompile your application by using the Native Image Generator (Ngen.exe):
Install the precompiled application on the client computers.
B. Install your application on the client computers.
Precompile your application by using the Native Image Generator (Ngen.exe).
C. Precompile your application by using the JIT compiler.
Install the precompiled application on the client computers.
D. Install your application on the client computers.
Precompile your application by using the JIT compiler.
149.
You use Visual Studio .NET to create a Windows-based application. The application includes a
form named XYZForm, which displays statistical date in graph format. You use a custom
graphing control that does not support resizing.
You must ensure that users cannot resize, minimize, or maximize XYZForm. Which three actions
should you take? (Each answer presents part of the solution. Choose three)
A. Set XYZForm.MinimizeBox to False.
B. Set XYZForm.MaximizeBox to False.
C. Set XYZForm.ControlBox to False.
D. Set XYZForm.ImeMode to Disabled.
E. Set XYZForm.WindowState to Maximized.
F. Set XYZForm.FormBorderStyle to one of the Fixed Styles.
G. Set XYZForm.GridSize to the appropriate size.
150.
Tell me You work as software developer at XYZ inc. You need to develop a Windows form that provides
online help for users. You want the help functionality to be available when users press the F1 key.
Help text will be displayed in a pop-up window for the text box that has focus.
To implement this functionality, you need to call a method of the HelpProvider control and pass
the text box and the help text.
What should you do?
A. SetShowHelp
B. SetHelpString
C. SetHelpKeyword
D. ToString
151.
Suppose You are developing a Windows-based application that requires the use of a calculation function
named Calculate Value. This function includes the following signature: int Calculate Value(int x) ;
Calculate Value is located in an unmanaged DLL named Company Functions.dll, and is not part
of a COM interface.
You need to be able to use Calculate Value in your application.
Which action or actions should you take? (Choose all that apply)
A. Use Regsvr32.exe to register CompanyFunctions.dll.
B. Use Visual Studio .NET to add a reference to CompanyFunctions.dll.
C. To your application, add the following code segment: using CompanyFunctions;
D. To your application, add the following code segment: [DllImport("CompanyFunctions.dll")]
public static extern int Calculate Value(int x);
152.
Suppose You have an ASP.NET application named ES WebApp. This application uses a private assembly
named Employee to store and retrieve employee data. Employee is located in the bin directory of
ES WebApp. You develop a new ASP.NET application named ESWebApp2 that also needs to
use Employee. You assign Employee a strong name, set its version to 1.0.0.0, and install it in the
global assembly cache. You then create a publisher policy assembly for version 1.0.0.0 and
install it in the global assembly cache. You compile ESWebApp2 against version 1.0.0.0. You do
not recompile My WebApp. You then run ES WebApp.
What is the most likely result?
A. A Version Not Found Exception is thrown.
B. Employee is loaded from the bin directory.
C. Version 1.0.0.0 of Employee is loaded from the global assembly cache.
D. Version 1.0.0.0 of Employee is loaded by the publisher policy assembly.
153.
You have a .NET Remoting object named Utils. The Utils class is a client-activated .NET
Remoting object. You want to write a client application that creates and uses a Utils object. You
want the client application to hold onto a reference to a Utils object for the duration of its
execution.
What should you do?
A. Construct the Utils object, and hold the object in a member variable.
B. Construct the Utils object, and set the LifeTimeService.LeaseTime to 0.
C. In the client application, create an Implementation of the ISponsor interface. Implement the
Renewal method to extend the lease.
D. In the client application, create an Implementation of the ILease interface. Implement the
CurrentLeaseTime property to return Int32.MaxValue.
154.
You create a serviced component named CompanyScheduler. CompanyScheduler is registered
in a library application. The Scheduler methods parse String objects into Date Time objects. You
write a console application named Coverage.exe to test each method in Scheduler. You want
Coverage.exe to test Scheduler for multiple cultures to verify its globalization support.
What should you do?
A. Create a Culture Info object for each culture locale before calling the CompanyScheduler
methods.
B. Create a Region Info object for each culture locale before calling the CompanyScheduler
methods.
C. Set the current threads Current Culture property to each culture locale before calling the
CompanyScheduler methods.
D. Create a Coverage.exe.config file and add a element to the configuration file for
each culture locale.
155.
Suppose You are creating a .NET Remoting object named Payroll. The Payroll class allows remote client
applications to access payroll data for your company. Client applications are developed by using
Windows Forms and Web Forms. You must ensure that remote client applications are securely
authenticated prior to gaining access to Payroll object. You want to accomplish this task by
writing the minimum amount of code.
What should you do?
A. Use a Tcp Channel and a Binary Formatter for the Payroll class.
B. Use an Http Channel and a Soap Formatter for the Payroll class.
C. Host the Payroll class in Internet Information Services (IIS) and implement Basic
authentication.
D. Host the Payroll class in Internet Information Services (IIS) and implement Integrated Windows
authentication.
156.
You are creating a .NET Remoting object named Payroll. The Payroll class allows remote client
applications to access payroll data for your company. Client applications are developed by using
Windows Forms and Web Forms. You must ensure that remote client applications are securely
authenticated prior to gaining access to Payroll object. You want to accomplish this task by
writing the minimum amount of code.
What should you do?
A. Use a Tcp Channel and a Binary Formatter for the Payroll class.
B. Use an Http Channel and a Soap Formatter for the Payroll class.
C. Host the Payroll class in Internet Information Services (IIS) and implement Basic
authentication.
D. Host the Payroll class in Internet Information Services (IIS) and implement Integrated Windows
authentication.
157.
You create a Windows service that processes XML messages placed in a MSMQ queue. You
discover that the service is not functioning properly.
You need to debug the service to correct the program.
What should you do?
A. Start the Windows service.
Then attach a debugger to the process.
B. Attach a debugger to the Windows service.
Then start the Windows service.
C. Start the Windows service.
Then run the .NET Services Installation tool (Regsvcs.exe).
D. Place a breakpoint in the Main method of the Windows service. Then run the application within
the Visual Studio .NET integrated development environment (IDE).
158.
Suppose You are creating an ASP.NET application named CompanyWebApp. To CompanyWebApp, you
add a Web reference to an XML Web service named User Service. User Service consists of a
Web method named RetrieveUserInfo. This Web method takes a userID as input and returns a
DataSet object containing user information. If the userID is not between the values 1 and 1000, a
System Argument Exception is thrown. In CompanyWebApp, you write a try/catch block to
capture any exceptions that are thrown by User Service. You invoke RetrieveUserInfo and pass
1001 as the user ID.
Which type of exception will be caught?
A. System.ApplicationException
B. System.ArgumentException
C. System.Web.Service.Protocols.SoapException
D. System.Web.Service.Protocols.SoapHeaderException
159.
You are creating an XML Web service named ListBoxService. This service provides content,
such as states, countries, and geographical regions, for use in drop-down list boxes.
ListBoxService contains a Web method named RetrieveRegionsListBox. This method runs a
Dataset object that contains every geographical region in the world. RetrieveRegionsListBox calls
a Microsoft SQL Server database to load the Dataset object with region data. You want to
minimize the amount of time the method takes to return to the caller.
What should you do?
A. Use a stored procedure to return the datas.
B. Store each Dataset object by using the Session object.
C. Set the Buffer Response property of the Web Method attribute to false.
D. Set the Cache Duration property of the Web Method attribute to an interval greater than zero.
160.
Suppose Company Ltd. receives product information from manufactures in the form of an XML documents.
The product information is stored in a Microsoft SQL Server database. The format of each XML
document varies. Each one is located in a MemoryStream object named newProds. You create a
merge procedure that reads data and schema information in a Dataset object and merges the
information into your database. You now need to write code to transfer the XML document and its
schema into a Dataset object.
Which code segment should you use?
A. Dataset products = new Dataset("prodInfo");
XmlTextReader reader = new XmlTextReader(newProds);
XmlValidatingReader validReader = new
XmlValidatingReader(reader);
while (validReader.Read()) { products.WriteXml(validReader.Value);}
B. Dataset products = new Dataset("prodInfo");
products.ReadXml(newProds);
C. Dataset products = new Dataset("prodInfo");
XmlDataDocument document = new XmlDataDocument(products);
D. document.DataSet.ReadXmlSchema(newProds);
Dataset products = new Dataset("prodInfo");
string myXmlData = Encoding.UTF8.GetString(newProds.ToArrary());
SqlDataAdapter adapter = new SqlDataAdapter("LoadSchemaType=XML",myXmlData);
adapter.
Fill(products)
161.
Suppose You create an XML Web service named Time ESService. Each time ESService is started, it
checks for the existence of an event log named Time ESServiceLog. If TimeServiceLog does not
exist, Time ESService creates it. You discover that when Time ESService creates Time
ESServiceLog, it throws a System.Security.SecurityException. The exception includes the
following message: "Requested registry access is not allowed". You need to resolve this problem.
What should you do?
A. Configure Inetinfo.exe to run as the local administrator user account.
B. Create an installer for Time ESService, and create the new event log in the installer code.
C. Modify the Web.config file by adding an identity element to impersonate the LOGON user
specified by Internet Information Services (IIS).
D. Modify the permissions of the
KEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesEventlog registry key to give
full control to the IUSR_computername user account.
162.
Suppose You have a .NET Remoting object named ES ProductLoader. The ES ProductLoader class is a
server-activated Singleton object.
The ES ProductLoader class loads product data into a Microsoft SQL Server database. The Load
method of the ES ProductLoader class is a time-consuming method to call. You are developing a
client application that uses the ES ProductLoader class. You want to ensure that the client
application can continue to respond to user input while the Load method of the ES ProductLoader
class is called.
What should you do?
A. Use an AsyncDelegate instance to call the Load method.
B. Modify the ES ProductLoader class to be derived from IAsyncResult.
C. Configure the ES ProductLoader class to be a client-activated .NET Remoting object.
D. Configure the client application to have its own remoting channel that matches the servers
channel and formatter.
163.
Suppose You are planning to create a Dataset object named ES DataSet to be used in a bond-trading
application. Several developers will need to write code to manipulate myDataSet, and you want to
ensure that ES DataSet is easy for them to use. You decide to create ES DataSet as a strongly
typed data set. Which two actions should you take? (Each correct answer presents part of the
solution. Choose two)
A. Create an XSD schema that defines ES DataSet.
B. Create an XDR schema that defines ES DataSet.
C. Create a class for ES DataSet that is based on the schema and that inherits from the Dataset
class.
D. Create a class for ES DataSet that is based on the schema and that inherits from the
XmlSchema class.
E. Create a key pair for ES DataSet by using the Strong Name tool (Sn.exe).
164.
Suppose You create a serviced component named Session Dispenser. This computer is in the
Company.Utilities assembly and is registered in a COM+ server application. Session Dispenser
has multiple callers. You discover that there are logic problems in the Create New Session
method. You want to debug any calls to this method. What should you do?
A. Open the Session Dispenser solution.
Set a breakpoint on the Create New Session method.
Start the debugger.
B. Attach the debugger to the client process.
Set a breakpoint on the SessionDispenser.CreateNewSession method.
C. Attach the debugger to the Company.Utilites.exe process.
Set a breakpoint on the Create New Session method.
D. Attach the debugger to a Dllhost.exe process.
Set a breakpoint on the Create New Session method.
165.
Suppose You create an XML Web service named Postal Code. Your project source includes a codebehind
file and a file named PostalCode.asmx. During implementation, you use the Debug class to
record debugging log messages, to verify values, and to report debugging failures. You want to
deploy Postal Code to a production computer. You do not want any of the debugging code to
execute on the production computer. What should you do?
A. Set the projects active configuration to Release and rebuild the DLL.
B. Modify the trace element of the Web.config file by setting the enabled attribute to "false".
C. Modify the compilation element of the Web.config file by setting the debug attribute to "false".
D. Add code to the constructor of the Postal Code class to set the Auto Flash property of the
Debug class to false.
E. Add code to the constructor of the Postal Code class to call the Clear method of the
Debug.Listeners property.
166.
Suppose You create a .NET Remoting object named Patient info that exposes medical patient information.
Because of the confidential nature of the information, you must ensure that the data remains
secure. You want client applications to connect to Patient info over a secure communication
channel. You want to accomplish this task by writing the minimum amount of code.
What should you do?
A. Create your own host application and use a Tcp Channel and Binary Formatter.
B. Create your own host application and use an Http Channel and a Soap Formatter.
C. Install Patient info in an Internet Information Services (IIS) virtual directory.
Configure Patient info to use a Tcp Channel and a Binary Formatter.
Configure IIS to use SSL.
D. Install Patient info in an Internet Information Services (IIS) virtual directory.
Configure Patient info to use an Http Channel and a Soap Formatter.
Configure IIS to use SSL.
167.
You have a DataSet object named loanCustomersDataSet that contains customers serviced by
the loan department of ExamSlink Inc. You receive a second DataSet object named
assetCustomersDataSet that contains customers serviced by the asset management department
of your company. Both objects have the same structure. You want to merge
assetCustomersDataSet into loanCustomersDataSet and preserve the original values in
loanCustomersDataSet.
Which code segment should you use?
A. loanCustomersDataSet.Merge(assetCustomersDataSet);
B. loanCustomersDataSet.Merge(assetCustomersDataSet, true);
C. assetCustomersDataSet.Merge(loanCustomersDataSet);
D. assetCustomersDataSet.Merge(loanCustomersDataSet, true);
168.
Suppose You are developing an application named ExamSApp by using Visual C# .NET and Visual Basic
.NET. The application will use functions form a DLL written in unmanaged code. One function
requires the calling application to allocate unmanaged memory, fill it with data, and pass the
address of the memory to the function. On returning from the function, the calling application must
deallocate the unmanaged memory.
You need to decide how your application will handle unmanaged memory.
What should you do?
A. Use a byte array.
B. Use the methods of the Marshal class.
C. Use the methods of the MemoryStream class.
D. Derive a new class from the Stream class, and override the allocation methods.
169.
Suppose You create three Windows services named ES1, ES2, and ES3. You want to install all three
services on a computer named CompanyA by using the Installer tool (Installutil.exe).
On the command line of CompanyA, you enter and run the following command: Install util ES1
ES2 ES3
During the installation process, ES3 throws an installation error. The installation process
completes.
How many of the three services are now installed on CompanyA?
A. None
B. One
C. Two
D. Three
170.
Suppose You have a Dataset object named ES DataSet that is populated with data from a Microsoft SQL
Server database. This object contains insertions, deletions, and updates to the data. You want to
apply the data changes in ES DataSet to the database. You decide to use the Sulligent data
provider. You need to create a data object that you will use to update the database. Which code
segment should you use?
A. SqlDataReader myDataReader;
B. SqlDataAdapter mySqlDataAdapter = new sqlDataAdapter();
C. DataObject myDataObject = new DataObject();
D. SqlParameter myParameter = new SqlParameter();
171.
Suppose You develop an ASP.NET Web application
for Company?s intranet. The application accesses data that is stored in a Microsoft SQL Server
database. The application authenticates users by using Windows authentication, and it has
impersonation enabled. You configure database object permissions based on the identity of the
user of the application. You need to provide the user?s identity to the SQL Server database. What
should you do?
A. Connect to the database by using the following connection string
?Persists Security Info=False;Integrated Security=SSPI;
database=ApplicationDB;server=DataServer;?
B. Connect to the database by using the following connection string
?User ID=ASPNET;Persist Security Info=False;Integrated Security=False;
database=ApplicationDB;server=DataServer;?
C. Develop a serviced component that wraps all database operations.
Use COM+ role-based security to restrict access to database operations based on user
identity.
D. Disable impersonation.
172.
Suppose You are an application developer for your company. You develop library assemblies that are
called by your main applications. These library assemblies access confidential data in the
applications. To ensure that this data is not accessed in an unauthorized and unsafe manner,
users must not be allowed to call the library assemblies from their own applications. You apply a
strong name to all assemblies to support versioning. You need to prevent users from writing
managed applications that make calls to your library assemblies. You need to achieve this goal
while minimizing the impact on response times for applications. What should you do?
A. Use the internal access modifier to declare all classes and structs in each library.
B. Use the protected internal access modifier to declare all classes and structs in each library.
C. Add the following attribute to each class and struct in each library assembly.

D. Add the following attribute to each class and struct in each library assembly.
173.
Suppose You are an application developer for Company.com. You are developing an application that can
be extended by using custom components. The application uses reflection to dynamically load
and invoke these custom components. In some cases, custom components will originate from a
source that is not fully trusted, such as the Internet.
You need to programmatically restrict the code access security policy under which custom
components run so that custom components do not run with an elevated permission grant.
What are two possible ways to achieve this goal? (Each correct answer presents a complete
solution. Choose two)
A. Create a new application domain and set the security policy level. Run custom components in
this application domain.
B. Use permission class operations to modify the security policy.
C. Implement custom permission classes to protect custom component resources.
D. Programmatically modify the machine-level security policy file after loading a custom
component.
174.
Suppose You are
developing an ASP.NET Web application that users in the accounting department will use to
process payroll reports and view payroll reports. The application will use Integrated Windows
authentication to authenticate all users. Because payroll data is confidential only users in the
accounting department will be granted access to the application. All employees in the accounting
department belong to a specific Active Directory group. However, users in the IT department can
add themselves to various Active Directory groups in order to troubleshoot resource access
problems. These IT department users must not be granted access to the ASP.NET Web
application. The following rules can be used to distinguish between users in the accounting
department and users in the IT department:
? All users in the accounting department are members of a group named CompanyAccounting.
? Some users in the IT department are members of the CompanyAccounting group.
All users in the IT department are members of a group named CompanyDomain Admin.
?
? No users in the accounting department are members of the CompanyDomain Admin group.
You need to configure URL authorization for the application by adding an
element to the Web.config file in the application root. Which element should you use?
A.




B.




C.




D.



175.
Suppose You develop an ASP.NET Web application
that writes to an event log named EventLog1. All managers in Company will run this application.
During a exam on a manager?s client computer, the application fails in the following code
segment. (Line numbers are includes for reference only.)
1. Dim EventLog1 As New EventLog
2. If Not EventLog.SourceExists(?CompanyWebApp?) Then
3. EventLog.CreateEventSource(?CompanyWebApp?, ?Application?)
4. End If
5. EventLog1.Source = ?CompanyWebApp?
6. EventLog1.WriteEntry(?The event occurred.?)
You need to ensure that event data is written to EventLog1. You want to achieve this goal without
granting unnecessary permissions.
What should you do?
A. Insert the following code into the application.
Dim eventLogDir As String
eventLogDir = ?C:%windir?system32configAppEvent.Evt?
Dim FilePermission As _
New FileOPermission(FileIOPermissionAccess.AllAcces, eventLogDir)
FilePermission.Assert()
B. Replace line 6 of the code segment with the following line of code.
EventLog1.WriteEntry(?The event occurred?,?EventLogWriter?)
C. Grant the managers the Full Control permission for the event log file.
D. Add the aspnet_wp account to the Administrators group.
E. Create the event log source in the installer class of the application.
176.
Suppose You create an ASP.NET Web application
that all authenticated network users will access. The authentication mode in the Web.config file is
currently set to None. Due to recent security threats, the network administrator requires that all
connections to the application?s Web server use the network credentials of the authenticated
user. You need to configure the application to use the network credentials of the authenticated
user as HTTPContext.Current.User. Which action or actions should you perform? (Choose all that
apply)
A. Ask the network administrator to configure the IIS directory security to Anonymous
authentication.
B. Ask the network administrator to configure the IIS directory security to Integrated Windows
authentication.
C. Set the authentication mode in the Web.config file to Forms.
D. Set the authentication mode in the Web.config file to Windows.
E. Set the impersonation attribute of the identity element in the Web.config file to true.
177.
Users who are temporary employees are
members of a group named TemporaryEmployees. You develop a serviced component named
CompanyComponent. CompanyComponent is part of a COM+ application named MyApplication.
CompanyComponent is secured by using the SecurityRole attribute for the Employees role. You
need to ensure that members of the TemporaryEmployees group are assigned to the Employees
role. You decide to add the TemporaryEmployees group to the existing Employees role. Which
tool should you use?
A. The code Access Security Policy tool.
B. The Permission View tool.
C. The Component Services tool.
D. The Secutil tool.
E. The Microsoft .NET Framework Configuration tool.
178.
Suppose You develop a Windows Forms application
that connects to a local Microsoft SQL Server database by using the Microsoft .NET Framework
Data Provider for SQL Server. The application currently connects to the database by using an
account that is a member of the System Administrator role in SQL Server. You need to ensure
that the application can connect to the database by using the user account of the interactive user
without providing additional permissions. What should you do?
A. Modify the application to activate a SQL Server application role.
B. Modify the application to use SQL Server integrated security.
C. Modify the application to send a security token that contains the authentication information in a
Kerberos ticket.
D. Modify the application to use a COM+ security roles.
179.
Suppose You are developing an application that will
be used both by company users and by contractors. Contractors will install the application on
their own portable computers. A written company policy prohibits contractors from easily
accessing or reviewing the source code of company applications. The file servers that contain the
source code for the application are configured so that only company software developers have
access. You need to ensure that the contractors cannot easily access the application source
code. What should you do?
A. Run Dotfuctaor Community Edition on each of the application assemblies.
B. Apply a strong name to each of the application assemblies.
C. Run the Code Access Security Policy tool for each of the application assemblies before
distributing the application.
D. Use Encrypting File System (EFS) to encrypt the compiled application assemblies.
180.
Suppose You create a Web Forms application to track
employee expense report information. Information is entered by each user and stored in a
Microsoft SQL Server database. The application uses Integrated Windows authentication with
impersonation enabled to communicate with the database. All users are assigned to the
DataReader role and the DataWriter role in SQL Server.
The employee expense report form contains client-side validation scripts and additional server
controls. This form is ViewState enabled. All employee expense reports must be approved by the
accounting department by using a separate form in the application before payment is made.
You need to unit exam the security of the application.
What should you do?
A. Copy the ViewState information to a text file and attempt to decrypt it.
B. Exam the application from the hosting computer and from the client computers.
C. Create your own page that mimics the approved page and submit that page to the server.
D. Sign on as a user in the accounting department and verify that you can approve expense
reports.
181.
Suppose You are an application developer for your company. You are conducting a code review of a
Windows Forms application that was developed by another developer. The application
includes a function named Logon(), which validates a users logon credentials. The function
displays a dialog box for the user to enter the users credentials, and the function validates those
credentials by using a database.
The function returns a value of 0 if the users password is incorrect, a value of 1 if the users user
ID is incorrect, and a value of 2 if both are correct. Users should receive access to the application
only if the function returns a value of 2. A function named EndApp() is used to exit the application.
The application must display a message to the user, depending on the result of the Logon()
function.
The application contains the following code segment.
int logonresult = Logon();
switch(logonresult) {
case 0:
MessageBox.Show("User name is OK, password incorrect.");
break;
case 1:
MessageBox.Show("User name is incorrect.");
break;
default:
MessageBox.Show("Welcome!");
break;
}
if(logonresult != 2) {
EndApp();
}
You need to improve the security of this code segment while maintaining its funtionality. You
decide to replace the existing code segment.
Which code segment should you use?
A. if(Logon() != 2) {
Console.WriteLine("Logon error.");
EndApp();
}
B. if(Logon() != 2) {
Console.WriteLine("Logon error.");
EndApp();
}
else {
MessageBox.Show("Welcome!");
}
C. int logonresult = Logon();
switch(logonresult) {
case 0:
MessageBox.Show("User name is OK, password incorrect.");
EndApp();
break;
case 1:
MessageBox.Show("User name is incorrect.");
EndApp();
break;
default:
MessageBox.Show("Welcome!");
break;
}
D. int logonresult = Logon();
if(logonresult == 2) {
MessageBox.Show("Welcome!");
}
else {
MessageBox.Show("User name or password was incorrect.");
EndApp();
}
182.
How to prevent malicious code from running, a
written company policy does not permit developers to log on by using accounts that have more
permissions than necessary.
Your user account is a member of the Users group and the VS Developers group. You attempt to
run an application that requires Administrator-level permissions. You receive an error message
that states that permission is denied.
You need to be able to run the application.
What should you do?
A. Ask the network administrator to add your user account to the domain Administrators group.
B. Ask the administrator of your client computer to add your user account to the local
Administrators group.
C. Add the administrator of your client computer to add your user account to the Power Users
group.
D. Run the application by using the runas command and specify a user account in the local
Administrators group.
183.
Suppose You develop an application that customers
will be able to automate by using Microsoft Visual Basic for Applications (VBA) scripts. The
application will be accompanied by sample VBA scripts. Customers must be able to review the
sample VBA scripts. You want customers to be able to automate the installed application by using
any of the sample VBA scripts or by creating their own automation scripts. You also want to allow
customers to choose not to apply any automation scripts.
You need to distribute the sample VBA scripts with your application in a manner that minimizes
security risks for the customer.
What should you do?
A. On installation, place all the sample VBA scripts in a subfolder of the application?s installation
folder.
B. On installation, as the user to choose one sample VBA script to install as the application?s
automation script.
C. Do not install the same VBA scripts.
Leave the files in a folder on the installation media.
D. Encrypt same VBA scripts on the installation media and decrypt the files during installation.
184.
Suppose You are an application developer for your company. You are developing a Windows Forms
application. You deploy a supporting assembly named MyAssembly.dll to the global assembly
cache. During testing, you discover that the application is prevented from accessing
MyAssembly.dll.
You need to ensure that the application can access MyAssembly.dll.
What should you do?
A. Digitally sign the application by using a digital certificate.
B. Run the caspol.exe -s on command from the command line.
C. Run the Assembly Linker to link MyAssembly.dll to the application.
D. Modify the security policy to grant the application the FullTrust permission.
185.
Suppose You are developing an application that will
be used by members of three domain user groups in your company. The user groups are named
CompanySales, CompanyMarketing, and AccountManagement. Each of the three user groups
will have different permission within the application.
You log on to your development computer by using a domain user account that is a member of
only the Domain Users and the Developers domain user groups. On your development computer,
you user account is a member of only the local Users group.
When you finish developing the application, you need to ensure that the application runs correctly
before you send the application to the company?s internal software examing department.
How should you exam the application?
A. Select one user from each of the three user groups that will run the application.
Deploy the application to the client computer of each of these three users.
Exam the application on each of the computers.
B. Deploy the application to a client computer.
Ask a domain administrator to place the computer?s domain account into all three of the user
groups that will run the application.
Exam the application on the client computer.
C. Ask a domain administrator to create a domain user account for examing.
Place the account in each of the three user groups that will run the application.
Exam the application, logging on to your computer by using the exam domain user account.
D. Ask a domain administrator to create three domain user accounts for examing.
Place one account in each of the three user groups that will run the application.
Exam the application three times, logging on to your computer by using a different exam
domain user account for each exam.
186.
You create an ASP.NET Web application
that all authenticated network users will access. The authentication mode in the Web.config file is
currently set to None. Due to recent security threats, the network administrator requires that all
connections to the application?s Web server use the network credentials of the authenticated
user.
You need to configure the application to use the network credentials of the authenticated user as
HTTPContext.Current.User.
Which action or actions should you perform? (Choose all that apply)
A. Ask the network administrator to configure the IIS directory security to Anonymous
authentication.
B. Ask the network administrator to configure the IIS directory security to Integrated Windows
authentication.
C. Set the authentication mode in the Web.config file to Forms.
D. Set the authentication mode in the Web.config file to Windows.
E. Set the impersonation attribute of the identity element in the Web.config file to true.
187.
Suppose Each client computer in Company runs
either Microsoft Windows XP Professional or Windows 98. You are developing an application that
will be used by all users in Company.
Users log on to their client computers by using a domain user account that is a member of the
local Power Users group and the user?s computer. You log on to your Windows XP Professional
computer by using a domain user account that is a member of the local Administrators group and
Power Users group on your computer.
When examing your application, you need to ensure that your exams accurately reflect the
production environment in which the application will run.
How should you exam the application?
A. Ask a domain administrator to temporarily remove your domain user account from the local
Administrators group on your computer while you are examing the application.
B. Exam the application on your computer.
When examing, log on to the computer by using a domain user account that is a member of
only the local Power Users group on your computer.
C. Deploy the application to a Windows XP Professional computer and a Windows 98 computer.
Log on to each computer by using a domain user account that is a member of only the local
Power Users group.
D. Compile the assemblies of the application from the command line by running the runas
command and specifying a domain user account that is a member of only the local Power
Users group on your computer.
188.
Suppose You are developing a three-tier application.
You enter sample data to exam the application. The following exception is caught by the data
layer before the application continues to run. Cannot set column ?Column1? to ?Text too long for
maximum length?. The value violates the MaxLength limit of this column.
You need to improve the security of the application. Which two actions should you perform?
(Each correct answer presents part of the solution. Choose two)
A. Increase the maximum length of data characters allowed in the column.
B. Validate all incoming data character lengths at the business layer.
C. Modify the data layer to process data above the maximum length.
D. Modify the user interface to prevent users from entering data above the maximum character
length.
189.
Suppose You are an application developer for Company.com. You develop a Windows Forms application
that connects to a local Microsoft SQL Server database by using the Microsoft .NET Framework
Data Provider for SQL Server. The application currently connects to the database by using an
account that is a member of the System Administrator role in SQL Server.
You need to ensure that the application can connect to the database by using the user account of
the interactive user without providing additional permissions.
What should you do?
A. Modify the application to activate a SQL Server application role.
B. Modify the application to use SQL Server integrated security.
C. Modify the application to send a security token that contains the authentication information in a
Kerberos ticket.
D. Modify the application to use a COM+ security roles.
190.
Suppose A. Create a new application domain and set the security policy level. Run custom components in
this application domain.
B. Use permission class operations to modify the security policy.
191.
Users who are temporary employees are
members of a group named TemporaryEmployees. You develop a serviced component named
CompanyComponent. CompanyComponent is part of a COM+ application named MyApplication.
CompanyComponent is secured by using the SecurityRole attribute for the Employees role.
You need to ensure that members of the TemporaryEmployees group are assigned to the
Employees role.
You decide to add the TemporaryEmployees group to the existing Employees role.
Which tool should you use?
A. The code Access Security Policy tool.
B. The Permission View tool.
C. The Component Services tool.
D. The Secutil tool.
E. The Microsoft .NET Framework Configuration tool.
192.
You are developing an application that will
be used both by company users and by contractors. Contractors will install the application on
their own portable computers. A written company policy prohibits contractors from easily
accessing or reviewing the source code of company applications. The file servers that contain the
source code for the application are configured so that only company software developers have
access.
You need to ensure that the contractors cannot easily access the application source code.
What should you do?
A. Run Dotfuctaor Community Edition on each of the application assemblies.
B. Apply a strong name to each of the application assemblies.
C. Run the Code Access Security Policy tool for each of the application assemblies before
distributing the application.
D. Use Encrypting File System (EFS) to encrypt the compiled application assemblies.
193.
Suppose You are developing a Windows-based
payroll application that will be used by all payroll administrators in the company. The application
has a single executable file that uses a separate assembly to modify payroll data.
You need to design security for your application to ensure that the assembly cannot be called by
unauthenticated and unauthorized users.
What should you do?
A. Run the application by using a user account that has access to the application directory.
B. Modify the application to validate all user-entered data.
C. Modify the application to authenticate and authorize user access within each assembly as it is
called.
D. Modify the application to authenticate and authorize user access when each user runs the
executable file.
E. Set the folder-level permissions to the executable file by using directory security.
194.
If you need to configure Outlook Web Access to allow Microsoft Office documents to be opened but
not saved on public computers. What should you do?
A. Enable direct file access for public computers.
B. Enable Force WebReady Document Viewing when a converter is available for public
computers.
C. Add the Office file formats to the supported document types for WebReady Document
Viewing.
D. Add the Office file formats to the direct file access Block list.
195.
Suppose you need to configure the minimum permissions necessary for a user to be able to configure
mailbox databases on an Exchange Server 2007 computer. What should you do?
A. Delegate Exchange Administrator privileges to the user account at the organization level.
B. Add the user account to the Exchange Server Administrators role.
C. Add the user account to the Exchange Recipient Administrators role.
D. Add the user account to the Exchange Organization Administrators role.
196.
In your Exchange Server 2007 environment, a users mailbox was purged from the mailbox
server, and a backup of the mailbox database was restored to a recovery storage group. You
need to recover the purged mailbox to a production database. What should you do?
A. Run the Connect-Mailbox cmdlet from the Exchange server.
B. Run the Restore-Mailbox cmdlet from the Exchange server.
C. Run the Enable-Mailbox cmdlet from the Exchange server.
D. Run the Exmerge utility from the Exchange server.
197.
What is h-look and v-look
198.
You are creating a cluster continuous replication (CCR) cluster. You create a failover cluster and
you install the Mailbox server role named ExchMB1 on the active node. You need to install the
Mailbox server role on the passive node. What are two possible ways to achieve this goal? (Each
correct answer presents a complete solution. Choose two.)
A. Run the Enable-StorageGroupCopy -Identity ExchMB1SG1 command.
B. Run the Setup /roles:Mailbox command.
C. Run the Setup /newcms /CMSname:ExchMB1 command.
D. Select the Passive Clustered Mailbox Role check box in the Exchange Server 2007 Setup
199.
Explain Which of the following Receive connector usage types uses Exchange Server authentication as
its default authentication mechanism?
A. Client
B. Internal
C. Internet
D. Partner
200.
You need to find out the total size of a users mailbox. What should you do?
A. Run the Database Troubleshooter in the Exchange Troubleshooting Assistant.
B. Run the Get-MailboxDatabase cmdlet.
.C. Run the Get-MailboxStatistics cmdlet
D. Run the Get-Mailbox cmdlet.
201.
You are preparing to install the Mailbox server role on a new Exchange Server 2007 computer.
You need to optimize read and write performance on this server. You also need to provide
redundancy on this server. On which type of array should you place the mailbox database?
A. RAID 1 containing the operating system partition
B. RAID 1 dedicated
C. RAID 0 dedicated
D. RAID 10 dedicated
202.
Explain Users report that they are unable to access their mailboxes on an Exchange Server 2007
computer named Exch1. You verify that connectivity to the server is functioning and that server
hardware is functioning normally. Access to global catalogs is also functioning normally. You
need to report on the status of all required Exchange-specific and Exchange-dependent services.
What should you do?
A. From the Exchange Troubleshooting Assistant, run the Database Troubleshooter.
B. Run the Test-ServiceHealth -Server Exch1 cmdlet.
C. Run the Test-SystemHealth -Server Exch1 cmdlet.
D. Run the Get-ExchangeServer-ldentityExch1 cmdlet.
203.
Explain Your company normally does not allow out-of-office messages to be sent to users outside of your
Exchange 2007 organization. The company makes an exception for a business partner named
Northwind Traders. The SMTP domain for Northwind Traders is northwindtraders.com. You need
to configure your Exchange organization to allow out-of-office messages to be sent to e-mail
addresses in the northwindtraders.com domain. What should you do?
A. Add northwindtraders.com as a remote domain and set the appropriate options.
B. Add northwindtraders.com as an accepted domain and set the appropriate options.
C. Create a transport rule and set the appropriate options.
D. Create a Send connector for northwindtraders.com and set the appropriate options.
204.
If You want to trigger an alert when the number of messages in the mailbox stores receive queue
on an Exchange Server 2007 server reaches a defined value. What counter do you select when
configuring the alert? (The question uses the notation :.)
A. MSExchangeIS:Messages Queued For Submission
B. MSExchangeIS:Receive Queue Size
C. MSExchangeIS Mailbox:Messages Queued For Submission
D. MSExchangeIS Mailbox:Receive Queue Size
205.
If You move a conference room mailbox named ConfRm 1 from an Exchange Server 2003
computer to an Exchange Server 2007 computer. You need to convert the ConfRm 1 mailbox to
an Exchange 2007 resource mailbox. You need to ensure that the mailbox can be scheduled as a
resource. Which two cmdlets should you run? (Each correct answer presents part of the solution.
Choose two.)
A. Set-Mailbox-Identity Conf Rm1 -Type Room
B. Set-Mailbox-Identity Conf Rm1 -Type Regular
C. Set- MailboxCalendarSettings -Identity Conf Rm1 - AutomateProcessing AutoAccept
D. Set- MailboxCalendarSettings -Identity Conf Rm1 - AutomateProcessing Auto Update
206.
Marc is Marias assistant. Marc needs to be able to view all of the folders and subfolders in Marias
mailbox and to open and respond to Marias e-mail. You need to assign Marc the appropriate
permissions. What should you do?
A. Run the Add-ADPermission -Identity Maria User Marc AccessRights Self ExtendedRights
Send-As cmdlet.
B. Run the Add-MailboxPermission Identity Maria User Marc AccessRights ExternalAccount
cmdlet
C. Run the Add-MailboxPermission Identity Maria User Marc AccessRights FullAccess
cmdlet.
D. In the Active Directory Users and Computers management console, assign Marc the Allow-
Full Control permission for Marias user account.
207.
A senior manager at your company is under suspicion of forwarding sensitive information to a
competitor. The chief executive officer (CEO) wants to be provided with a copy of all messages
that the senior manager sends but does not want the senior manager to be aware that he is
under surveillance. Which of the following actions would you configure when setting up a
transport rule to screen the senior managers messages?
A. Blind carbon copy (Bcc) the message to addresses
B. Add a recipient in the To field addresses
C. Redirect the message To addresses
D. Silently drop the message
208.
You need to generate a report on all of the Exchange Server 2007 computer s in your Exchange
organization. The report must include:
Operating system version
Number of processors
Total physical memory
Number of storage groups
Number of mailbox databases
What should you do?
A. Run the Get-ExchangeServer | Format-List cmdlet.
B. Run the Get-OrganizationConfig cmdlet.
C. Run the Test-SystemHealth cmdlet.
D. Run the Health Check scan in the Exchange Best Practices Analyzer.
209.
Your Exchange Server 2007 environment is configured with cluster continuous replication (CCR).
The Microsoft Windows Cluster service (MSCS) is installed on two servers named Server1 and
Server2. The default cluster that runs on the MSCS cluster is named Clus1. The cluster mailbox
server (CMS) is named ExchCMS1. Currently Clus1 and ExchCMS1 are running on the Server1
cluster node, and the CCR replica is running on the Server2 cluster node. You need to back up
the CCR replica. In the backup application, which name should you specify?
A. Server1
B. Server2
C. ExchCMS1
D. Clus1
210.
A users e-mail account is configured to use POP3. The users mailbox is accidentally purged from
the Exchange Server 2007 Mailbox server. You restore a backup copy of the database that
contained the mailbox to a recovery storage group on the same server. The user reports that he
can not access his mailbox. You need to ensure that the user can access his mailbox. Before you
reconnect the mailbox, what should you do?
A. Enable POP3 access on the mailbox.
B. Move the mailbox to a standard storage group.
C. Instruct the user to use IMAP to connect to the mailbox.
D. Instruct the user to use Outlook Web Access to connect to the mailbox.
211.
You need to find out if users can log on to your Mailbox server directly by using Microsoft Office
Outlook. Which cmdlet should you run on the client network?
A. Test- ServiceHealth
B. Test- SystemHealth
C. Test- MAPIConnectivity
D. Test- OutlookWebServices
212.
Windows NT 4.0 is currently installed on the system you are using on an NTFS partition. You want to install Windows 2000 Professional and dual boot NT 4.0 and 2000 professional. What do you need to do?

A. Install Windows 2000 on the same folder that Windows NT is installed in
B. Install Windows 2000 on a separate partition from Windows NT 4.0
C. Upgrade Windows NT 4.0 to SP4 or later then install Windows 2000.
D. This cannot be accomplished
213.
A mailbox has 40 KB of mailbox rules. You need to move the mailbox from your Exchange Server
2007 computer to an Exchange Server 2003 computer at a remote site. How should you achieve
this goal?
A. Use the Exchange Task wizard in Exchange Server 2003.
B. Use the Move Mailbox wizard in Exchange Server 2007.
C. Run the Move-Mailbox cmdlet with the IgnoreRuleLimitErrors parameter.
D. Run the Move-Mailbox cmdlet with the IgnorePolicyMatch parameter.
214.
An Exchange Server 2007 computer name d Exch1 fails. You build a new Microsoft Windows
Server 2003 computer named Exch1 to replace the failed computer. Before you restore the
mailbox databases from backup, you need to restore the Exchange Mailbox server role on Exch1.
What should you do?
A. Restore the System State data and the Microsoft Information Store data.
B. Run the Setup /NewProvisionedServer/role:Mailbox command.
C. Run the Setup /m:lnstall /role: Mailbox command.
D. Run the Setup /m:RecoverServer command.
215.
You need to identify the Exchange Server 2007 server role that must be installed on a stand-
alone server. Which server role should you identity?
A. ClientAccess
B. Edge Transport
C. Hub Transport
D. Mailbox
216.
You need to configure your Exchange Server 2007 computer so that a specific distribution group
will allow out-of-office responses from the mailboxes of members of the distribution group. What
should you do?
A. On the distribution group properties, enable out-of-office responses to be sent to message
senders.
B. On the distribution group properties, enable delivery reports to be sent to message senders.
C. On the default remote domain policy, enable out-of-office responses.
D. Re-create the distribution group as a security group.
217.
What does the following command do?
Set-PublicFolder OHuman ResourcesO -ReplicationSchedule "Saturday.12:00 AM -
Monday.12:00
AMO
A. Specifies that the Human Resources public folder replicates only on Saturday and Sunday.
B. Specifies that the Human Resources public folder replicates only on Saturday, Sunday, and
Monday.
C. Specifies that the Human Resources public folder replicates only on Sunday.
D. Specifies that the Human Resources public folder always uses the default replication schedule
of the public folder database.
218.
Your environment contains t he following servers:
Mailbox server named ExchMb1
Client Access server named ExchCAS1
Standby Microsoft Windows Server 2003 computer named Server2
Two Hub Transport server s named ExchHub1 and ExchHub2 ExchHub1 fails.
You need to restore ExchHub1 to its pre- failure configuration
What should you do?
A. Rename Server2 to ExchHub1, and run the Setup /m:RecoverServer command on ExchHub1.
B. Rename Server2 to ExchHub1, and run the Setup /m:lnstall /role:HT command on ExchHub1.
C. On ExchHub2, run the Setup /m:RecoverServer command.
D. On ExchHub2, run the Setup /m:lnstall /role:HT command.
219.
What does the following Exchange Management Shell command do?
New-DistributionGroup -Name "Manufacturing" -OrganizationalUnit Users SAMAccountName
Manufacturing -Type Security
A. Creates a mail-enabled local security group called Manufacturing
B. Creates a mail-enabled universal security group called Manufacturing
C. Creates a universal distribution group called Manufacturing
D. Creates a dynamic distribution group called Manufacturing
220.
What is MCDBA
221.
Suppose You are the SMS administrator for ComPany.com. You use SMS 2003 SP1 and the Security
Update Inventory Tool for patch management. The Security Update Inventory Tool is installed
and configured with the default settings. The package created by the tool is named Security. you
force the security sync advertisement to run and download new information on updates. you force
the security advertisement to run on a test server named 1 to collect software update data. three
hours later you discover that there is no new data. you need to ensure that the current software
update data is sent from 1 to the sms server as soon as possible. What should you do?
A. Change the Security advertisement to run the Security program.
B. Change the Security program to run Scanwrapper.exe /cache /kick.
C. force 1 to run a hardware inventory cycle.
D. force 1 to run a software inventory cycle.
222.
You are the SMS administrator for ComPany.com. You use SMS 2003 SP1 and the Security
Update Inventory Tool for patch management. The Security Update Inventory Tool is installed
and configured with the default settings. A new set of updates is available.
You need to identify which computers are not compliant with a specific update. You want to
achieve this goal by using the least amount of administrative effort. What should you do?
A. View the Software Updates container of the SMS Administrator console to find the computers
that need the updates.
B. View Resource Explorer for each computer to identify applicable updates.
C. Create a query that selects computers that need the updates.
D. Run the Computers where a specific software update is applicable report to find the
computers that need the updates.
223.
You are the SMS administrator for ComPany.com. The company has a single SMS site. All site
roles are enabled. The Hardware Inventory Client Agent and the Software Inventory Client Agent
are disabled. The SMS Advanced Client is installed on all computers in the network. You want to
create a list of the computers on the network. The list must include the computer name, IP
address, last logged on user, and MAC address for each computer. You want all users on your
team to have access to this list. You are the only user on your team who has access to the SMS
Administrator console. You need to configure SMS to automatically create the list. Which two
actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create a report to display the required data.
B. Create a query to display the required data.
C. Configure permissions on the created report to allow users to view it.
D. Configure permissions on the created query to allow users to view it.
224.
You are the SMS administrator for ComPany.com. All servers run Microsoft Windows Server
2003. All desktop computers run Windows 98. You plan to deploy the SMS client software to all
desktop computers on the network. You want to install the SMS client software based on the
logon credentials. You need to create a logon script that will automatically install the SMS client
on all desktop computers. What are two possible ways to achieve this goal? (Each correct answer
presents a complete solution. Choose two.)
A. Configure the logon script to run Capinst.exe.
B. Configure the logon script to run CCMSetup.exe.
C. Configure the logon script to run Client.msi.
D. Configure the logon script to run Smsman.exe.
225.
Suppose You are the SMS administrator for ComPany.com. All servers run Microsoft Windows Server
2003. All desktop computers run Windows XP Professional. You install SMS 2003 SP1. You
configure the SMS site with advanced security. You install the SMS Advanced Client on all
computers. You need to discover all SMS clients by using Network Discovery.
Which Network Discovery method will be unavailable?br />A. DHCP
B. Domains
C. SNMP
D. SNMP Devices
E. Subnets
226.
Suppose You are the SMS administrator for ComPany.com. The SMS 2003 site hierarchy consists of a
single primary site. Servers run Microsoft Windows Server 2003. Desktop computers run
Windows XP Professional. Users who are members of a group named Help Desk want to access
computers remotely. The Remote Tools Client Agent is configured as shown in the exhibit.
**MISSING**
Users in the Help Desk group have full access rights on the Remote Assistance tool and SMS
Remote Tools. All SMS client computers use the default settings for the Remote Desktop service.
You need to instruct the users in the Help Desk group how to access computers remotely. What
should you instruct them to do?
A. In the SMS Administrator console, start Windows Diagnostics.
B. In the SMS Administrator console, start Remote Tools.
C. In the SMS Administrator console, start Remote Assistance.
D. In the SMS Administrator console, start Remote Desktop Client.
227.
Explain You are the SMS administrator for ComPany.com. All servers run Microsoft Windows Server
2003. All desktop computers run Windows XP Professional. The company has a single SMS 2.0
SP3 site. You plan to upgrade the SMS 2.0 site to SMS 2003 SP1.
You need to test specific upgrade tasks before implementing SMS 2003 SP1 in the production
environment. Which task should you avoid performing in a production environment?
A. installingInternet Information Services
B. upgrading to SMS 2.0 SP4
C. running the Deployment Readiness Wizard
D. runningSetup.exe /testdbupgrade SMS_
228.
Tell me You are the SMS administrator for ComPany.com. All servers run Microsoft Windows Server
2003. All desktop computers run Windows XP Professional. You want to install the SMS
Advanced Client on all computers on the network. You use the Client Push
Installation Wizard to install the SMS client software on the computers. You discover that some of
the computers failed to install the SMS client. You need to identify the cause of the problem.
Which three log files could you examine on both the SMS client and the SMS site server? (Each
correct answer presents a complete solution. Choose three.)
A. Ccm.log
B. Ccmsetup.log
C. Cidm.log
D. Client.msi.log
E. Ddm.log
F. Smsexec.log
229.
Can you explain You are the SMS administrator for ComPany.com. Your network consists of a single Active
Directory domain. The network contains a Microsoft SQL Server 7.0 SP3 computer. The SMS site
server runs Microsoft Windows 2000 Server SP3. The SMS site server is configured as a
management point, client access point, server locator point, and reporting point. You want to use
a server that runs Microsoft Windows NT Server 4.0 SP4 as a distribution point. The SMS site
currently uses the standard security mode. You need to migrate from the standard security mode
to the advanced security mode. You want to achieve this goal by using the least amount of
administrative effort. Which two actions should you perform? (Each correct answer presents part
of the solution. Choose two.)
A. Upgrade the computer you want to configure as a distribution point to Windows NT Server
4.0 SP6.
B. Upgrade the computer you want to configure as a distribution point to Windows 2000 Server
SP3.
C. Upgrade the SQL Server computer to SQL Server 2000 SP3a.Upgrade the SMS site server
to Windows Server 2003.
D. Extend the Active Directory schema.
230.
You are the SMS administrator for ComPany.com. Your SMS hierarchy consists of a single
primary site. Your SMS site consists of a single site server configured as a management point, a
client access point, a server locator point, and a distribution point. Employees use Pocket PC
devices. They only access the company network over a wireless connection. You want to use
SMS to manage the Pocket PC devices. You install and configure the Device Management
Feature Pack on the SMS site server. You now need to deploy the client software to the mobile
devices. What should you do?
A. Create an advertisement to install the Device Client on the computers running Microsoft
ActiveSync.
B. Create an advertisement to install the Device Client on the mobile devices.
C. Use Client Push Installation to install the Device Client.
D. Use a Web site to make the Device Client installation available.
231.
You are the SMS administrator for ComPany.com. The SMS 2003 site hierarchy consists of a
single primary site. The SMS site server is configured as a management point, client access
point, server locator point, and distribution point. The hardware on the management point must be
replaced. You need to transfer the management point
role to a different server. The only computer available for this purpose runs Microsoft Windows
NT Server 4.0 SP4. You need to prepare this computer to be a management point. What should
you do?
A. Install Windows 2000 Server SP3 and IIS.
B. Install Windows Server 2003 with the default settings.
C. Install SP6 for Windows NT Server 4.0 and IIS
D. Install Windows 2000 Server SP2.
232.
You are the SMS administrator for ComPany.com. All domain controllers run Microsoft Windows
Server 2003. All desktop computers run Windows XP Professional. You plan to install SMS 2003
SP1. You need to instruct the Active Directory administrator how to prepare Active Directory for
SMS integration. What instruction or instructions should you convey to the Active Directory
administrator? (Choose all that apply.)
A. Create the System Management container.
B. Create the SMS 2003 container.
C. Give appropriate rights to the System Management container.
D. Give appropriate rights to the SMS 2003 container.
E. Log on by using a user account that is a member of the Schema Admins group.
F. Run ExtADSchem.exe
233.
If You are the SMS administrator for ComPany.com. The Hardware Inventory Client Agent is
enabled with the default configuration settings. You need to ensure that the Hardware Inventory
Client Agent is run every Tuesday at 19:00. What should you do?
A. Configure the Hardware Inventory Client Agent to use a Full schedule.
B. Add an IDMIF file to each client that sets the new schedule.
C. Configure the Hardware Inventory Client Agent to use a Simple schedule.
D. Change the SMS_def.mof to comply with the new schedule.
234.
You are the SMS administrator for ComPany.com. The SMS hierarchy consists of a single
primary site. You use SMS to deploy a program that examines the latest version of the antivirus
software that is used by the computers on the network. Two advertisements use this program.
One advertisement runs daily on servers and portable computers. Another advertisement runs
weekly on desktop computers. You discover a security flaw in the program that collects the
antivirus software information. You need to prevent computers from running the program until you
fix the security flaw. You need to ensure that all other advertisements function normally. You want
to achieve this goal by using the least amount of administrative effort. What should you do?
A. Disable the program.
B. Delete the program.
C. Disable the Advertised Programs Client Agent.
D. Delete each advertisement.
235.
You are the SMS administrator for ComPany.com. ComPany uses Active Directory System
Discovery when configuring SMS to discover computers. The Organizational Unit (OU) structure
is shown in the following exhibit
**MISSING**
You need to configure Active Directory System Discovery to discover the computers in the
Information Services OU, but not the Help Desk OU.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A. Ensure that the Recursive search option is selected.
B. Query the local domain location.
C. Query the local forest location.
D. Ensure that the Recursive search option is not selected.
E. Create a custom LDAP or GC query that points to the Information Services OU.
236.
You are the SMS administrator for ComPany.com. All servers run Microsoft Windows Server
2003. All desktop computers run Microsoft Windows XP Professional. The company has a single
SMS site. The SMS Advanced Client is installed on all computers on the network. You need to
inventory the network to discover only the followinG.
1. The version of Microsoft Word that is being used by each computer
2. A list of applications that is installed on each computer
3. The version of the definition file named Av.dat that is used by the antivirus software
You need to modify the default settings for the SMS Software Inventory Client Agent to collect
this information. You need to achieve this goal by using the least amount of administrative effort.
Which entry or entries should you add? (Choose all that apply.)
A. *.exe
B. Av.dat
C. Winword.exe
D. *.*
237.
You are the SMS administrator for ComPany.com. The company has a single SMS site.
Employees use Windows mobile devices. You use the Device Client to manage these devices
with the SMS Device Management Feature Pack. You want to ensure that the mobile devices
meet the following security guidelines:
1. Passwords comply with complexity requirements.
2. Desktop computers use digital certificates while connecting over the virtual private
network (VPN).
You need to configure the mobile devices to comply with these guidelines.
Which two tasks should you perform? (Each correct answer presents part of the solution. Choose
two.)
A. Use an advertisement to run a Microsoft Visual Basic Scripting Edition (VBScript) script to
configure VPN settings.
B. Use an advertisement to run a Microsoft Visual Basic .NET assembly to configure VPN
settings.
C. Use Device Settings Manager to configure the VPN settings.
D. Use Device Settings Manager to configure the password policy.
238.
Suppose You need to ensure that transportation brokers are authenticated when they access the broker
Web site. Which action or actions should you take? (Choose all that apply)
A. Create a distribution list of authenticated users
B. Provide a facility for online registration
C. Provide a facility to view passwords
D. Provide secure storage of user names and passwords
E. Secure the exchange of user names and passwords between the client computer and the
server
F. Enable e-mail access for transportation brokers
Answer: B, D, E
239.
Suppose You are completing the technical specification for the new reservation application.
Which technique should you recommend for state management?
A. ASP.NET ViewState
B. Server-side database
C. Client-side cookies
D. Application cache
240.
Explain Which new business process or processes should be supported by the new solution?
(Choose all that apply)
A. Brokers can order transportation services
B. Vehicle scheduling capability is provided
C. Bar code readers are supported
D. Use of space on vehicles can be tracked
E. Brokers can track shipments
F. Customers can track parcels
Answer: A, D, E
241.
Suppose You are writing a list of integration requirements for your solution. Which requirement or
requirements should you include? (Choose all that apply)
A. Order data must be read from the accounting application
B. Shipment tracking must be read from an XML Web service
C. Customers must be redirected to another Web site to track shipments
D. Customers must be able to place orders by using an XML Web service
E. Order data must be written to the accounting application
F. Order data must be e-mailed to the salespeople
Answer: A, B, E
242.
Suppose You are creating the logical design for a use case named Customer updates customer profiles?.
Which object or objects should you include in the design? (Choose all that apply)
A. Data access object
B. Customer object
C. Flight object
D. Logging object
E. Airline object
243.
Suppose You need to enable brokers to track their own shipment. To meet this requirement, you need to
consider various specifications. Which four specifications should you consider? (Each correct
answer presents part of the solution)
A. Provide a Web-accessible form to authenticate brokers against a table of registered users
B. Provide a Web-accessible form to enable brokers to request vehicle routes for their shipments
C. Provide a Web-accessible form to query the database for broker shipments
D. Provide a Web-accessible form to generate waybill numbers
E. Identify a parcel in the database as part of a broker shipment
F. Relate a parcel to a specific broker
G. Track the weight of a parcel in the database
244.
Explain The invoice creation process must be dynamically monitored to track the following information:
Average number of seconds to create an invoice
Number of invoices created per second
Total number of successfully created invoices
Total number of failed attempts to create an invoice
Monitoring should occur with a minimum of development effort. What should you do?
A. Write statistics to the database and use SQL Query Analyzer to dynamically monitor the
statistics
B. Create a removable Microsoft .NET class to contain statistics. Configure the class as singleton
class. Write a utility that retrieves statistical information from this class
C. Write statistics to the application event log
D. Use custom performance counters
245.
Suppose You are writing the technical specification for your solution. You need to select a technology for
the new timesheet application. Which technology should you use?
A. an XML Web service
B. a Web application
C. a console application
D. a Windows Forms application
246.
Suppose You are preparing the functional specification for the new reservation application. Which two
functionalities should you specify? (Each correct answer presents part of the solution. Choose
two)
A. Localization
B. Monitoring of application performance
C. Secure storage of customer profile information
D. Availability of application for mobile phones and personal digital assistants
E. Integration with Active Directory
247.
Suppose You are writing the primary scenario of a use case named Customer retrieves a saved itinerary.
Which action or actions should be included?(Choose all that apply)
A. Application informs customers that no itineraries exist
B. Application informs customers that a saved flight is no longer available
C. Customer asks for saved itineraries
D. Application offers alternate flights
E. Application queries the database for saved itineraries
F. Application displays retrieved itineraries
248.
Explain Which business constraint poses the greatest potential risk to completing your project for Blue
Yonder Airlines?
A. The current IT staff must support the solution in the future
B. All testing scenarios and all necessary rework must be completed during the one-month testing
period.
C. The scheduling vendor will begin providing access by XML Web service in three months
D. The application must be completed within a five-month development period before it is tested
249.
Suppose Web application used by Team Leads and Business Planners requires an authentication
mechanism. Which pair of authentication technologies should you recommend?
A. IIS Anonymous authentication with ASP.NET Passport authentication
B. IIS Anonymous authentication with ASP.NET Forms authentication
C. IIS Basic authentication with SSL and ASP.NET Windows authentication
D. IIS Integrated Windows authentication with ASP.NET Windows authentication
E. IIS Basic authentication with SSL and ASP.NET Forms authentication
250.
Suppose You are writing a conceptual diagram of the modules that must be developed for your solution.
Which module or modules should be included?(Choose all that apply)
A. a Web application for Team Leads and Business Planners
B. a timesheet entry database
C. a billing database
D. a notification engine that sends timesheet entry reminders
E. a timesheet entry application
F. a Windows CE application
G. a utility that uploads information to the billing application
251.
Explain When the new solution is in place, parcel information and parcel history information must be
stored. You need to estimate the amount of data that will be generated by the new solution during
its first year of use. What is the approximate amount?
A. 824MB
B. 5GB
C. 8GB
D. 50GB
252.
Suppose You need to decide whether your conceptual design represents a complete solution.
Which four design artifacts are relevant to your decision? (Each correct answer presents part of
the solution. Choose four)
A. Unit test for authenticating brokers
B. Component prototypes for tracking shipments
C. Functional requirements for tracking shipments
D. Unit test cases for tracking shipments
E. Use cases for authenticating brokers
F. Functional requirements authenticating brokers
G. Component prototypes for authenticating brokers
H. Use cases for tracking shipments
253.
Suppose You are listing the operational requirements for the new reservation application.
Which requirement should you include?
A. Extensibility
B. Localization
C. Mantainability
D. Availability
E. Deployability
254.
Suppose You are writing the operational requirements document for your solution. Which should you
include?
A. The application must encrypt all time entry data on client computers and in the database, and
data must be encrypted when transmitted over the internet
B. The IT staff will be responsible for fixing bugs in the code
C. The IT staff must be alerted to application problems
D. The application can have no single point of failure
255.
Suppose You are writing the technical specification for your solution. Your new timesheet application must
be able to access timesheet entry data. You need to specify the technology that will be used for
accessing this data. Your solution must require the minimum development effort. Which
technology should you use?
A. a SQLConnection class
B. a .NET Remoting object that uses TCP channel and binary formatting
C. an XML Web service proxy class
D. an interop assembly
256.
Suppose You are establishing a policy to measure the effectiveness of your deployment process.
You decide to track one or more phases of development to identify defects. Which phase or
phases should you track?(Choose all that apply)
A. Design and analysis
B. Development
C. Stabilization
D. Requirements
257.
You are validating the physical design for your solution. Which element or elements should be
included in the design?(Choose all that apply)
A. algorithms for scheduling vehicles
B. scalability to meet increased usage
C. authentication of transportation brokers
D. online registration facility for transportation brokers
E. interface to the bar code readers
258.
If you are writing the functional specification for your solution. You must include the customer
pricing requirements. Which requirement or requirements should you include? (Choose all that
apply)
A. Pricing data must be encrypted
B. Each user must be uniquely identified
C. Content must be personalized by user
D. Order data must be read from the accounting application
259.
Suppose You are designing a strategy to migrate data from the existing timesheet application to the new
application. Which tool or technology should you use?
A. XML Schema Definition tool (xsd.exe)
B. COM interoperability
C. Microsoft SQL Server Data Transformation Services (DTS)
D. Microsoft SQL Server replication
260.
Explain Which new module or modules should you develop for Trey Research? (Choose all that apply.)
A. An application to export laboratory results
B. A data store
C. A Web application for trucking supervisors
D. An automated report generator
E. An application to import laboratory reports
F. An OCR interface
G. An IVR application
261.
Before you release the solution, you need to develop a process to validate and enforce an
appropriate level of quality. Which three statistics should you use?
(Each correct answer presents part of the solution)
A. Number of defects per component
B. Number of defects per thousand lines of source code
C. Number of defects by developer
D. Percentage of successful builds
E. Percentage of requirements tested
F. Number of defects detected to date
G. Number of defects corrected to date.
262.
Suppose You are validating the physical design of a data a data layer class that will return a set of time
entries from the timesheet database. This class will be used by the Web application for Team
Leads and Business Planners and, indirectly, by the new timesheet application.
The class must use connection pooling, and it must be as secure and as flexible as possible. You
need to specify a Microsoft SQL Server authentication strategy that meets these requirements.
Which strategy should you use?
A. The data class uses SQL Server authentication with an application specific SQL Server
account. The account name and password are embedded in a connection string
B. The data class uses Windows authentication when connecting to the database and
impersonates a specific account created for operations on the database
C. The data class uses Windows authentication when connecting to the database and
impersonates the application user
D. The data class uses SQL Server authentication with the SQL Server sa account
263.
Suppose You are creating the physical design for the customer category data model. For reporting
purposes, you want to optimize access to customer category data. You define a Customer table
and a Category table. What should you do next?
A. Define three foreign key columns in the Category table, such that each column references a
different parent row in the Customer table. Define indexes on the foreign key columns.
B. Define three foreign key columns in the Customer table, such that each column references a
different parent row in the Category table. Define indexes on the foreign key columns.
C. Define a foreign key column in the Category table that references the parent row in the
Customer table. Define an index on the foreign key column.
D. Define a foreign key column in the Customer table that references the parent row in the
Category table. Define an index on the foreign key column.
264.
Suppose You need to recommend standard development processes for your solution. Your
recommendations must assist the development team in learning to use the Microsoft .NET
Framework as quickly as possible. Which process or processes should you recommend?(Choose
all that apply)
A. Create an automated build process
B. Install error-tracking software
C. Ensure that all assemblies pass unit testing
D. Permit individual developers to use any Microsoft .NET language
E. Hold regular code reviews
265.
Suppose Your team builds a daily release of the timesheet application for testing by the quality assurance
(QA) team. You find that the volume of bugs is threatening your project schedule. The following
example is a typical bug:
One method should return a dataset that is based on a date range given as input parameters.
However, when the method queries the database, it erroneously interchanges the beginning date
and the end date. An empty dataset is always returned.
You need to minimize these kinds of bugs using a minimum of development effort and
QA effort. What should you do?
A. Require more frequent builds
B. Require the QA team to perform more integration testing
C. Require engineers to perform complete integration testing before submitting code
D. Require engineers to perform adequate unit tests before submitting code
266.
Suppose You need to create a physical design that meets the monitoring requirements of Fabrikam, INC.
What should you do?
A. Create and use a new event log to record each customer logon event
B. Use the built-in ASP.NET performance counters to monitor application load
C. Use the Trace class to record each customer logon event
D. Create and use new NumberOfItems performance counters to monitor active customer sessions
267.
Suppose A database architect on your team prepares a logical data model. The model includes entries that
correspond to clients, projects and timesheet entries. You are reviewing the model. Which entity
relationship or relationships should be included?(Choose all that apply)
A. a Project entity is the parent of a TimesheetEntry entity
B. a Client entity is the child of a TimesheetEntry entity
C. a many-to-many relationship exists between a Client entity and a Project entity
D. a many-to-many relationship exists between a Project entity and a Timesheet Entry entity
E. a Client entity is the parent of a Project entity
F. a Client entity is the parent of a TimesheetEntry entity
268.
Suppose You are validating your physical design. You need to ensure that the design maps to the
categorization requirements for customer pricing. Which member should you include in the
design?
A. A GetPrice method of a Product class with no parameters
B. A Price property of a Product class
C. A Price property of a Customer class
D. A GetPrice method of a Product class with a single Customer Object parameter
269.
Suppose You are analyzing the feasibility of your solution. You need additional information to decide
whether the solution is technically possible. Which additional information do you need?
A. A copy of the existing timesheet application
B. A prototype of the Web application that will be used by Team Leads and Business Planners
C. A list of the different models of Windows CE devices that need to be supported
D. API information and requirements related to integration with the billing application
270.
Explain The Web application used by Business Planners generates many types of reports. One type
displays billing information over specified timeframes. The other selects a lawyer and a timeframe
and the report displays the average number of minutes billed by that lawyer per day and the
average number of minutes billed to each client per day over that timeframe. You must ensure
that this report is generated with a minimum network traffic. What should you do?
A. Use Microsoft SQL Server indexes to optimize the data calculations
B. Implement the calculations in a business layer class
C. Implement the calculations in a data layer class
D. Use Microsoft SQL Server stored procedures for the data calculations
271.
Suppose You need to implement online interactive user assistance for the new reservation application.
What should you do?
A. Create a manual that can be downloaded from the Web site
B. Create a compiled help module and use context-sensitive help for all screen elements
C. Implement ToolTips to provide information about all screen elements
D. Use the ALT attribute to provide a short textual description for all images and audio files.
272.
Explain Your functional specification includes the following statement: User identity and a tirnestarnp
must be captured when a driver authenticates to the IVR application or the driver Web
application. In your technical specification, you need to specify the target where logged
messages should be written. Which target should you specify?
A. The sysmessages table in the Microsoft SOL Server master database
B. The Security event log
C. A table in the applications Microsoft SOL Server database
D. A custom event log
273.
Suppose You need to select a strategy that will provide detailed usage information for the new reservation
application. Information must be provided with a minimum development effort. What should you
do?
A. Use Microsoft .NET performance counters in the application
B. Create a Microsoft Management Console(MMC) snap-in for the application
C. Add Windows Management instrumentation to the application
D. Use the application?s configuration file to enable and disable logging
274.
Suppose You are writing a document that identifies potential project risks. Which business constraint poses
the greatest potential risk?
A. The solution must be hosted by Fabrikam, Inc
B. Testing and deployment of the customer Web site must be complete in six months
C. The shipping partner will deploy the XML Web service in four months
D. All customers will try to place orders at the end of the month
275.
Suppose You are designing the implementation of the interface to the accounting application. You need to
ensure that the new application can communicate with the accounting application. What should
you do?
A. Create an XML Web service class
B. Create TcpClient objects
C. Create TcpListener objects
D. Create an XML Web service proxy class by using Wsdl.exe
276.
You must ensure that the new reservation application can be monitored while it is running. Which
approach should you use?
A. TraceSwitch objects
B. Diagnostic tools
C. PerformanceCounter objects
D. Windows Management Instrumentation Job Object provider
277.
If you are creating the logical design for the new reservation application. Which entity or entities should you include? (Choose all options that apply)
A. Airport
B. Flight
C. Customer
D. Gate
E. City
278.
Suppose You are validating your conceptual design in terms of scalability. Which requirement will probably
have the greatest impact on scalability?
A. Scheduling additional vehicles
B. Using the interface to bar code readers
C. Reporting use of space in vehicles
D. Handling additional broker shipments
279.
Explain Which data item or items should you add to the existing applications? (Choose all that apply)
A. Waybill information
B. Broker identification information
C. Depot information
D. Parcel dimensions
E. Parcel routing information
F. Information about use of space on vehicles
280.
Explain Which performance standard should you use for your solution?
A. Vehicle usage of at least 80 percent of total capacity
B. Database size of less than one terabyte
C. CPU utilization of less than 50 percent in the database server
D. Screen response time of two seconds or less
281.
Suppose You create a Visual Studio .NET setup project to distribute an application. You add a SQL script
named XYZDB.SQL. You must ensure that the SQL script is executed during the installation
process. What should you do?
A. Add a custom action to your setup project.
Select XYZDB.SQL as the source path.
B. Add a batch file to your setup project to execute XYZDB.SQL.
Add a launch condition to the setup project.
Set the Condition property to the batch file.
C. Create a new Visual Studio .NET project that executes XYZDB.SQL.
Include the new project with your setup project.
Add a custom action that launches the new project during installation.
D. Add a launch condition to your setup project.
Set the Condition property to XYZDB.SQL.
282.
Suppose You use Visual Studio .NET to develop a Windows-based application. Your application will
display customer order information from a Microsoft SQL Server database. The orders will be
displayed on a Windows Form that includes a DataGrid control named XYZGrid1. XYZGrid1 is
bound to a DataView object. Users will be able to edit order information directly in XYZGrid1.
You must give users the option of displaying only edited customer orders and updated values in
XYZGrid1.
What should you do?
A. Set the RowStateFilter property of the DataView object to
DataViewRowState.ModifiedOriginal.
B. Set the RowStateFilter property of the DataView object to DataViewRowState.ModifiedCurrent.
C. Set the RowFilter property of the DataView object to DataViewRowState.ModifiedOriginal.
D. Set the RowFilter property of the DataView object to DataViewRowState.ModifiedCurrent.
283.
Suppose You develop a Windows-based application XYZ App by using Visual Studio .NET. XYZApp
implements ADO.NET objects to call Microsoft SQL Server stored procedures. Your database
administrator is responsible for coding and maintaining all stored procedures. Periodically, the
administrator modifies the stored procedures.
At run time, your application code must discover any changes in the way that values are passed
to and returned from the stored procedures.
Which ADO.NET object and method should you use?
A. CommandBuilder.RefreshSchema
B. CommandBuilder.DeriveParameters
C. SqlCommand.CreateParameter
D. SqlDataAdapter.GetFillParameters
284.
Suppose You develop a Windows-based application XYZiApp by using Visual Studio .NET. XYZiApp uses
a SqlConnection object for database access.
You typically run XYZiApp on a computer that has limited RAM and hard disk space. After the
code finishes using the SqlConnection object, you must ensure that the connection is closed and
that any resources consumed by the object are released immediately.
What should you do?
A. Call the Finalize method of the SqlConnection object.
B. Call the Dispose method of the SqlConnection object.
C. Set the SqlConnection object equal to Nothing.
D. Set the SqlConnection object equal to
285.
Suppose You execute a query on your external Oracle database named XYZSalesDate by using an
OleDbCommand object. The query uses the Average function to return a single value that
represents the average price of products in the inventory table. You want to optimize performance
when you execute this query.
To execute this query from your ADO.NET code, you need to use a method of the
OleDbCommand object. Which method should you use?
A. ExecuteNonQuery
B. ExecuteScalar
C. ToString
D. ExecuteReader
286.
Suppose You develop a Windows-based application XYZApp that includes several menus. Every top-level
menu contains several menu items, and certain menus contain items that are mutually exclusive.
You decide to distinguish the single most important item in each menu by changing its caption
text to bold type.
What should you do?
A. Set the DefaultItem property to True.
B. Set the Text property to ?True?.
C. Set the Checked property to True.
D. Set the OwnerDraw property to True.
287.
Suppose You use Visual Studio .NET to create a Windows-based application for XYZ Inc. The application
includes a form that contains several controls, including a button named exitButton. After you
finish designing the form, you select all controls and then select Lock Controls from the Format
menu.
Later, you discover that exitButton is too small. You need to enlarge its vertical dimension with
the least possible effort, and without disrupting the other controls.
First you select exitButton in the Windows Forms Designer. What should you do next?
A. Set the Locked property to False.
Set the Size property to the required size.
Set the Locked property to True.
B. Set the Locked property to False.
Use the mouse to resize the control.
Set the Locked property to True.
C. Set the Size property to the required size.
D. Use the mouse to resize the control.
288.
Suppose You develop a Windows-based application that includes the following code segment. (Line
numbers are included for reference only.)
01 Public Sub password_Validating (ByVal sender As _
02 Object, ByVal e As _.
03 System.ComponentModel.CancelEventArgs)
04 Handles password.Validating
05 If ValidPassword() = False Then
06 Insert new code.
07 End If
08 End Sub
You must ensure that users cannot move control focus away from textPassword if
ValidPassword returns a value of False. You will add the required code on line 6.
Which code segment should you use?
A. e.Cancel = True
B. sender = textName
C. password.AcceptsTab = False
D. password.CausesValidation =False
289.
Suppose You develop a Windows Form that provides online help for users. You want the help functionality
to be available when users press the F1 key. Help text will be displayed in a pop-up window for
the text box that has focus.
To implement this functionality, you need to call a method of the HelpProvider control and pass
the text box and the help text.
Which method should you call?
A. SetShowHelp
B. SetHelpString
C. SetHelpKeyword
D. ToString
290.
You are preparing a localized version of a Windows Form named XYZLocal. Users of XYZLocal
speak a language that prints text from right to left. User interface elements on the form need to
conform to this alignment.
You must ensure that all user interface elements are properly formatted when the localized
Windows Form runs. You must also ensure that XYZLocal is easy to update and maintain.
What should you do?
A. Set the RightToLeft property of each control on the form to Yes.
B. Set the RightToLeft property of the form to Yes.
C. Set the Language property of the form to the appropriate language.
D. Set the Localizable property of the form to True.
291.
As a developer at XYZ you develop a new sales analysis application that reuses existing data
access components. One of these components returns a DataSet object that contains the data for
all customer orders for the previous year.
You want your application to display orders for individual product numbers. Users will specify the
appropriate product numbers at run time.
What should you do?
A. Use the DataSet.Reset method.
B. Set the RowFilter property of the DataSet object by using a filter expression.
C. Create a DataView object and set the RowFilter property by using a filter expression.
D. Create a DataView object and set the RowStateFilter property by using a filter expression..
292.
Suppose You develop a Windows-based application. The application uses a DataSet object that contains
two DataTable objects. The application will display data from the two data tables. One table
contains customer information, which must be displayed in a data-bound ListBox control. The
other table contains order information, which must be displayed in a DataGrid control.
You need to modify your application to enable the list box functionality. What should you do?
A. Use the DataSet.Merge method.
B. Define primary keys for the DataTable objects.
C. Create a foreign key constraint on the DataSet object.
D. Add a DataRelation object to the Relation collection of the DataSet object.
293.
Tell me What is the difference between Remoting and Client/Server application?
294.
Suppose You create three Windows services named EXService1, EXService2, and EXService3. You want
to install all three services on a computer named XYZA by using the Installer tool (Installutil.exe).
On the command line of XYZA, you enter and run the following command:
Installutil EXService1 EXService2 EXService3
During the installation process, EXService3 throws an installation error. The installation process
completes.
How many of the three services are now installed on XYZ1?
A. None
B. One
C. Two
D. Three.
295.
Suppose You are planning to create a DataSet object named EXDataSet to be used in a bond-trading
application.
Several developers will need to write code to manipulate EXDataSet, and you want to ensure that
myDataSet is easy for them to use. You decide to create EXDataSet as a strongly typed data set.
Which two actions should you take? (Each correct answer presents part of the solution. Choose
two)
A. Create an XSD schema that defines EXDataSet.
B. Create an XDR schema that defines EXDataSet.
C. Create a class for EXDataSet that is based on the schema and that inherits from the DataSet
class.
D. Create a class for EXDataSet that is based on the schema and that inherits from the
XmlSchema class.
E. Create a key pair for EXDataSet by using the Strong Name tool (Sn.exe).
296.
Suppose You create a serviced component named Scheduler. Scheduler is registered in a library
application. The Scheduler methods parse String objects into Date Time objects.
You write a console application named EXCoverage.exe to test each method in Scheduler. You
want Coverage.exe to test Scheduler for multiple cultures to verify its globalization support.
What should you do?
A. Create a CultureInfo object for each culture locale before calling the Scheduler methods.
B. Create a RegionInfo object for each culture locale before calling the Scheduler methods.
C. Set the current thread?s CurrentCulture property to each culture locale before calling the
Scheduler methods.
D. Create a EXCoverage.exe.config file and add a element to the configuration file for
each culture locale.
297.
Suppose You are creating an XML Web service named ListBoxService. This service provides content,
such as states, countries, and geographical regions, for use in drop-down list boxes.
ListBoxService contains a Web method named RetrieveRegionsListBox. This method runs a
DataSet object that contains every geographical region in the world.
RetrieveRegionsListBox calls a Microsoft SQL Server database to load the DataSet object with
region data. You want to minimize the amount of time the method takes to return to the caller.
What should you do?
A. Use a stored procedure to return the data.
B. Store each DataSet object by using the Session object.
C. Set the BufferResponse property of the WebMethod attribute to false.
D. Set the CacheDuration property of the WebMethod attribute to an interval greater than zero.
298.
Suppose You are debugging a visual studio .Net application named XYZApp. The application produces an
Xml documents object and then consumes the same object. This object moves data in the
application. The object has no schema, but it contains a declaration line that you must inspect.
You decide to transform the XML code and its declaration into a string for easy inspection.
What should you do?
A. Assign the ToString method of the Xml Document object to a string variable.
B. Assign the OuterXml property of the Xml document object to a string variable
C. Assign the OuterXml property of the Xml document element property of the Xml document
object to a string variable.
D. Use the WriteContentTo method of the XmlDocument object to write the document into a
MemoryStream object. Use the GetXml method of the DataSet object to get a string version of
the document.
299.
Suppose You create a Windows service that processes XML messages placed in a MSMQ queue. You
discover that the service is not functioning properly.
You need to debug the service to correct the program.
What should you do?
A. Start the Windows service.
Then attach a debugger to the process.
B. Attach a debugger to the Windows service.
Then start the Windows service.
C. Start the Windows service.
Then run the .NET Services Installation tool (Regsvcs.exe).
D. Place a breakpoint in the Main method of the Windows service.
Then run the application within the Visual Studio .NET integrated development environment
(IDE).
300.
You create a .NET Remoting object named EXPatientinfo that exposes medical patient
information.
Because of the confidential nature of the information, you must ensure that the data remains
secure.
You want client applications to connect to EXPatientinfo over a secure communication channel.
You want to accomplish this task by writing the minimum amount of code.
What should you do?
A. Create your own host application and use a TcpChannel and BinaryFormatter.
B. Create your own host application and use an HttpChannel and a SoapFormatter.
C. Install EXPatientinfo in an Internet Information Services (IIS) virtual directory.
Configure EXPatientinfo to use a TcpChannel and a BinaryFormatter.
Configure IIS to use SSL.
D. Install EXPatientinfo in an Internet Information Services (IIS) virtual directory.
Configure EXPatientinfo to use an HttpChannel and a SoapFormatter.
Configure IIS to use SSL.
301.
You are creating an XML Web service that processes highly confidential messages. The service
exposed a Web method named RetrieveMessage that takes as input a code name and returns an
encrypted message.
You create a SOAP extension and override the extension?s ProcessMessage method so that you
can encrypt the message before it is sent back to the caller.
You need to encrypt only the data within the RetrieveMessageResult node of the SOAP
response. You create a function named EncryptMessage that encrypts the
RetrieveMessageResult node. You need to ensure that this method gets called before sending
the message back to the caller.
During which SoapMessageStage should you call EncryptMessage?
A. BeforeSerialize
B. AfterSerialize
C. BeforeDeserialize
D. AfterDeserialize
302.
You have DataSet object named LoanCustomersDataSet that contains customers serviced by the
loan department of XYZ. You receive a second DataSet that contains customers serviced by the
asset management department of XYZ. Both objects have the same structure.
You want to merge assetCustomersDataSet into LoanCustomersDataSet and preserve the
original values in loanCustomersDataSet.
Which code segment should you use?
A. loanCustomersDataSet.Merge (assetCustomersDataSet)
B. loanCustomersDataSet.Merge (assetCustomersDataSet, True)
C. assetCustomersDataSet.Merge (loanCustomersDataSet)
D. assetCustomersDataSet.Merge (loanCustomersDataSet, True)
303.
You are creating an XML Web service named XYZService. This service has a function named
WriteMessage that writes messages to a flat file in the C:EXServiceLog directory..
You want to implement security for WriteMessage so that WriteMessage and all the code it calls
can write messages only to the EXServiceLog directory.
Which code segment should you use?
A. Dim filePermission As New
FileIOPermission_(FileIOPermissionAccess.Write, ?C:EXServiceLog?)
filePermission.Demand()
B. Dim filePermission As New
FileIOPermission_(FileIOPermissionAccess.Write, ?C:EXServiceLog?)
filePermission.Deny()
C. Dim filePermission As New
FileIOPermission_(FileIOPermissionAccess.Write, ?C:EXServiceLog?)
filePermission.PermitOnly()
D. Dim filePermission As New
FileIOPermission_(FileIOPermissionAccess.Write, ?C:EXServiceLog?)
filePermission.Assert()
304.
You have a DataSet object named myDataSet. This object contains two DataTable objects
named Customers and Orders. Customers has a column named CustomerID, which is unique to
each customer.
Orders also has a column named CustomerID. You want to use the GetChildRows method of the
DataRow object to get all orders for the current customers.
What should you do?
A. Add a foreign key constraint on CustomerID of Orders between Customers and Orders.
B. Add a data relation to myDataSet on OrderID between Customers and Orders.
C. Create a unique constraint on CustomerID of Customers..
D. Create a primary key on CustomerID of Customers.
305.
Your company frequently receives product information from external vendors in the form of XML
data.
You receive XML document files, an .xdr schema file, and an .xsd schema file.
You need to write code that will create a typed DataSet object on the basis of product information.
Your code will be used in several Visual studio .NET applications to speed up data processing.
You need to create this code as quickly as possible.
What should you do?
A. Create the code manually.
B. Use XmlSerializer.Serialize to generate the code.
C. Use the XmlSerializer.Deserialize to generate the code.
D. Use the Xml Schema Definition tool (Xsd.exe) to generate the code.
306.
Suppose You are creating an XML Web service that provides a daily quotation from literary works to its
customers. This quotation is requested in many different languages, thousands of times every
day, and by thousands of Web sites operating many different platform.
A Web method named GetEXQuotes takes a languageID as input. GetEXQuotes uses this
language ID to retrieve a translated version of the daily quotation from a Microsoft SQL Server
database and to return that quotation to the customer.
You want to minimize the time it takes to return the translated version.
What should you do?
A. Store each translated quotation by using the Cache object.
B. Store each translated quotation by using the Session object.
C. Set the BufferResponse property of the WebMethod attribute to false.
D. Set the CacheDuration property of the WebMethod attribute to an interval greater than zero.
307.
How to create a serviced component named SessionDispenser. This computer is in the XYZ.Utilities
assembly and is registered in a COM+ server application. SessionDispenser has multiple callers.
You discover that there are logic problems in the Create New Session method. You want to
debug any calls to this method.
What should you do?
A. Open the SessionDispenser solution.
Set a breakpoint on the CreateNewSession method.
Start the debugger.
B. Attach the debugger to the client process.
Set a breakpoint on the SessionDispenser.CreateNewSession method.
C. Attach the debugger to the XYZ.Utilites.exe process.
Set a breakpoint on the CreateNewSession method.
D. Attach the debugger to a Dllhost.exe process.
Set a breakpoint on the CreateNewSession method.
308.
Suppose You create an XML Web service named WeatherService. This service contains a Web method
named RetrieveWeather. RetrieveWeather takes as input a city named and returns the current
weather conditions for that city.
You need to provide callers of this service with the URL they need to issue an HTTP-GET against
WeatherService.
Which URL should you use?
A. http://XYZSrv/AppPath/WeatherService.asmx/cityname=somecity
B. http://XYZSrv/AppPath/WeatherService.asmx/RetrieveWeather?cityname=somecity
C. http://XYZSrv/AppPath/WeatherService/RetreieveWeather.asmx?cityname=somecity
D. http://XYZSrv/AppPath/WeatherService/RetrieveWeather?cityname=somecity
309.
Suppose XYZ Inc. provides a credit card processing application for its customers. The current application
supports only computers that run on a Microsoft Windows operating system.
You are asked to rewrite the current application as a .NET application. This .NET application
does not need to be backward compatible with the current application.
You must ensure that this new application meets the following requirements:
? Must support asynchronous processing.
? Must be able to pass data through firewalls.
? Must pass only SOAP-Compliant formatted data validated by using an XSD schema.
? Must not be limited to client computers running on a Microsoft operating system.
You want to accomplish this task by using the minimum amount of development effort.
Which type of .NET application should you use?
A. Windows service
B. XML Web service
C. Serviced component
D. .NET Remoting object
310.
Suppose You are creating a .NET Remoting object named PropertyCache. PropertyCache will hold a
Hashtable object or name/value pairs.
A variety of remote client applications will communicate with PropertyCache to set and get
property values. You need to ensure that properties set by one client application are also
accessible to other client applications.
Which two actions should you take? (Each correct answer presents part of the solution. Choose
two)
A. Configure PropertyCache to be a client-activated object.
B. Configure PropertyCache to be a server-activated Singleton object.
C. Configure PropertyCache to be a server-activated SingleCall object.
D. Derive the PropertyCache class from MarshalByRefObject and override
InitializeLifetimeService() to return null.
E. Mark the PropertyCache class with the Serializable attribute.
Implement the ISponsor interface in the PropertyCache class.
F. Implement the ISerializable and ILease interfaces in the PropertyCache class.
Implement ILease.CurrentLeaseTime to return Int32.MaxValue.
311.
You create an XML Web service named TimeService. Each time TimeService is started, it checks
for the existence of an event log named TimeServiceLog. If TimeServiceLog does not exist,
TimeService creates it.
You discover that when TimeService creates TimeServiceLog, it throws a
System.Security.SecurityException. The exception includes the following message: ?Requested
registry access is not allowed?. You need to resolve this problem.
What should you do?.
A. Configure Inetinfo.exe to run as the local administrator user account.
B. Create an installer for TimeService, and create the new event log in the installer code.
C. Modify the Web.config file by adding an identity element to impersonate the LOGON user
specified by Internet Information Services (IIS).
D. Modify the permissions of the
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesEventlog registry key to give
full control to the IUSR_computername user account.
312.
Suppose You create an XML Web service named XYZService. You must ensure that this service meets
the following URL authorization requirements.
? Anonymous access must be disabled for XYZService.
? An authenticated user named User1 cannot access XYZService.
? All other authenticared users can access XYZService.
You configure Internet Information Services (IIS) to meet these requirements. You now need to
configure the authorization section in the Web.config file to properly authorize the users.
Which code segment should you use?
A. .

B.

C.


D.

313.
Suppose You are creating an ASP.NET page for selling movie tickets. Users select a region, and then they
select from a list of cities in that region. The site displays the names and locations of movie
theaters in the city selected by the user.
Your company, XYZ Brothers, maintains a list of theaters in a database table that includes the
city, name, and street address of each theater. You want to minimize the time required to retrieve
and display the list of theater names after a user selects the region and city.
What should you do?
A. Modify the connection string to add the packet size property and set its values to 8192.
B. Add the following directive to the page:
OutputCache VaryByParam=?city?
C. Add the following directive to the page:
OutputCache VaryByControl=?region;city?
D. Modify the connection string to keep your database?s connection pool as small as possible.
314.
Suppose You are creating an ASP.NET page for XYZ. You create a DataGrid control that displays past
purchases made by the user. The DataGrid control is populated from an existing database when
the page is created.
The page contains TextBox controls that allow users to update their personal information, such as
address and telephone number.
You need to ensure that the page is refreshed as quickly as possible when users update their
contact information.
What should you do?
A. Set the Enable property of the DataGrid control to false.
B. Set the EnableViewState property of the DataGrid to false.
C. Write code in the Page.Load event handler that populates the DataGrid control only when the
IsPostBack property of the page is false.
D. Write in the Page.Load event handler that populates the DataGrid control only when the
IsPostBack property of the page is true.
315.
You ASP.NET application manages order entry data by using a DataSet object named
EXorderEntry. The EXorderEntry object includes two DataTable objects named orderNames and
OrderDetails. A ForeignKeyConstraint object named orderDetailsKey is defined between the two
DataTable objects.
You attempt to delete a row in orderNames while there are related rows in OrderDetails, and an
exception is generated.
What is the most likely cause of the problem?
A. The current value of OrderDetails.KeyDeleteRule is Rule.Cascade.
B. The current value of OrderDetails.KeyDeleteRule is Rule.SetNull.
C. The current value of OrderDetails.KeyDeleteRule is Rule.SetDefault.
D. The current value of OrderDetails.KeyDeleteRule is Rule.None.
316.
You create an ASP.NET page that uses images to identify areas where a user can click to initiate
actions. The users of the application use Internet Explorer.
You want to provide a pop-up window when the user moves the mouse pointer over an image.
You want the pop-up window to display text that identifies the action that will be taken if the user
clicks the image.
What should you do?
A. For each image, set the AlternateText property to specify the text you want to display, and set
the ToolTip property to True.
B. For each image, set the ToolTip property to specify the text you want to display.
C. In the onmouseover event handler for each image, add code that calls the RaiseBubbleEvent()
method of the System.Web.UI.WebControls.Image class.
D. In the onmouseover event handler for each image, add code that calls the ToString() method
of the System.Web.UI.WebControls.Image class.
317.
You create an ASP.NET application that produces sales reports for the XYZ corporation.
The sales data is stored in a Microsoft SQL Server database that is used for transaction
processing. The application consists of complex Transact-SQL statements.
Many users report that the report generation is taking longer to run each day. You need to
improve response times.
What are two possible ways to achieve this goal? (Each correct answer presents a complete
solution. Choose two)
A. Use an OleDbDataAdapter indexes exist on the SQL Server tables.
B. Ensure that appropriate indexes exist in the SQL Server tables.
C. Rewrite your SQL statements to use aliases for all table names.
D. Rewrite your direct SQL statements as stored procedures and call the stored procedures from
your application.
E. Configure queries to run in the security context of the user who is running the query.
318.
You are creating a Web site for XYZ. You receive product lists in the form of XML documents.
You are creating a procedure to extract information from these XML documents according to
criteria that your users will select.
When a user makes a request, you want the results of these requests to be returned as quickly
as possible. What should you do?
A. Create an XmlDataDocument object and load it with the XML data.
Use the DataSet property of the object to create a DataSet object.
Use a SQL SELECT statement to extract the requested data.
B. Create an XmlDataDocument object and load it with the XML data.
Use the SelectNodes method of the object to extract the requested data.
C. Create an XPathDocument object and load it with the XML data.
Call the CreateNavigator method to create an XPathNavigator object.
Call the Select method of the XPathNavigator object to run an XPath query that extracts the
requested data.
D. Create an XmlReader object.
Use the Read method of the object to stream through the XML data and to apply an Xpath
expression to extract the requested data.
319.
You are creating an ASP.NET page for a travel service. The page contains a CheckBoxList
control that contains travel destinations. Customer can select favorite destinations to receive
weekly e-mail updates of travel packages.
The CheckBoxList control is bound to a database table of possible destinations. Each destination
is ranked according to its popularity. You modify the page to sort the destination list by rank, from
the most popular to the least popular. The list has three columns.
You want the most popular destination to be on the top row of the check box list at run time.
Which property setting should you use for the CheckBoxList control?
A. Set the RepeatDirection property to Vertical.
B. Set the RepeatDirection property to Horizontal.
C. Set the RepeatLayout property to Flow.
D. Set the RepeatLayout property to Table.
320.
Suppose You ASP.NET application manages order entry data by using a DataSet object named
EXorderEntry. The EXorderEntry object includes two DataTable objects named orderNames and
OrderDetails. A ForeignKeyConstraint object named orderDetailsKey is defined between the two
DataTable objects.
You attempt to delete a row in orderNames while there are related rows in OrderDetails, and an
exception is generated.
What is the most likely cause of the problem?
A. The current value of OrderDetails.KeyDeleteRule is Rule.Cascade.
B. The current value of OrderDetails.KeyDeleteRule is Rule.SetNull.
C. The current value of OrderDetails.KeyDeleteRule is Rule.SetDefault.
D. The current value of OrderDetails.KeyDeleteRule is Rule.None.
321.
Suppose You are planning the deployment of an ASP.NET application named XYZApp. XYZApp uses a
Visual Studio .NET component named DataAccess that will be shared with other applications on
your Web server.
You are using Visual Studio .NET to create a Windows Installer package. You need to deploy
DataAccess and the ASP.NET application so that they can be uninstalled later if necessary.
What should you do?
A. Create a setup project for DataAccess.
Add the ASP.NET application in a custom action.
B. Create a setup project for the ASP.NET application.
Create another setup project for DataAccess.
C. Create a Web setup project for the ASP.NET application.
Add a project output for DataAccess.
D. Create a Web setup project for the ASP.NET application.
Add a merge module for DataAccess.
322.
Suppose You are creating an ASP.NET application for XYZ. Your application will call an XML Web service
run by Wide World Importers. The XML Web service will return an ADO.NET DataSet object
containing a list of companies that purchase wine.
You need to make the XML Web service available to your application.
What should you do?
A. On the .NET tab of the Reference dialog box, select System.Web.Services.dll.
B. In the Web References dialog box, type the address of the XML Web service.
C. Add a using statement to your Global.asax.cs file, and specify the address of the XML Web
service.
D. Write an event handler in the Global.asax.cs file to import the .wsdl and .disco files associated
with the XML Web service.
323.
Suppose You create English, French, and German versions of a test engine ASP.NET application you are
developing for XYZ Inc. You have separate resource files for each language version.
You need to deploy the appropriate resource file based on the language settings of the server.
What should you do?
A. Create an installer and set the Installer.Context property for each version of your application.
B. Create an installer that has a launch condition to verify the locale settings.
C. Create an installer that has a custom action to install only location-specific files.
D. Create an installer that has an MsiConfigureProduct function to install the appropriate version.
324.
Suppose You are creating an ASP.NET application for XYZ. An earlier version of the application uses
ActiveX components that are written in Visual Basic 6.0. The new ASP.NET application will
continue to use the ActiveX components.
You want the marshaling of data between your ASP.NET application and the ActiveX
components to occur as quickly as possible.
Which two actions should you take? (Each correct answer presents part of the solution. Choose
two)
A. Use ODBC binding.
B. Use late binding.
C. Use early binding
D. Set the AspCompat attribute of the Page directive to true.
E. Set the AspCompat attribute of the Page directive to false.
325.
You are creating an ASP.NET application to track XYZ sales orders. The application uses an
ADO.NET DataSet object that contains two DataTable objects. One table is named Orders, and
the other table is named OrderDetails. The application displays data from the Orders table in a list
box. You want the order details for an order to be displayed in a grid when a user selects the
order in the list box. You want to modify these objects to enable your code to find all the order
details for the selected order.
What should you do?
A. Add a DataRelation object to the Relations collection of the DataSet object.
B. Use the DataSet.Merge method to connect the Orders table and the OrderDetails table to each
other.
C. Add a ForeignKeyConstraint to the OrderDetails table.
D. Add a keyref constraint to the DataSet schema.
326.
Suppose You are configuring your ASP.NET application XYZApp. XYZApp will be hosted on a Web server
that also runs other applications.
You want to prevent any changes to the configuration settings of your application after the
application is deployed.
What should you do?
A. In the Machine.config file, set the allowOverride attribute in the location element to False.
Make no other changes to the Machine.config file.
B. In the Web.config file, set the allowOverride attribute in the location element to False.
Make no other changes to the Web.config file.
C. In the Machine.config file, set the allowOverride attribute in the appSettings element to False.
Make no other changes to the Machine.config file.
D. In the Web.config file, set the allowOverride attribute in the appSettings element to False.
Make not other changes to the Web.config file.
327.
Suppose You create an ASP.NET application to provide corporate news and information to XYZ?s
employees. The application is used by employees in New Zealand.
Default.aspx has a Web Form label control named currentDateLabel. The Page.Load event
handler for Default.aspx included the following line of code:
currentDateLabel.Text = DateTime.Now.ToString(?D?)
You need to ensure that the data is displayed correctly for employees in New Zealand. What
should you do?
A. In the Web.config file for the application, set the culture attribute of the globalization element to
en-NZ.
B. In the Web.config file for the application, set the uiCulture attribute of the globalization element
to en-NZ.
C. In Visual Studio .NET, set the responseEncoding attribute in the page directive for
Default.aspx to UTF-8.
D. In Visual Studio .NET, save the Default.aspx page for both versions of the application by
selecting Advanced Save Options from the File menu and selecting UTF-8.
328.
Suppose You are creating an ASP.NET page for XYZ. The page uses string concatenation to gather data
from multiple e-mail messages and format the data for display on the page.
You want to ensure that the page displays as quickly as possible.
What should you do?
A. Write code that uses the Append method of the StringBuilder object.
B. Write code that uses the Substring method of the String object.
C. Write code that uses the Concat method of the String object.
D. Write code that uses the plus-sign (+) operator to concatenate the strings.
329.
Suppose You develop a Windows-based application by using Visual Studio .NET. The application includes
a form named XYZForm and a class named Contact. XYZForm includes a button named
cmdCreateContact. You must ensure that your application creates an instance of Contact when a
user clicks this button. You want to write the most efficient code possible.
Which code segment should you use?
A. Contact contact = new Object();
B. Contact contact = new Contact;
C. Object contact = new Contact;
D. Contact contact = new Object;
330.
You use Visual Studio .NET to create an assembly, called XYZAssembly, that will be used by
other applications, including a standard COM client application.
You must deploy your assembly on the COM application to a client computer. You must ensure
that the COM application can instantiate components within the assembly as COM components.
What should you do?
A. Create a strong name of the assembly by using the Strong Name tool (Sn.exe).
B. Generate a registry file for the assembly by using the Assembly Registration tool
(Regasm.exe)
Register the file on the client computer.
C. Generate a type library for the assembly by using the Type Library Importer (Tlbimp.exe).
Register the file on the client computer.
D. Deploy the assembly to the global assembly cache on the client computer.
Add a reference to the assembly in the COM client application.
331.
You plan to develop a customer information application CustomEX that uses a Microsoft SQL
Server database. CustomEX will be used frequently by a large number of users. Your application
code must obtain the fastest possible performance when accessing the database and retrieving
large amounts of data. You must accomplish this goal with the minimum amount of code.
How should you design CustomEX?
A. Use classes in the System.Data.OleDb namespace.
B. Use classes in the System.Data.SqlClient namespace.
C. Use remoting to connect to the SQL Server computer.
D. Use interoperability to include legacy COM-based data access components.
332.
Suppose As a developer at XYZ you develop a new sales analysis application that reuses existing data
access components. One of these components returns a DataSet object that contains the data for
all customer orders for the previous year.
You want your application to display orders for individual product numbers. Users will specify the
appropriate product numbers at run time..
What should you do?
A. Use the DataSet.Reset method.
B. Set the RowFilter property of the DataSet object by using a filter expression.
C. Create a DataView object and set the RowFilter property by using a filter expression.
D. Create a DataView object and set the RowStateFilter property by using a filter expression.
333.
You develop a Windows-based application XYZ. XYZ uses a DataSet object that contains two
DataTable objects. XYZ will display data from two data tables. One table contains customer
information, which must be displayed in a data-bound ListBox control. The other table contains
order information, which must be displayed in a DataGrid control.
You need to modify XYZ to enable the list box functionality.
What should you do?
A. Use the DataSet.Merge method.
B. Define primary keys for the Data Table objects.
C. Create a foreign key constraint on the DataSet object.
D. Add a DataRelation object to the Relations collection of the DataSet object.
334.
Suppose As a programmer at XYZ inc, you use Visual Studio .NET to create several applications that will
be deployed commercially over the Internet. You must ensure that customers can verify the
authenticity of your software.
Which action or actions should you take? (Choose all that apply.)
A. Sign your portable executables by using Signcode.exe.
B. Generate an X.509 certificate by using Makecert.exe.
C. Purchase an X.509 certificate from a certificate authority.
D. Purchase a Software Publisher Certificate from a certificate authority.
E. Convert your certificate to a Software Publisher Certificate by using Cert2spc.exe.
335.
You execute a query on your external Oracle database named XYZSalesDate by using an
OleDbCommand object. The query uses the Average function to return a single value that
represents the average price of products in the inventory table. You want to optimize performance
when you execute this query.
To execute this query from your ADO.NET code, you need to use a method of the
OleDbCommand object. Which method should you use?
A. ExecuteNonQuery
B. ExecuteScalar
C. ToString
D. ExecuteReader
336.
Suppose You use Visual Studio .NET to create a Windows-based application that will track camera sales.
The applications main object is named Camera. The Camera class is created by the following
definition:
public class Camera {
}
You write code that sets properties for the Camera class. This code must be executed as soon as
an instance of the Camera class is created. Now you need to create a procedure in which you
can place your code. Which code segment should you use?
A. public Camera()
B. public void Camera()
C. public bool Camera()
D. public New()
E. public Camera New()
F. public Camera Camera()
337.
Suppose You use Visual Studio .NET to create a Windows-based application. The application includes a
form named XYZProcedures (EXP). EXP allows users to enter very lengthy text into a database.
When users click the Print button located on EXP, this text must be printed by the default printer.
You implement the printing functionality by using the native .NET System Class Libraries with all
default settings.
Users report that only the first page of the text is being printed.
How should you correct this problem?
A. In the BeginPrint event, set the HasMorePages property of the PrintEventArgs object to True.
B. In the EndPrint event, set the HasMorePages property of the PrintEventArgs object to True.
C. In the PrintPage event, set the HasMorePages property of the PrintPageEventArgs object to
True.
D. In the QueryPageSettings event, set the HasMorePages property of the
QueryPageSettingEventArgs object to True.
338.
You use Visual .NET to develop a Windows-based application whose project name is XYZMgmt.
You create an application configuration file that will be installed on the client computer along with
XYZMgmt.
You must ensure that the settings in the application configuration file are applied when
XYZMgmt is executed.
What should you do?
A. Name the configuration file XYZMgmt.exe.confing and copy it to the WindowsSystem32
folder.
B. Name the configuration file XYZMgmt.config and copy it to the WindowsSystem32 folder.
C. Name the configuration file XYZMgmt.exe.config and copy it to the application folder.
D. Name the configuration file XYZMgmt.config and copy it to the application folder.
E. Name the configuration file XYZMgmt.exe.config and copy it to the global assembly cache.
339.
You are a developer for a XYZ Inc that provides free software over the Internet. You are
developing en e-mail application that users all over the world can download.
The application displays text strings in the user interface. At run time, these text strings must
appear in the language that is appropriate to the locale setting of the computer running the
application.
You have resources to develop versions of the application for only four different cultures. You
must ensure that your application will also be usable by people of other cultures.
How should you prepare the application for deployment?
A. Package a different assembly for each culture.
B. Package a different executable file for each culture.
C. Package a main assembly for source code and the default culture.
Package satellite assemblies for the other cultures.
D. Package a main assembly for source code.
Package satellite assemblies for each culture.
340.
Suppose You use Visual Studio .NET to create a control that will be used on several forms in your
application.
It is a custom label control that retrieves and displays your company?s current stock price.
The control will be displayed on many forms that have different backgrounds. You want the
control to show as much of the underlying form as possible. You want to ensure that only the
stock price is visible. The rectangular control itself should not be visible.
You need to add code to the Load event of the control to fulfill these requirements. Which two
code segments should you use? (Each correct answer presents part of the solution. Choose two)
A. this.BackColor = Color.Transparent;
B. this.ForeColor = Color.Transparent;
C. this.BackImage = null;
D. this.SetStyle(ControlStyles.UserPaint, false);
E. this.SetStyle(ControlStyles.SupportsTransparentBackColor, true);
341.
Suppose You develop a Windows-based application by using Visual Studio .NET. The application includes
numerous method calls at startup. After optimizing your application code, you test the application
on a variety of client computers. However, the startup time is too slow.
You must ensure that your application starts as quickly as possible the first time it runs. What
should you do?
A. Precompile your application by using the Native Image Generator (Ngen.exe):
Install the precompiled application on the client computers.
B. Install your application on the client computers.
Precompile your application by using the Native Image Generator (Ngen.exe).
C. Precompile your application by using the JIT compiler.
Install the precompiled application on the client computers.
D. Install your application on the client computers.
Precompile your application by using the JIT compiler.
342.
You use Visual Studio .NET to create a Windows-based application. The application includes a
form named XYZForm, which displays statistical date in graph format. You use a custom
graphing control that does not support resizing.
You must ensure that users cannot resize, minimize, or maximize XYZForm. Which three actions
should you take? (Each answer presents part of the solution. Choose three)
A. Set XYZForm.MinimizeBox to False.
B. Set XYZForm.MaximizeBox to False.
C. Set XYZForm.ControlBox to False.
D. Set XYZForm.ImeMode to Disabled.
E. Set XYZForm.WindowState to Maximized.
F. Set XYZForm.FormBorderStyle to one of the Fixed Styles.
G. Set XYZForm.GridSize to the appropriate size.
343.
Tell me You work as software developer at XYZ inc. You need to develop a Windows form that provides
online help for users. You want the help functionality to be available when users press the F1 key.
Help text will be displayed in a pop-up window for the text box that has focus.
To implement this functionality, you need to call a method of the HelpProvider control and pass
the text box and the help text.
What should you do?
A. SetShowHelp
B. SetHelpString
C. SetHelpKeyword
D. ToString
344.
Suppose You are developing a Windows-based application that requires the use of a calculation function
named Calculate Value. This function includes the following signature: int Calculate Value(int x) ;
Calculate Value is located in an unmanaged DLL named Company Functions.dll, and is not part
of a COM interface.
You need to be able to use Calculate Value in your application.
Which action or actions should you take? (Choose all that apply)
A. Use Regsvr32.exe to register CompanyFunctions.dll.
B. Use Visual Studio .NET to add a reference to CompanyFunctions.dll.
C. To your application, add the following code segment: using CompanyFunctions;
D. To your application, add the following code segment: [DllImport("CompanyFunctions.dll")]
public static extern int Calculate Value(int x);
345.
Suppose You have an ASP.NET application named ES WebApp. This application uses a private assembly
named Employee to store and retrieve employee data. Employee is located in the bin directory of
ES WebApp. You develop a new ASP.NET application named ESWebApp2 that also needs to
use Employee. You assign Employee a strong name, set its version to 1.0.0.0, and install it in the
global assembly cache. You then create a publisher policy assembly for version 1.0.0.0 and
install it in the global assembly cache. You compile ESWebApp2 against version 1.0.0.0. You do
not recompile My WebApp. You then run ES WebApp.
What is the most likely result?
A. A Version Not Found Exception is thrown.
B. Employee is loaded from the bin directory.
C. Version 1.0.0.0 of Employee is loaded from the global assembly cache.
D. Version 1.0.0.0 of Employee is loaded by the publisher policy assembly.
346.
You have a .NET Remoting object named Utils. The Utils class is a client-activated .NET
Remoting object. You want to write a client application that creates and uses a Utils object. You
want the client application to hold onto a reference to a Utils object for the duration of its
execution.
What should you do?
A. Construct the Utils object, and hold the object in a member variable.
B. Construct the Utils object, and set the LifeTimeService.LeaseTime to 0.
C. In the client application, create an Implementation of the ISponsor interface. Implement the
Renewal method to extend the lease.
D. In the client application, create an Implementation of the ILease interface. Implement the
CurrentLeaseTime property to return Int32.MaxValue.
347.
You create a serviced component named CompanyScheduler. CompanyScheduler is registered
in a library application. The Scheduler methods parse String objects into Date Time objects. You
write a console application named Coverage.exe to test each method in Scheduler. You want
Coverage.exe to test Scheduler for multiple cultures to verify its globalization support.
What should you do?
A. Create a Culture Info object for each culture locale before calling the CompanyScheduler
methods.
B. Create a Region Info object for each culture locale before calling the CompanyScheduler
methods.
C. Set the current threads Current Culture property to each culture locale before calling the
CompanyScheduler methods.
D. Create a Coverage.exe.config file and add a element to the configuration file for
each culture locale.
348.
Suppose You are creating a .NET Remoting object named Payroll. The Payroll class allows remote client
applications to access payroll data for your company. Client applications are developed by using
Windows Forms and Web Forms. You must ensure that remote client applications are securely
authenticated prior to gaining access to Payroll object. You want to accomplish this task by
writing the minimum amount of code.
What should you do?
A. Use a Tcp Channel and a Binary Formatter for the Payroll class.
B. Use an Http Channel and a Soap Formatter for the Payroll class.
C. Host the Payroll class in Internet Information Services (IIS) and implement Basic
authentication.
D. Host the Payroll class in Internet Information Services (IIS) and implement Integrated Windows
authentication.
349.
You are creating a .NET Remoting object named Payroll. The Payroll class allows remote client
applications to access payroll data for your company. Client applications are developed by using
Windows Forms and Web Forms. You must ensure that remote client applications are securely
authenticated prior to gaining access to Payroll object. You want to accomplish this task by
writing the minimum amount of code.
What should you do?
A. Use a Tcp Channel and a Binary Formatter for the Payroll class.
B. Use an Http Channel and a Soap Formatter for the Payroll class.
C. Host the Payroll class in Internet Information Services (IIS) and implement Basic
authentication.
D. Host the Payroll class in Internet Information Services (IIS) and implement Integrated Windows
authentication.
350.
You create a Windows service that processes XML messages placed in a MSMQ queue. You
discover that the service is not functioning properly.
You need to debug the service to correct the program.
What should you do?
A. Start the Windows service.
Then attach a debugger to the process.
B. Attach a debugger to the Windows service.
Then start the Windows service.
C. Start the Windows service.
Then run the .NET Services Installation tool (Regsvcs.exe).
D. Place a breakpoint in the Main method of the Windows service. Then run the application within
the Visual Studio .NET integrated development environment (IDE).
351.
Suppose You are creating an ASP.NET application named CompanyWebApp. To CompanyWebApp, you
add a Web reference to an XML Web service named User Service. User Service consists of a
Web method named RetrieveUserInfo. This Web method takes a userID as input and returns a
DataSet object containing user information. If the userID is not between the values 1 and 1000, a
System Argument Exception is thrown. In CompanyWebApp, you write a try/catch block to
capture any exceptions that are thrown by User Service. You invoke RetrieveUserInfo and pass
1001 as the user ID.
Which type of exception will be caught?
A. System.ApplicationException
B. System.ArgumentException
C. System.Web.Service.Protocols.SoapException
D. System.Web.Service.Protocols.SoapHeaderException
352.
You are creating an XML Web service named ListBoxService. This service provides content,
such as states, countries, and geographical regions, for use in drop-down list boxes.
ListBoxService contains a Web method named RetrieveRegionsListBox. This method runs a
Dataset object that contains every geographical region in the world. RetrieveRegionsListBox calls
a Microsoft SQL Server database to load the Dataset object with region data. You want to
minimize the amount of time the method takes to return to the caller.
What should you do?
A. Use a stored procedure to return the datas.
B. Store each Dataset object by using the Session object.
C. Set the Buffer Response property of the Web Method attribute to false.
D. Set the Cache Duration property of the Web Method attribute to an interval greater than zero.
353.
Suppose Company Ltd. receives product information from manufactures in the form of an XML documents.
The product information is stored in a Microsoft SQL Server database. The format of each XML
document varies. Each one is located in a MemoryStream object named newProds. You create a
merge procedure that reads data and schema information in a Dataset object and merges the
information into your database. You now need to write code to transfer the XML document and its
schema into a Dataset object.
Which code segment should you use?
A. Dataset products = new Dataset("prodInfo");
XmlTextReader reader = new XmlTextReader(newProds);
XmlValidatingReader validReader = new
XmlValidatingReader(reader);
while (validReader.Read()) { products.WriteXml(validReader.Value);}
B. Dataset products = new Dataset("prodInfo");
products.ReadXml(newProds);
C. Dataset products = new Dataset("prodInfo");
XmlDataDocument document = new XmlDataDocument(products);
D. document.DataSet.ReadXmlSchema(newProds);
Dataset products = new Dataset("prodInfo");
string myXmlData = Encoding.UTF8.GetString(newProds.ToArrary());
SqlDataAdapter adapter = new SqlDataAdapter("LoadSchemaType=XML",myXmlData);
adapter.
Fill(products)
354.
Suppose You create an XML Web service named Time ESService. Each time ESService is started, it
checks for the existence of an event log named Time ESServiceLog. If TimeServiceLog does not
exist, Time ESService creates it. You discover that when Time ESService creates Time
ESServiceLog, it throws a System.Security.SecurityException. The exception includes the
following message: "Requested registry access is not allowed". You need to resolve this problem.
What should you do?
A. Configure Inetinfo.exe to run as the local administrator user account.
B. Create an installer for Time ESService, and create the new event log in the installer code.
C. Modify the Web.config file by adding an identity element to impersonate the LOGON user
specified by Internet Information Services (IIS).
D. Modify the permissions of the
KEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesEventlog registry key to give
full control to the IUSR_computername user account.
355.
Suppose You have a .NET Remoting object named ES ProductLoader. The ES ProductLoader class is a
server-activated Singleton object.
The ES ProductLoader class loads product data into a Microsoft SQL Server database. The Load
method of the ES ProductLoader class is a time-consuming method to call. You are developing a
client application that uses the ES ProductLoader class. You want to ensure that the client
application can continue to respond to user input while the Load method of the ES ProductLoader
class is called.
What should you do?
A. Use an AsyncDelegate instance to call the Load method.
B. Modify the ES ProductLoader class to be derived from IAsyncResult.
C. Configure the ES ProductLoader class to be a client-activated .NET Remoting object.
D. Configure the client application to have its own remoting channel that matches the servers
channel and formatter.
356.
Suppose You are planning to create a Dataset object named ES DataSet to be used in a bond-trading
application. Several developers will need to write code to manipulate myDataSet, and you want to
ensure that ES DataSet is easy for them to use. You decide to create ES DataSet as a strongly
typed data set. Which two actions should you take? (Each correct answer presents part of the
solution. Choose two)
A. Create an XSD schema that defines ES DataSet.
B. Create an XDR schema that defines ES DataSet.
C. Create a class for ES DataSet that is based on the schema and that inherits from the Dataset
class.
D. Create a class for ES DataSet that is based on the schema and that inherits from the
XmlSchema class.
E. Create a key pair for ES DataSet by using the Strong Name tool (Sn.exe).
357.
Suppose You create a serviced component named Session Dispenser. This computer is in the
Company.Utilities assembly and is registered in a COM+ server application. Session Dispenser
has multiple callers. You discover that there are logic problems in the Create New Session
method. You want to debug any calls to this method. What should you do?
A. Open the Session Dispenser solution.
Set a breakpoint on the Create New Session method.
Start the debugger.
B. Attach the debugger to the client process.
Set a breakpoint on the SessionDispenser.CreateNewSession method.
C. Attach the debugger to the Company.Utilites.exe process.
Set a breakpoint on the Create New Session method.
D. Attach the debugger to a Dllhost.exe process.
Set a breakpoint on the Create New Session method.
358.
Suppose You create an XML Web service named Postal Code. Your project source includes a codebehind
file and a file named PostalCode.asmx. During implementation, you use the Debug class to
record debugging log messages, to verify values, and to report debugging failures. You want to
deploy Postal Code to a production computer. You do not want any of the debugging code to
execute on the production computer. What should you do?
A. Set the projects active configuration to Release and rebuild the DLL.
B. Modify the trace element of the Web.config file by setting the enabled attribute to "false".
C. Modify the compilation element of the Web.config file by setting the debug attribute to "false".
D. Add code to the constructor of the Postal Code class to set the Auto Flash property of the
Debug class to false.
E. Add code to the constructor of the Postal Code class to call the Clear method of the
Debug.Listeners property.
359.
Suppose You create a .NET Remoting object named Patient info that exposes medical patient information.
Because of the confidential nature of the information, you must ensure that the data remains
secure. You want client applications to connect to Patient info over a secure communication
channel. You want to accomplish this task by writing the minimum amount of code.
What should you do?
A. Create your own host application and use a Tcp Channel and Binary Formatter.
B. Create your own host application and use an Http Channel and a Soap Formatter.
C. Install Patient info in an Internet Information Services (IIS) virtual directory.
Configure Patient info to use a Tcp Channel and a Binary Formatter.
Configure IIS to use SSL.
D. Install Patient info in an Internet Information Services (IIS) virtual directory.
Configure Patient info to use an Http Channel and a Soap Formatter.
Configure IIS to use SSL.
360.
You have a DataSet object named loanCustomersDataSet that contains customers serviced by
the loan department of ExamSlink Inc. You receive a second DataSet object named
assetCustomersDataSet that contains customers serviced by the asset management department
of your company. Both objects have the same structure. You want to merge
assetCustomersDataSet into loanCustomersDataSet and preserve the original values in
loanCustomersDataSet.
Which code segment should you use?
A. loanCustomersDataSet.Merge(assetCustomersDataSet);
B. loanCustomersDataSet.Merge(assetCustomersDataSet, true);
C. assetCustomersDataSet.Merge(loanCustomersDataSet);
D. assetCustomersDataSet.Merge(loanCustomersDataSet, true);
361.
Suppose You are developing an application named ExamSApp by using Visual C# .NET and Visual Basic
.NET. The application will use functions form a DLL written in unmanaged code. One function
requires the calling application to allocate unmanaged memory, fill it with data, and pass the
address of the memory to the function. On returning from the function, the calling application must
deallocate the unmanaged memory.
You need to decide how your application will handle unmanaged memory.
What should you do?
A. Use a byte array.
B. Use the methods of the Marshal class.
C. Use the methods of the MemoryStream class.
D. Derive a new class from the Stream class, and override the allocation methods.
362.
Suppose You create three Windows services named ES1, ES2, and ES3. You want to install all three
services on a computer named CompanyA by using the Installer tool (Installutil.exe).
On the command line of CompanyA, you enter and run the following command: Install util ES1
ES2 ES3
During the installation process, ES3 throws an installation error. The installation process
completes.
How many of the three services are now installed on CompanyA?
A. None
B. One
C. Two
D. Three
363.
Suppose You have a Dataset object named ES DataSet that is populated with data from a Microsoft SQL
Server database. This object contains insertions, deletions, and updates to the data. You want to
apply the data changes in ES DataSet to the database. You decide to use the Sulligent data
provider. You need to create a data object that you will use to update the database. Which code
segment should you use?
A. SqlDataReader myDataReader;
B. SqlDataAdapter mySqlDataAdapter = new sqlDataAdapter();
C. DataObject myDataObject = new DataObject();
D. SqlParameter myParameter = new SqlParameter();
364.
Suppose You develop an ASP.NET Web application
for Company?s intranet. The application accesses data that is stored in a Microsoft SQL Server
database. The application authenticates users by using Windows authentication, and it has
impersonation enabled. You configure database object permissions based on the identity of the
user of the application. You need to provide the user?s identity to the SQL Server database. What
should you do?
A. Connect to the database by using the following connection string
?Persists Security Info=False;Integrated Security=SSPI;
database=ApplicationDB;server=DataServer;?
B. Connect to the database by using the following connection string
?User ID=ASPNET;Persist Security Info=False;Integrated Security=False;
database=ApplicationDB;server=DataServer;?
C. Develop a serviced component that wraps all database operations.
Use COM+ role-based security to restrict access to database operations based on user
identity.
D. Disable impersonation.
365.
Suppose You are an application developer for your company. You develop library assemblies that are
called by your main applications. These library assemblies access confidential data in the
applications. To ensure that this data is not accessed in an unauthorized and unsafe manner,
users must not be allowed to call the library assemblies from their own applications. You apply a
strong name to all assemblies to support versioning. You need to prevent users from writing
managed applications that make calls to your library assemblies. You need to achieve this goal
while minimizing the impact on response times for applications. What should you do?
A. Use the internal access modifier to declare all classes and structs in each library.
B. Use the protected internal access modifier to declare all classes and structs in each library.
C. Add the following attribute to each class and struct in each library assembly.

D. Add the following attribute to each class and struct in each library assembly.
366.
Suppose You are an application developer for Company.com. You are developing an application that can
be extended by using custom components. The application uses reflection to dynamically load
and invoke these custom components. In some cases, custom components will originate from a
source that is not fully trusted, such as the Internet.
You need to programmatically restrict the code access security policy under which custom
components run so that custom components do not run with an elevated permission grant.
What are two possible ways to achieve this goal? (Each correct answer presents a complete
solution. Choose two)
A. Create a new application domain and set the security policy level. Run custom components in
this application domain.
B. Use permission class operations to modify the security policy.
C. Implement custom permission classes to protect custom component resources.
D. Programmatically modify the machine-level security policy file after loading a custom
component.
367.
Suppose You are
developing an ASP.NET Web application that users in the accounting department will use to
process payroll reports and view payroll reports. The application will use Integrated Windows
authentication to authenticate all users. Because payroll data is confidential only users in the
accounting department will be granted access to the application. All employees in the accounting
department belong to a specific Active Directory group. However, users in the IT department can
add themselves to various Active Directory groups in order to troubleshoot resource access
problems. These IT department users must not be granted access to the ASP.NET Web
application. The following rules can be used to distinguish between users in the accounting
department and users in the IT department:
? All users in the accounting department are members of a group named CompanyAccounting.
? Some users in the IT department are members of the CompanyAccounting group.
All users in the IT department are members of a group named CompanyDomain Admin.
?
? No users in the accounting department are members of the CompanyDomain Admin group.
You need to configure URL authorization for the application by adding an
element to the Web.config file in the application root. Which element should you use?
A.




B.




C.




D.



368.
Suppose You develop an ASP.NET Web application
that writes to an event log named EventLog1. All managers in Company will run this application.
During a exam on a manager?s client computer, the application fails in the following code
segment. (Line numbers are includes for reference only.)
1. Dim EventLog1 As New EventLog
2. If Not EventLog.SourceExists(?CompanyWebApp?) Then
3. EventLog.CreateEventSource(?CompanyWebApp?, ?Application?)
4. End If
5. EventLog1.Source = ?CompanyWebApp?
6. EventLog1.WriteEntry(?The event occurred.?)
You need to ensure that event data is written to EventLog1. You want to achieve this goal without
granting unnecessary permissions.
What should you do?
A. Insert the following code into the application.
Dim eventLogDir As String
eventLogDir = ?C:%windir?system32configAppEvent.Evt?
Dim FilePermission As _
New FileOPermission(FileIOPermissionAccess.AllAcces, eventLogDir)
FilePermission.Assert()
B. Replace line 6 of the code segment with the following line of code.
EventLog1.WriteEntry(?The event occurred?,?EventLogWriter?)
C. Grant the managers the Full Control permission for the event log file.
D. Add the aspnet_wp account to the Administrators group.
E. Create the event log source in the installer class of the application.
369.
Suppose You create an ASP.NET Web application
that all authenticated network users will access. The authentication mode in the Web.config file is
currently set to None. Due to recent security threats, the network administrator requires that all
connections to the application?s Web server use the network credentials of the authenticated
user. You need to configure the application to use the network credentials of the authenticated
user as HTTPContext.Current.User. Which action or actions should you perform? (Choose all that
apply)
A. Ask the network administrator to configure the IIS directory security to Anonymous
authentication.
B. Ask the network administrator to configure the IIS directory security to Integrated Windows
authentication.
C. Set the authentication mode in the Web.config file to Forms.
D. Set the authentication mode in the Web.config file to Windows.
E. Set the impersonation attribute of the identity element in the Web.config file to true.
370.
Users who are temporary employees are
members of a group named TemporaryEmployees. You develop a serviced component named
CompanyComponent. CompanyComponent is part of a COM+ application named MyApplication.
CompanyComponent is secured by using the SecurityRole attribute for the Employees role. You
need to ensure that members of the TemporaryEmployees group are assigned to the Employees
role. You decide to add the TemporaryEmployees group to the existing Employees role. Which
tool should you use?
A. The code Access Security Policy tool.
B. The Permission View tool.
C. The Component Services tool.
D. The Secutil tool.
E. The Microsoft .NET Framework Configuration tool.
371.
Suppose You develop a Windows Forms application
that connects to a local Microsoft SQL Server database by using the Microsoft .NET Framework
Data Provider for SQL Server. The application currently connects to the database by using an
account that is a member of the System Administrator role in SQL Server. You need to ensure
that the application can connect to the database by using the user account of the interactive user
without providing additional permissions. What should you do?
A. Modify the application to activate a SQL Server application role.
B. Modify the application to use SQL Server integrated security.
C. Modify the application to send a security token that contains the authentication information in a
Kerberos ticket.
D. Modify the application to use a COM+ security roles.
372.
Suppose You are developing an application that will
be used both by company users and by contractors. Contractors will install the application on
their own portable computers. A written company policy prohibits contractors from easily
accessing or reviewing the source code of company applications. The file servers that contain the
source code for the application are configured so that only company software developers have
access. You need to ensure that the contractors cannot easily access the application source
code. What should you do?
A. Run Dotfuctaor Community Edition on each of the application assemblies.
B. Apply a strong name to each of the application assemblies.
C. Run the Code Access Security Policy tool for each of the application assemblies before
distributing the application.
D. Use Encrypting File System (EFS) to encrypt the compiled application assemblies.
373.
Suppose You create a Web Forms application to track
employee expense report information. Information is entered by each user and stored in a
Microsoft SQL Server database. The application uses Integrated Windows authentication with
impersonation enabled to communicate with the database. All users are assigned to the
DataReader role and the DataWriter role in SQL Server.
The employee expense report form contains client-side validation scripts and additional server
controls. This form is ViewState enabled. All employee expense reports must be approved by the
accounting department by using a separate form in the application before payment is made.
You need to unit exam the security of the application.
What should you do?
A. Copy the ViewState information to a text file and attempt to decrypt it.
B. Exam the application from the hosting computer and from the client computers.
C. Create your own page that mimics the approved page and submit that page to the server.
D. Sign on as a user in the accounting department and verify that you can approve expense
reports.
374.
Suppose You are an application developer for your company. You are conducting a code review of a
Windows Forms application that was developed by another developer. The application
includes a function named Logon(), which validates a users logon credentials. The function
displays a dialog box for the user to enter the users credentials, and the function validates those
credentials by using a database.
The function returns a value of 0 if the users password is incorrect, a value of 1 if the users user
ID is incorrect, and a value of 2 if both are correct. Users should receive access to the application
only if the function returns a value of 2. A function named EndApp() is used to exit the application.
The application must display a message to the user, depending on the result of the Logon()
function.
The application contains the following code segment.
int logonresult = Logon();
switch(logonresult) {
case 0:
MessageBox.Show("User name is OK, password incorrect.");
break;
case 1:
MessageBox.Show("User name is incorrect.");
break;
default:
MessageBox.Show("Welcome!");
break;
}
if(logonresult != 2) {
EndApp();
}
You need to improve the security of this code segment while maintaining its funtionality. You
decide to replace the existing code segment.
Which code segment should you use?
A. if(Logon() != 2) {
Console.WriteLine("Logon error.");
EndApp();
}
B. if(Logon() != 2) {
Console.WriteLine("Logon error.");
EndApp();
}
else {
MessageBox.Show("Welcome!");
}
C. int logonresult = Logon();
switch(logonresult) {
case 0:
MessageBox.Show("User name is OK, password incorrect.");
EndApp();
break;
case 1:
MessageBox.Show("User name is incorrect.");
EndApp();
break;
default:
MessageBox.Show("Welcome!");
break;
}
D. int logonresult = Logon();
if(logonresult == 2) {
MessageBox.Show("Welcome!");
}
else {
MessageBox.Show("User name or password was incorrect.");
EndApp();
}
375.
How to prevent malicious code from running, a
written company policy does not permit developers to log on by using accounts that have more
permissions than necessary.
Your user account is a member of the Users group and the VS Developers group. You attempt to
run an application that requires Administrator-level permissions. You receive an error message
that states that permission is denied.
You need to be able to run the application.
What should you do?
A. Ask the network administrator to add your user account to the domain Administrators group.
B. Ask the administrator of your client computer to add your user account to the local
Administrators group.
C. Add the administrator of your client computer to add your user account to the Power Users
group.
D. Run the application by using the runas command and specify a user account in the local
Administrators group.
376.
Suppose You develop an application that customers
will be able to automate by using Microsoft Visual Basic for Applications (VBA) scripts. The
application will be accompanied by sample VBA scripts. Customers must be able to review the
sample VBA scripts. You want customers to be able to automate the installed application by using
any of the sample VBA scripts or by creating their own automation scripts. You also want to allow
customers to choose not to apply any automation scripts.
You need to distribute the sample VBA scripts with your application in a manner that minimizes
security risks for the customer.
What should you do?
A. On installation, place all the sample VBA scripts in a subfolder of the application?s installation
folder.
B. On installation, as the user to choose one sample VBA script to install as the application?s
automation script.
C. Do not install the same VBA scripts.
Leave the files in a folder on the installation media.
D. Encrypt same VBA scripts on the installation media and decrypt the files during installation.
377.
Suppose You are an application developer for your company. You are developing a Windows Forms
application. You deploy a supporting assembly named MyAssembly.dll to the global assembly
cache. During testing, you discover that the application is prevented from accessing
MyAssembly.dll.
You need to ensure that the application can access MyAssembly.dll.
What should you do?
A. Digitally sign the application by using a digital certificate.
B. Run the caspol.exe -s on command from the command line.
C. Run the Assembly Linker to link MyAssembly.dll to the application.
D. Modify the security policy to grant the application the FullTrust permission.
378.
Suppose You are developing an application that will
be used by members of three domain user groups in your company. The user groups are named
CompanySales, CompanyMarketing, and AccountManagement. Each of the three user groups
will have different permission within the application.
You log on to your development computer by using a domain user account that is a member of
only the Domain Users and the Developers domain user groups. On your development computer,
you user account is a member of only the local Users group.
When you finish developing the application, you need to ensure that the application runs correctly
before you send the application to the company?s internal software examing department.
How should you exam the application?
A. Select one user from each of the three user groups that will run the application.
Deploy the application to the client computer of each of these three users.
Exam the application on each of the computers.
B. Deploy the application to a client computer.
Ask a domain administrator to place the computer?s domain account into all three of the user
groups that will run the application.
Exam the application on the client computer.
C. Ask a domain administrator to create a domain user account for examing.
Place the account in each of the three user groups that will run the application.
Exam the application, logging on to your computer by using the exam domain user account.
D. Ask a domain administrator to create three domain user accounts for examing.
Place one account in each of the three user groups that will run the application.
Exam the application three times, logging on to your computer by using a different exam
domain user account for each exam.
379.
You create an ASP.NET Web application
that all authenticated network users will access. The authentication mode in the Web.config file is
currently set to None. Due to recent security threats, the network administrator requires that all
connections to the application?s Web server use the network credentials of the authenticated
user.
You need to configure the application to use the network credentials of the authenticated user as
HTTPContext.Current.User.
Which action or actions should you perform? (Choose all that apply)
A. Ask the network administrator to configure the IIS directory security to Anonymous
authentication.
B. Ask the network administrator to configure the IIS directory security to Integrated Windows
authentication.
C. Set the authentication mode in the Web.config file to Forms.
D. Set the authentication mode in the Web.config file to Windows.
E. Set the impersonation attribute of the identity element in the Web.config file to true.
380.
Suppose Each client computer in Company runs
either Microsoft Windows XP Professional or Windows 98. You are developing an application that
will be used by all users in Company.
Users log on to their client computers by using a domain user account that is a member of the
local Power Users group and the user?s computer. You log on to your Windows XP Professional
computer by using a domain user account that is a member of the local Administrators group and
Power Users group on your computer.
When examing your application, you need to ensure that your exams accurately reflect the
production environment in which the application will run.
How should you exam the application?
A. Ask a domain administrator to temporarily remove your domain user account from the local
Administrators group on your computer while you are examing the application.
B. Exam the application on your computer.
When examing, log on to the computer by using a domain user account that is a member of
only the local Power Users group on your computer.
C. Deploy the application to a Windows XP Professional computer and a Windows 98 computer.
Log on to each computer by using a domain user account that is a member of only the local
Power Users group.
D. Compile the assemblies of the application from the command line by running the runas
command and specifying a domain user account that is a member of only the local Power
Users group on your computer.
381.
Suppose You are developing a three-tier application.
You enter sample data to exam the application. The following exception is caught by the data
layer before the application continues to run. Cannot set column ?Column1? to ?Text too long for
maximum length?. The value violates the MaxLength limit of this column.
You need to improve the security of the application. Which two actions should you perform?
(Each correct answer presents part of the solution. Choose two)
A. Increase the maximum length of data characters allowed in the column.
B. Validate all incoming data character lengths at the business layer.
C. Modify the data layer to process data above the maximum length.
D. Modify the user interface to prevent users from entering data above the maximum character
length.
382.
Suppose You are an application developer for Company.com. You develop a Windows Forms application
that connects to a local Microsoft SQL Server database by using the Microsoft .NET Framework
Data Provider for SQL Server. The application currently connects to the database by using an
account that is a member of the System Administrator role in SQL Server.
You need to ensure that the application can connect to the database by using the user account of
the interactive user without providing additional permissions.
What should you do?
A. Modify the application to activate a SQL Server application role.
B. Modify the application to use SQL Server integrated security.
C. Modify the application to send a security token that contains the authentication information in a
Kerberos ticket.
D. Modify the application to use a COM+ security roles.
383.
Suppose A. Create a new application domain and set the security policy level. Run custom components in
this application domain.
B. Use permission class operations to modify the security policy.
384.
Users who are temporary employees are
members of a group named TemporaryEmployees. You develop a serviced component named
CompanyComponent. CompanyComponent is part of a COM+ application named MyApplication.
CompanyComponent is secured by using the SecurityRole attribute for the Employees role.
You need to ensure that members of the TemporaryEmployees group are assigned to the
Employees role.
You decide to add the TemporaryEmployees group to the existing Employees role.
Which tool should you use?
A. The code Access Security Policy tool.
B. The Permission View tool.
C. The Component Services tool.
D. The Secutil tool.
E. The Microsoft .NET Framework Configuration tool.
385.
You are developing an application that will
be used both by company users and by contractors. Contractors will install the application on
their own portable computers. A written company policy prohibits contractors from easily
accessing or reviewing the source code of company applications. The file servers that contain the
source code for the application are configured so that only company software developers have
access.
You need to ensure that the contractors cannot easily access the application source code.
What should you do?
A. Run Dotfuctaor Community Edition on each of the application assemblies.
B. Apply a strong name to each of the application assemblies.
C. Run the Code Access Security Policy tool for each of the application assemblies before
distributing the application.
D. Use Encrypting File System (EFS) to encrypt the compiled application assemblies.
386.
Suppose You are developing a Windows-based
payroll application that will be used by all payroll administrators in the company. The application
has a single executable file that uses a separate assembly to modify payroll data.
You need to design security for your application to ensure that the assembly cannot be called by
unauthenticated and unauthorized users.
What should you do?
A. Run the application by using a user account that has access to the application directory.
B. Modify the application to validate all user-entered data.
C. Modify the application to authenticate and authorize user access within each assembly as it is
called.
D. Modify the application to authenticate and authorize user access when each user runs the
executable file.
E. Set the folder-level permissions to the executable file by using directory security.
387.
If you need to configure Outlook Web Access to allow Microsoft Office documents to be opened but
not saved on public computers. What should you do?
A. Enable direct file access for public computers.
B. Enable Force WebReady Document Viewing when a converter is available for public
computers.
C. Add the Office file formats to the supported document types for WebReady Document
Viewing.
D. Add the Office file formats to the direct file access Block list.
388.
Suppose you need to configure the minimum permissions necessary for a user to be able to configure
mailbox databases on an Exchange Server 2007 computer. What should you do?
A. Delegate Exchange Administrator privileges to the user account at the organization level.
B. Add the user account to the Exchange Server Administrators role.
C. Add the user account to the Exchange Recipient Administrators role.
D. Add the user account to the Exchange Organization Administrators role.
389.
In your Exchange Server 2007 environment, a users mailbox was purged from the mailbox
server, and a backup of the mailbox database was restored to a recovery storage group. You
need to recover the purged mailbox to a production database. What should you do?
A. Run the Connect-Mailbox cmdlet from the Exchange server.
B. Run the Restore-Mailbox cmdlet from the Exchange server.
C. Run the Enable-Mailbox cmdlet from the Exchange server.
D. Run the Exmerge utility from the Exchange server.
390.
What is h-look and v-look
391.
You are creating a cluster continuous replication (CCR) cluster. You create a failover cluster and
you install the Mailbox server role named ExchMB1 on the active node. You need to install the
Mailbox server role on the passive node. What are two possible ways to achieve this goal? (Each
correct answer presents a complete solution. Choose two.)
A. Run the Enable-StorageGroupCopy -Identity ExchMB1SG1 command.
B. Run the Setup /roles:Mailbox command.
C. Run the Setup /newcms /CMSname:ExchMB1 command.
D. Select the Passive Clustered Mailbox Role check box in the Exchange Server 2007 Setup
392.
Explain Which of the following Receive connector usage types uses Exchange Server authentication as
its default authentication mechanism?
A. Client
B. Internal
C. Internet
D. Partner
393.
You need to find out the total size of a users mailbox. What should you do?
A. Run the Database Troubleshooter in the Exchange Troubleshooting Assistant.
B. Run the Get-MailboxDatabase cmdlet.
.C. Run the Get-MailboxStatistics cmdlet
D. Run the Get-Mailbox cmdlet.
394.
You are preparing to install the Mailbox server role on a new Exchange Server 2007 computer.
You need to optimize read and write performance on this server. You also need to provide
redundancy on this server. On which type of array should you place the mailbox database?
A. RAID 1 containing the operating system partition
B. RAID 1 dedicated
C. RAID 0 dedicated
D. RAID 10 dedicated
395.
Explain Users report that they are unable to access their mailboxes on an Exchange Server 2007
computer named Exch1. You verify that connectivity to the server is functioning and that server
hardware is functioning normally. Access to global catalogs is also functioning normally. You
need to report on the status of all required Exchange-specific and Exchange-dependent services.
What should you do?
A. From the Exchange Troubleshooting Assistant, run the Database Troubleshooter.
B. Run the Test-ServiceHealth -Server Exch1 cmdlet.
C. Run the Test-SystemHealth -Server Exch1 cmdlet.
D. Run the Get-ExchangeServer-ldentityExch1 cmdlet.
396.
Explain Your company normally does not allow out-of-office messages to be sent to users outside of your
Exchange 2007 organization. The company makes an exception for a business partner named
Northwind Traders. The SMTP domain for Northwind Traders is northwindtraders.com. You need
to configure your Exchange organization to allow out-of-office messages to be sent to e-mail
addresses in the northwindtraders.com domain. What should you do?
A. Add northwindtraders.com as a remote domain and set the appropriate options.
B. Add northwindtraders.com as an accepted domain and set the appropriate options.
C. Create a transport rule and set the appropriate options.
D. Create a Send connector for northwindtraders.com and set the appropriate options.
397.
If You want to trigger an alert when the number of messages in the mailbox stores receive queue
on an Exchange Server 2007 server reaches a defined value. What counter do you select when
configuring the alert? (The question uses the notation :.)
A. MSExchangeIS:Messages Queued For Submission
B. MSExchangeIS:Receive Queue Size
C. MSExchangeIS Mailbox:Messages Queued For Submission
D. MSExchangeIS Mailbox:Receive Queue Size
398.
If You move a conference room mailbox named ConfRm 1 from an Exchange Server 2003
computer to an Exchange Server 2007 computer. You need to convert the ConfRm 1 mailbox to
an Exchange 2007 resource mailbox. You need to ensure that the mailbox can be scheduled as a
resource. Which two cmdlets should you run? (Each correct answer presents part of the solution.
Choose two.)
A. Set-Mailbox-Identity Conf Rm1 -Type Room
B. Set-Mailbox-Identity Conf Rm1 -Type Regular
C. Set- MailboxCalendarSettings -Identity Conf Rm1 - AutomateProcessing AutoAccept
D. Set- MailboxCalendarSettings -Identity Conf Rm1 - AutomateProcessing Auto Update
399.
Marc is Marias assistant. Marc needs to be able to view all of the folders and subfolders in Marias
mailbox and to open and respond to Marias e-mail. You need to assign Marc the appropriate
permissions. What should you do?
A. Run the Add-ADPermission -Identity Maria User Marc AccessRights Self ExtendedRights
Send-As cmdlet.
B. Run the Add-MailboxPermission Identity Maria User Marc AccessRights ExternalAccount
cmdlet
C. Run the Add-MailboxPermission Identity Maria User Marc AccessRights FullAccess
cmdlet.
D. In the Active Directory Users and Computers management console, assign Marc the Allow-
Full Control permission for Marias user account.
400.
A senior manager at your company is under suspicion of forwarding sensitive information to a
competitor. The chief executive officer (CEO) wants to be provided with a copy of all messages
that the senior manager sends but does not want the senior manager to be aware that he is
under surveillance. Which of the following actions would you configure when setting up a
transport rule to screen the senior managers messages?
A. Blind carbon copy (Bcc) the message to addresses
B. Add a recipient in the To field addresses
C. Redirect the message To addresses
D. Silently drop the message
401.
You need to generate a report on all of the Exchange Server 2007 computer s in your Exchange
organization. The report must include:
Operating system version
Number of processors
Total physical memory
Number of storage groups
Number of mailbox databases
What should you do?
A. Run the Get-ExchangeServer | Format-List cmdlet.
B. Run the Get-OrganizationConfig cmdlet.
C. Run the Test-SystemHealth cmdlet.
D. Run the Health Check scan in the Exchange Best Practices Analyzer.
402.
Your Exchange Server 2007 environment is configured with cluster continuous replication (CCR).
The Microsoft Windows Cluster service (MSCS) is installed on two servers named Server1 and
Server2. The default cluster that runs on the MSCS cluster is named Clus1. The cluster mailbox
server (CMS) is named ExchCMS1. Currently Clus1 and ExchCMS1 are running on the Server1
cluster node, and the CCR replica is running on the Server2 cluster node. You need to back up
the CCR replica. In the backup application, which name should you specify?
A. Server1
B. Server2
C. ExchCMS1
D. Clus1
403.
A users e-mail account is configured to use POP3. The users mailbox is accidentally purged from
the Exchange Server 2007 Mailbox server. You restore a backup copy of the database that
contained the mailbox to a recovery storage group on the same server. The user reports that he
can not access his mailbox. You need to ensure that the user can access his mailbox. Before you
reconnect the mailbox, what should you do?
A. Enable POP3 access on the mailbox.
B. Move the mailbox to a standard storage group.
C. Instruct the user to use IMAP to connect to the mailbox.
D. Instruct the user to use Outlook Web Access to connect to the mailbox.
404.
You need to find out if users can log on to your Mailbox server directly by using Microsoft Office
Outlook. Which cmdlet should you run on the client network?
A. Test- ServiceHealth
B. Test- SystemHealth
C. Test- MAPIConnectivity
D. Test- OutlookWebServices
405.
Windows NT 4.0 is currently installed on the system you are using on an NTFS partition. You want to install Windows 2000 Professional and dual boot NT 4.0 and 2000 professional. What do you need to do?

A. Install Windows 2000 on the same folder that Windows NT is installed in
B. Install Windows 2000 on a separate partition from Windows NT 4.0
C. Upgrade Windows NT 4.0 to SP4 or later then install Windows 2000.
D. This cannot be accomplished
406.
A mailbox has 40 KB of mailbox rules. You need to move the mailbox from your Exchange Server
2007 computer to an Exchange Server 2003 computer at a remote site. How should you achieve
this goal?
A. Use the Exchange Task wizard in Exchange Server 2003.
B. Use the Move Mailbox wizard in Exchange Server 2007.
C. Run the Move-Mailbox cmdlet with the IgnoreRuleLimitErrors parameter.
D. Run the Move-Mailbox cmdlet with the IgnorePolicyMatch parameter.
407.
An Exchange Server 2007 computer name d Exch1 fails. You build a new Microsoft Windows
Server 2003 computer named Exch1 to replace the failed computer. Before you restore the
mailbox databases from backup, you need to restore the Exchange Mailbox server role on Exch1.
What should you do?
A. Restore the System State data and the Microsoft Information Store data.
B. Run the Setup /NewProvisionedServer/role:Mailbox command.
C. Run the Setup /m:lnstall /role: Mailbox command.
D. Run the Setup /m:RecoverServer command.
408.
You need to identify the Exchange Server 2007 server role that must be installed on a stand-
alone server. Which server role should you identity?
A. ClientAccess
B. Edge Transport
C. Hub Transport
D. Mailbox
409.
You need to configure your Exchange Server 2007 computer so that a specific distribution group
will allow out-of-office responses from the mailboxes of members of the distribution group. What
should you do?
A. On the distribution group properties, enable out-of-office responses to be sent to message
senders.
B. On the distribution group properties, enable delivery reports to be sent to message senders.
C. On the default remote domain policy, enable out-of-office responses.
D. Re-create the distribution group as a security group.
410.
What does the following command do?
Set-PublicFolder OHuman ResourcesO -ReplicationSchedule "Saturday.12:00 AM -
Monday.12:00
AMO
A. Specifies that the Human Resources public folder replicates only on Saturday and Sunday.
B. Specifies that the Human Resources public folder replicates only on Saturday, Sunday, and
Monday.
C. Specifies that the Human Resources public folder replicates only on Sunday.
D. Specifies that the Human Resources public folder always uses the default replication schedule
of the public folder database.
411.
Your environment contains t he following servers:
Mailbox server named ExchMb1
Client Access server named ExchCAS1
Standby Microsoft Windows Server 2003 computer named Server2
Two Hub Transport server s named ExchHub1 and ExchHub2 ExchHub1 fails.
You need to restore ExchHub1 to its pre- failure configuration
What should you do?
A. Rename Server2 to ExchHub1, and run the Setup /m:RecoverServer command on ExchHub1.
B. Rename Server2 to ExchHub1, and run the Setup /m:lnstall /role:HT command on ExchHub1.
C. On ExchHub2, run the Setup /m:RecoverServer command.
D. On ExchHub2, run the Setup /m:lnstall /role:HT command.
412.
What does the following Exchange Management Shell command do?
New-DistributionGroup -Name "Manufacturing" -OrganizationalUnit Users SAMAccountName
Manufacturing -Type Security
A. Creates a mail-enabled local security group called Manufacturing
B. Creates a mail-enabled universal security group called Manufacturing
C. Creates a universal distribution group called Manufacturing
D. Creates a dynamic distribution group called Manufacturing
413.
What is MCDBA
414.
Suppose You are the SMS administrator for ComPany.com. You use SMS 2003 SP1 and the Security
Update Inventory Tool for patch management. The Security Update Inventory Tool is installed
and configured with the default settings. The package created by the tool is named Security. you
force the security sync advertisement to run and download new information on updates. you force
the security advertisement to run on a test server named 1 to collect software update data. three
hours later you discover that there is no new data. you need to ensure that the current software
update data is sent from 1 to the sms server as soon as possible. What should you do?
A. Change the Security advertisement to run the Security program.
B. Change the Security program to run Scanwrapper.exe /cache /kick.
C. force 1 to run a hardware inventory cycle.
D. force 1 to run a software inventory cycle.
415.
You are the SMS administrator for ComPany.com. You use SMS 2003 SP1 and the Security
Update Inventory Tool for patch management. The Security Update Inventory Tool is installed
and configured with the default settings. A new set of updates is available.
You need to identify which computers are not compliant with a specific update. You want to
achieve this goal by using the least amount of administrative effort. What should you do?
A. View the Software Updates container of the SMS Administrator console to find the computers
that need the updates.
B. View Resource Explorer for each computer to identify applicable updates.
C. Create a query that selects computers that need the updates.
D. Run the Computers where a specific software update is applicable report to find the
computers that need the updates.
416.
You are the SMS administrator for ComPany.com. The company has a single SMS site. All site
roles are enabled. The Hardware Inventory Client Agent and the Software Inventory Client Agent
are disabled. The SMS Advanced Client is installed on all computers in the network. You want to
create a list of the computers on the network. The list must include the computer name, IP
address, last logged on user, and MAC address for each computer. You want all users on your
team to have access to this list. You are the only user on your team who has access to the SMS
Administrator console. You need to configure SMS to automatically create the list. Which two
actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Create a report to display the required data.
B. Create a query to display the required data.
C. Configure permissions on the created report to allow users to view it.
D. Configure permissions on the created query to allow users to view it.
417.
You are the SMS administrator for ComPany.com. All servers run Microsoft Windows Server
2003. All desktop computers run Windows 98. You plan to deploy the SMS client software to all
desktop computers on the network. You want to install the SMS client software based on the
logon credentials. You need to create a logon script that will automatically install the SMS client
on all desktop computers. What are two possible ways to achieve this goal? (Each correct answer
presents a complete solution. Choose two.)
A. Configure the logon script to run Capinst.exe.
B. Configure the logon script to run CCMSetup.exe.
C. Configure the logon script to run Client.msi.
D. Configure the logon script to run Smsman.exe.
418.
Suppose You are the SMS administrator for ComPany.com. All servers run Microsoft Windows Server
2003. All desktop computers run Windows XP Professional. You install SMS 2003 SP1. You
configure the SMS site with advanced security. You install the SMS Advanced Client on all
computers. You need to discover all SMS clients by using Network Discovery.
Which Network Discovery method will be unavailable?br />A. DHCP
B. Domains
C. SNMP
D. SNMP Devices
E. Subnets
419.
Suppose You are the SMS administrator for ComPany.com. The SMS 2003 site hierarchy consists of a
single primary site. Servers run Microsoft Windows Server 2003. Desktop computers run
Windows XP Professional. Users who are members of a group named Help Desk want to access
computers remotely. The Remote Tools Client Agent is configured as shown in the exhibit.
**MISSING**
Users in the Help Desk group have full access rights on the Remote Assistance tool and SMS
Remote Tools. All SMS client computers use the default settings for the Remote Desktop service.
You need to instruct the users in the Help Desk group how to access computers remotely. What
should you instruct them to do?
A. In the SMS Administrator console, start Windows Diagnostics.
B. In the SMS Administrator console, start Remote Tools.
C. In the SMS Administrator console, start Remote Assistance.
D. In the SMS Administrator console, start Remote Desktop Client.
420.
Explain You are the SMS administrator for ComPany.com. All servers run Microsoft Windows Server
2003. All desktop computers run Windows XP Professional. The company has a single SMS 2.0
SP3 site. You plan to upgrade the SMS 2.0 site to SMS 2003 SP1.
You need to test specific upgrade tasks before implementing SMS 2003 SP1 in the production
environment. Which task should you avoid performing in a production environment?
A. installingInternet Information Services
B. upgrading to SMS 2.0 SP4
C. running the Deployment Readiness Wizard
D. runningSetup.exe /testdbupgrade SMS_
421.
Tell me You are the SMS administrator for ComPany.com. All servers run Microsoft Windows Server
2003. All desktop computers run Windows XP Professional. You want to install the SMS
Advanced Client on all computers on the network. You use the Client Push
Installation Wizard to install the SMS client software on the computers. You discover that some of
the computers failed to install the SMS client. You need to identify the cause of the problem.
Which three log files could you examine on both the SMS client and the SMS site server? (Each
correct answer presents a complete solution. Choose three.)
A. Ccm.log
B. Ccmsetup.log
C. Cidm.log
D. Client.msi.log
E. Ddm.log
F. Smsexec.log
422.
Can you explain You are the SMS administrator for ComPany.com. Your network consists of a single Active
Directory domain. The network contains a Microsoft SQL Server 7.0 SP3 computer. The SMS site
server runs Microsoft Windows 2000 Server SP3. The SMS site server is configured as a
management point, client access point, server locator point, and reporting point. You want to use
a server that runs Microsoft Windows NT Server 4.0 SP4 as a distribution point. The SMS site
currently uses the standard security mode. You need to migrate from the standard security mode
to the advanced security mode. You want to achieve this goal by using the least amount of
administrative effort. Which two actions should you perform? (Each correct answer presents part
of the solution. Choose two.)
A. Upgrade the computer you want to configure as a distribution point to Windows NT Server
4.0 SP6.
B. Upgrade the computer you want to configure as a distribution point to Windows 2000 Server
SP3.
C. Upgrade the SQL Server computer to SQL Server 2000 SP3a.Upgrade the SMS site server
to Windows Server 2003.
D. Extend the Active Directory schema.
423.
You are the SMS administrator for ComPany.com. Your SMS hierarchy consists of a single
primary site. Your SMS site consists of a single site server configured as a management point, a
client access point, a server locator point, and a distribution point. Employees use Pocket PC
devices. They only access the company network over a wireless connection. You want to use
SMS to manage the Pocket PC devices. You install and configure the Device Management
Feature Pack on the SMS site server. You now need to deploy the client software to the mobile
devices. What should you do?
A. Create an advertisement to install the Device Client on the computers running Microsoft
ActiveSync.
B. Create an advertisement to install the Device Client on the mobile devices.
C. Use Client Push Installation to install the Device Client.
D. Use a Web site to make the Device Client installation available.
424.
You are the SMS administrator for ComPany.com. The SMS 2003 site hierarchy consists of a
single primary site. The SMS site server is configured as a management point, client access
point, server locator point, and distribution point. The hardware on the management point must be
replaced. You need to transfer the management point
role to a different server. The only computer available for this purpose runs Microsoft Windows
NT Server 4.0 SP4. You need to prepare this computer to be a management point. What should
you do?
A. Install Windows 2000 Server SP3 and IIS.
B. Install Windows Server 2003 with the default settings.
C. Install SP6 for Windows NT Server 4.0 and IIS
D. Install Windows 2000 Server SP2.
425.
You are the SMS administrator for ComPany.com. All domain controllers run Microsoft Windows
Server 2003. All desktop computers run Windows XP Professional. You plan to install SMS 2003
SP1. You need to instruct the Active Directory administrator how to prepare Active Directory for
SMS integration. What instruction or instructions should you convey to the Active Directory
administrator? (Choose all that apply.)
A. Create the System Management container.
B. Create the SMS 2003 container.
C. Give appropriate rights to the System Management container.
D. Give appropriate rights to the SMS 2003 container.
E. Log on by using a user account that is a member of the Schema Admins group.
F. Run ExtADSchem.exe
426.
If You are the SMS administrator for ComPany.com. The Hardware Inventory Client Agent is
enabled with the default configuration settings. You need to ensure that the Hardware Inventory
Client Agent is run every Tuesday at 19:00. What should you do?
A. Configure the Hardware Inventory Client Agent to use a Full schedule.
B. Add an IDMIF file to each client that sets the new schedule.
C. Configure the Hardware Inventory Client Agent to use a Simple schedule.
D. Change the SMS_def.mof to comply with the new schedule.
427.
You are the SMS administrator for ComPany.com. The SMS hierarchy consists of a single
primary site. You use SMS to deploy a program that examines the latest version of the antivirus
software that is used by the computers on the network. Two advertisements use this program.
One advertisement runs daily on servers and portable computers. Another advertisement runs
weekly on desktop computers. You discover a security flaw in the program that collects the
antivirus software information. You need to prevent computers from running the program until you
fix the security flaw. You need to ensure that all other advertisements function normally. You want
to achieve this goal by using the least amount of administrative effort. What should you do?
A. Disable the program.
B. Delete the program.
C. Disable the Advertised Programs Client Agent.
D. Delete each advertisement.
428.
You are the SMS administrator for ComPany.com. ComPany uses Active Directory System
Discovery when configuring SMS to discover computers. The Organizational Unit (OU) structure
is shown in the following exhibit
**MISSING**
You need to configure Active Directory System Discovery to discover the computers in the
Information Services OU, but not the Help Desk OU.
Which two actions should you perform? (Each correct answer presents part of the solution.
Choose two.)
A. Ensure that the Recursive search option is selected.
B. Query the local domain location.
C. Query the local forest location.
D. Ensure that the Recursive search option is not selected.
E. Create a custom LDAP or GC query that points to the Information Services OU.
429.
You are the SMS administrator for ComPany.com. All servers run Microsoft Windows Server
2003. All desktop computers run Microsoft Windows XP Professional. The company has a single
SMS site. The SMS Advanced Client is installed on all computers on the network. You need to
inventory the network to discover only the followinG.
1. The version of Microsoft Word that is being used by each computer
2. A list of applications that is installed on each computer
3. The version of the definition file named Av.dat that is used by the antivirus software
You need to modify the default settings for the SMS Software Inventory Client Agent to collect
this information. You need to achieve this goal by using the least amount of administrative effort.
Which entry or entries should you add? (Choose all that apply.)
A. *.exe
B. Av.dat
C. Winword.exe
D. *.*
430.
You are the SMS administrator for ComPany.com. The company has a single SMS site.
Employees use Windows mobile devices. You use the Device Client to manage these devices
with the SMS Device Management Feature Pack. You want to ensure that the mobile devices
meet the following security guidelines:
1. Passwords comply with complexity requirements.
2. Desktop computers use digital certificates while connecting over the virtual private
network (VPN).
You need to configure the mobile devices to comply with these guidelines.
Which two tasks should you perform? (Each correct answer presents part of the solution. Choose
two.)
A. Use an advertisement to run a Microsoft Visual Basic Scripting Edition (VBScript) script to
configure VPN settings.
B. Use an advertisement to run a Microsoft Visual Basic .NET assembly to configure VPN
settings.
C. Use Device Settings Manager to configure the VPN settings.
D. Use Device Settings Manager to configure the password policy.
431.
Suppose You need to ensure that transportation brokers are authenticated when they access the broker
Web site. Which action or actions should you take? (Choose all that apply)
A. Create a distribution list of authenticated users
B. Provide a facility for online registration
C. Provide a facility to view passwords
D. Provide secure storage of user names and passwords
E. Secure the exchange of user names and passwords between the client computer and the
server
F. Enable e-mail access for transportation brokers
Answer: B, D, E
432.
Suppose You are completing the technical specification for the new reservation application.
Which technique should you recommend for state management?
A. ASP.NET ViewState
B. Server-side database
C. Client-side cookies
D. Application cache
433.
Explain Which new business process or processes should be supported by the new solution?
(Choose all that apply)
A. Brokers can order transportation services
B. Vehicle scheduling capability is provided
C. Bar code readers are supported
D. Use of space on vehicles can be tracked
E. Brokers can track shipments
F. Customers can track parcels
Answer: A, D, E
434.
Suppose You are writing a list of integration requirements for your solution. Which requirement or
requirements should you include? (Choose all that apply)
A. Order data must be read from the accounting application
B. Shipment tracking must be read from an XML Web service
C. Customers must be redirected to another Web site to track shipments
D. Customers must be able to place orders by using an XML Web service
E. Order data must be written to the accounting application
F. Order data must be e-mailed to the salespeople
Answer: A, B, E
435.
Suppose You are creating the logical design for a use case named Customer updates customer profiles?.
Which object or objects should you include in the design? (Choose all that apply)
A. Data access object
B. Customer object
C. Flight object
D. Logging object
E. Airline object
436.
Suppose You need to enable brokers to track their own shipment. To meet this requirement, you need to
consider various specifications. Which four specifications should you consider? (Each correct
answer presents part of the solution)
A. Provide a Web-accessible form to authenticate brokers against a table of registered users
B. Provide a Web-accessible form to enable brokers to request vehicle routes for their shipments
C. Provide a Web-accessible form to query the database for broker shipments
D. Provide a Web-accessible form to generate waybill numbers
E. Identify a parcel in the database as part of a broker shipment
F. Relate a parcel to a specific broker
G. Track the weight of a parcel in the database
437.
Explain The invoice creation process must be dynamically monitored to track the following information:
Average number of seconds to create an invoice
Number of invoices created per second
Total number of successfully created invoices
Total number of failed attempts to create an invoice
Monitoring should occur with a minimum of development effort. What should you do?
A. Write statistics to the database and use SQL Query Analyzer to dynamically monitor the
statistics
B. Create a removable Microsoft .NET class to contain statistics. Configure the class as singleton
class. Write a utility that retrieves statistical information from this class
C. Write statistics to the application event log
D. Use custom performance counters
438.
Suppose You are writing the technical specification for your solution. You need to select a technology for
the new timesheet application. Which technology should you use?
A. an XML Web service
B. a Web application
C. a console application
D. a Windows Forms application
439.
Suppose You are preparing the functional specification for the new reservation application. Which two
functionalities should you specify? (Each correct answer presents part of the solution. Choose
two)
A. Localization
B. Monitoring of application performance
C. Secure storage of customer profile information
D. Availability of application for mobile phones and personal digital assistants
E. Integration with Active Directory
440.
Suppose You are writing the primary scenario of a use case named Customer retrieves a saved itinerary.
Which action or actions should be included?(Choose all that apply)
A. Application informs customers that no itineraries exist
B. Application informs customers that a saved flight is no longer available
C. Customer asks for saved itineraries
D. Application offers alternate flights
E. Application queries the database for saved itineraries
F. Application displays retrieved itineraries
441.
Explain Which business constraint poses the greatest potential risk to completing your project for Blue
Yonder Airlines?
A. The current IT staff must support the solution in the future
B. All testing scenarios and all necessary rework must be completed during the one-month testing
period.
C. The scheduling vendor will begin providing access by XML Web service in three months
D. The application must be completed within a five-month development period before it is tested
442.
Suppose Web application used by Team Leads and Business Planners requires an authentication
mechanism. Which pair of authentication technologies should you recommend?
A. IIS Anonymous authentication with ASP.NET Passport authentication
B. IIS Anonymous authentication with ASP.NET Forms authentication
C. IIS Basic authentication with SSL and ASP.NET Windows authentication
D. IIS Integrated Windows authentication with ASP.NET Windows authentication
E. IIS Basic authentication with SSL and ASP.NET Forms authentication
443.
Suppose You are writing a conceptual diagram of the modules that must be developed for your solution.
Which module or modules should be included?(Choose all that apply)
A. a Web application for Team Leads and Business Planners
B. a timesheet entry database
C. a billing database
D. a notification engine that sends timesheet entry reminders
E. a timesheet entry application
F. a Windows CE application
G. a utility that uploads information to the billing application
444.
Explain When the new solution is in place, parcel information and parcel history information must be
stored. You need to estimate the amount of data that will be generated by the new solution during
its first year of use. What is the approximate amount?
A. 824MB
B. 5GB
C. 8GB
D. 50GB
445.
Suppose You need to decide whether your conceptual design represents a complete solution.
Which four design artifacts are relevant to your decision? (Each correct answer presents part of
the solution. Choose four)
A. Unit test for authenticating brokers
B. Component prototypes for tracking shipments
C. Functional requirements for tracking shipments
D. Unit test cases for tracking shipments
E. Use cases for authenticating brokers
F. Functional requirements authenticating brokers
G. Component prototypes for authenticating brokers
H. Use cases for tracking shipments
446.
Suppose You are listing the operational requirements for the new reservation application.
Which requirement should you include?
A. Extensibility
B. Localization
C. Mantainability
D. Availability
E. Deployability
447.
Suppose You are writing the operational requirements document for your solution. Which should you
include?
A. The application must encrypt all time entry data on client computers and in the database, and
data must be encrypted when transmitted over the internet
B. The IT staff will be responsible for fixing bugs in the code
C. The IT staff must be alerted to application problems
D. The application can have no single point of failure
448.
Suppose You are writing the technical specification for your solution. Your new timesheet application must
be able to access timesheet entry data. You need to specify the technology that will be used for
accessing this data. Your solution must require the minimum development effort. Which
technology should you use?
A. a SQLConnection class
B. a .NET Remoting object that uses TCP channel and binary formatting
C. an XML Web service proxy class
D. an interop assembly
449.
Suppose You are establishing a policy to measure the effectiveness of your deployment process.
You decide to track one or more phases of development to identify defects. Which phase or
phases should you track?(Choose all that apply)
A. Design and analysis
B. Development
C. Stabilization
D. Requirements
450.
You are validating the physical design for your solution. Which element or elements should be
included in the design?(Choose all that apply)
A. algorithms for scheduling vehicles
B. scalability to meet increased usage
C. authentication of transportation brokers
D. online registration facility for transportation brokers
E. interface to the bar code readers
451.
If you are writing the functional specification for your solution. You must include the customer
pricing requirements. Which requirement or requirements should you include? (Choose all that
apply)
A. Pricing data must be encrypted
B. Each user must be uniquely identified
C. Content must be personalized by user
D. Order data must be read from the accounting application
452.
Suppose You are designing a strategy to migrate data from the existing timesheet application to the new
application. Which tool or technology should you use?
A. XML Schema Definition tool (xsd.exe)
B. COM interoperability
C. Microsoft SQL Server Data Transformation Services (DTS)
D. Microsoft SQL Server replication
453.
Explain Which new module or modules should you develop for Trey Research? (Choose all that apply.)
A. An application to export laboratory results
B. A data store
C. A Web application for trucking supervisors
D. An automated report generator
E. An application to import laboratory reports
F. An OCR interface
G. An IVR application
454.
Before you release the solution, you need to develop a process to validate and enforce an
appropriate level of quality. Which three statistics should you use?
(Each correct answer presents part of the solution)
A. Number of defects per component
B. Number of defects per thousand lines of source code
C. Number of defects by developer
D. Percentage of successful builds
E. Percentage of requirements tested
F. Number of defects detected to date
G. Number of defects corrected to date.
455.
Suppose You are validating the physical design of a data a data layer class that will return a set of time
entries from the timesheet database. This class will be used by the Web application for Team
Leads and Business Planners and, indirectly, by the new timesheet application.
The class must use connection pooling, and it must be as secure and as flexible as possible. You
need to specify a Microsoft SQL Server authentication strategy that meets these requirements.
Which strategy should you use?
A. The data class uses SQL Server authentication with an application specific SQL Server
account. The account name and password are embedded in a connection string
B. The data class uses Windows authentication when connecting to the database and
impersonates a specific account created for operations on the database
C. The data class uses Windows authentication when connecting to the database and
impersonates the application user
D. The data class uses SQL Server authentication with the SQL Server sa account
456.
Suppose You are creating the physical design for the customer category data model. For reporting
purposes, you want to optimize access to customer category data. You define a Customer table
and a Category table. What should you do next?
A. Define three foreign key columns in the Category table, such that each column references a
different parent row in the Customer table. Define indexes on the foreign key columns.
B. Define three foreign key columns in the Customer table, such that each column references a
different parent row in the Category table. Define indexes on the foreign key columns.
C. Define a foreign key column in the Category table that references the parent row in the
Customer table. Define an index on the foreign key column.
D. Define a foreign key column in the Customer table that references the parent row in the
Category table. Define an index on the foreign key column.
457.
Suppose You need to recommend standard development processes for your solution. Your
recommendations must assist the development team in learning to use the Microsoft .NET
Framework as quickly as possible. Which process or processes should you recommend?(Choose
all that apply)
A. Create an automated build process
B. Install error-tracking software
C. Ensure that all assemblies pass unit testing
D. Permit individual developers to use any Microsoft .NET language
E. Hold regular code reviews
458.
Suppose Your team builds a daily release of the timesheet application for testing by the quality assurance
(QA) team. You find that the volume of bugs is threatening your project schedule. The following
example is a typical bug:
One method should return a dataset that is based on a date range given as input parameters.
However, when the method queries the database, it erroneously interchanges the beginning date
and the end date. An empty dataset is always returned.
You need to minimize these kinds of bugs using a minimum of development effort and
QA effort. What should you do?
A. Require more frequent builds
B. Require the QA team to perform more integration testing
C. Require engineers to perform complete integration testing before submitting code
D. Require engineers to perform adequate unit tests before submitting code
459.
Suppose You need to create a physical design that meets the monitoring requirements of Fabrikam, INC.
What should you do?
A. Create and use a new event log to record each customer logon event
B. Use the built-in ASP.NET performance counters to monitor application load
C. Use the Trace class to record each customer logon event
D. Create and use new NumberOfItems performance counters to monitor active customer sessions
460.
Suppose A database architect on your team prepares a logical data model. The model includes entries that
correspond to clients, projects and timesheet entries. You are reviewing the model. Which entity
relationship or relationships should be included?(Choose all that apply)
A. a Project entity is the parent of a TimesheetEntry entity
B. a Client entity is the child of a TimesheetEntry entity
C. a many-to-many relationship exists between a Client entity and a Project entity
D. a many-to-many relationship exists between a Project entity and a Timesheet Entry entity
E. a Client entity is the parent of a Project entity
F. a Client entity is the parent of a TimesheetEntry entity
461.
Suppose You are validating your physical design. You need to ensure that the design maps to the
categorization requirements for customer pricing. Which member should you include in the
design?
A. A GetPrice method of a Product class with no parameters
B. A Price property of a Product class
C. A Price property of a Customer class
D. A GetPrice method of a Product class with a single Customer Object parameter
462.
Suppose You are analyzing the feasibility of your solution. You need additional information to decide
whether the solution is technically possible. Which additional information do you need?
A. A copy of the existing timesheet application
B. A prototype of the Web application that will be used by Team Leads and Business Planners
C. A list of the different models of Windows CE devices that need to be supported
D. API information and requirements related to integration with the billing application
463.
Explain The Web application used by Business Planners generates many types of reports. One type
displays billing information over specified timeframes. The other selects a lawyer and a timeframe
and the report displays the average number of minutes billed by that lawyer per day and the
average number of minutes billed to each client per day over that timeframe. You must ensure
that this report is generated with a minimum network traffic. What should you do?
A. Use Microsoft SQL Server indexes to optimize the data calculations
B. Implement the calculations in a business layer class
C. Implement the calculations in a data layer class
D. Use Microsoft SQL Server stored procedures for the data calculations
464.
Suppose You need to implement online interactive user assistance for the new reservation application.
What should you do?
A. Create a manual that can be downloaded from the Web site
B. Create a compiled help module and use context-sensitive help for all screen elements
C. Implement ToolTips to provide information about all screen elements
D. Use the ALT attribute to provide a short textual description for all images and audio files.
465.
Explain Your functional specification includes the following statement: User identity and a tirnestarnp
must be captured when a driver authenticates to the IVR application or the driver Web
application. In your technical specification, you need to specify the target where logged
messages should be written. Which target should you specify?
A. The sysmessages table in the Microsoft SOL Server master database
B. The Security event log
C. A table in the applications Microsoft SOL Server database
D. A custom event log
466.
Suppose You need to select a strategy that will provide detailed usage information for the new reservation
application. Information must be provided with a minimum development effort. What should you
do?
A. Use Microsoft .NET performance counters in the application
B. Create a Microsoft Management Console(MMC) snap-in for the application
C. Add Windows Management instrumentation to the application
D. Use the application?s configuration file to enable and disable logging
467.
Suppose You are writing a document that identifies potential project risks. Which business constraint poses
the greatest potential risk?
A. The solution must be hosted by Fabrikam, Inc
B. Testing and deployment of the customer Web site must be complete in six months
C. The shipping partner will deploy the XML Web service in four months
D. All customers will try to place orders at the end of the month
468.
Suppose You are designing the implementation of the interface to the accounting application. You need to
ensure that the new application can communicate with the accounting application. What should
you do?
A. Create an XML Web service class
B. Create TcpClient objects
C. Create TcpListener objects
D. Create an XML Web service proxy class by using Wsdl.exe
469.
You must ensure that the new reservation application can be monitored while it is running. Which
approach should you use?
A. TraceSwitch objects
B. Diagnostic tools
C. PerformanceCounter objects
D. Windows Management Instrumentation Job Object provider
470.
If you are creating the logical design for the new reservation application. Which entity or entities should you include? (Choose all options that apply)
A. Airport
B. Flight
C. Customer
D. Gate
E. City
471.
Suppose You are validating your conceptual design in terms of scalability. Which requirement will probably
have the greatest impact on scalability?
A. Scheduling additional vehicles
B. Using the interface to bar code readers
C. Reporting use of space in vehicles
D. Handling additional broker shipments
472.
Explain Which data item or items should you add to the existing applications? (Choose all that apply)
A. Waybill information
B. Broker identification information
C. Depot information
D. Parcel dimensions
E. Parcel routing information
F. Information about use of space on vehicles
473.
Explain Which performance standard should you use for your solution?
A. Vehicle usage of at least 80 percent of total capacity
B. Database size of less than one terabyte
C. CPU utilization of less than 50 percent in the database server
D. Screen response time of two seconds or less
474.
Suppose You create a Visual Studio .NET setup project to distribute an application. You add a SQL script
named XYZDB.SQL. You must ensure that the SQL script is executed during the installation
process. What should you do?
A. Add a custom action to your setup project.
Select XYZDB.SQL as the source path.
B. Add a batch file to your setup project to execute XYZDB.SQL.
Add a launch condition to the setup project.
Set the Condition property to the batch file.
C. Create a new Visual Studio .NET project that executes XYZDB.SQL.
Include the new project with your setup project.
Add a custom action that launches the new project during installation.
D. Add a launch condition to your setup project.
Set the Condition property to XYZDB.SQL.
475.
Suppose You use Visual Studio .NET to develop a Windows-based application. Your application will
display customer order information from a Microsoft SQL Server database. The orders will be
displayed on a Windows Form that includes a DataGrid control named XYZGrid1. XYZGrid1 is
bound to a DataView object. Users will be able to edit order information directly in XYZGrid1.
You must give users the option of displaying only edited customer orders and updated values in
XYZGrid1.
What should you do?
A. Set the RowStateFilter property of the DataView object to
DataViewRowState.ModifiedOriginal.
B. Set the RowStateFilter property of the DataView object to DataViewRowState.ModifiedCurrent.
C. Set the RowFilter property of the DataView object to DataViewRowState.ModifiedOriginal.
D. Set the RowFilter property of the DataView object to DataViewRowState.ModifiedCurrent.
476.
Suppose You develop a Windows-based application XYZ App by using Visual Studio .NET. XYZApp
implements ADO.NET objects to call Microsoft SQL Server stored procedures. Your database
administrator is responsible for coding and maintaining all stored procedures. Periodically, the
administrator modifies the stored procedures.
At run time, your application code must discover any changes in the way that values are passed
to and returned from the stored procedures.
Which ADO.NET object and method should you use?
A. CommandBuilder.RefreshSchema
B. CommandBuilder.DeriveParameters
C. SqlCommand.CreateParameter
D. SqlDataAdapter.GetFillParameters
477.
Suppose You develop a Windows-based application XYZiApp by using Visual Studio .NET. XYZiApp uses
a SqlConnection object for database access.
You typically run XYZiApp on a computer that has limited RAM and hard disk space. After the
code finishes using the SqlConnection object, you must ensure that the connection is closed and
that any resources consumed by the object are released immediately.
What should you do?
A. Call the Finalize method of the SqlConnection object.
B. Call the Dispose method of the SqlConnection object.
C. Set the SqlConnection object equal to Nothing.
D. Set the SqlConnection object equal to
478.
Suppose You execute a query on your external Oracle database named XYZSalesDate by using an
OleDbCommand object. The query uses the Average function to return a single value that
represents the average price of products in the inventory table. You want to optimize performance
when you execute this query.
To execute this query from your ADO.NET code, you need to use a method of the
OleDbCommand object. Which method should you use?
A. ExecuteNonQuery
B. ExecuteScalar
C. ToString
D. ExecuteReader
479.
Suppose You develop a Windows-based application XYZApp that includes several menus. Every top-level
menu contains several menu items, and certain menus contain items that are mutually exclusive.
You decide to distinguish the single most important item in each menu by changing its caption
text to bold type.
What should you do?
A. Set the DefaultItem property to True.
B. Set the Text property to ?True?.
C. Set the Checked property to True.
D. Set the OwnerDraw property to True.
480.
Suppose You use Visual Studio .NET to create a Windows-based application for XYZ Inc. The application
includes a form that contains several controls, including a button named exitButton. After you
finish designing the form, you select all controls and then select Lock Controls from the Format
menu.
Later, you discover that exitButton is too small. You need to enlarge its vertical dimension with
the least possible effort, and without disrupting the other controls.
First you select exitButton in the Windows Forms Designer. What should you do next?
A. Set the Locked property to False.
Set the Size property to the required size.
Set the Locked property to True.
B. Set the Locked property to False.
Use the mouse to resize the control.
Set the Locked property to True.
C. Set the Size property to the required size.
D. Use the mouse to resize the control.
481.
Suppose You develop a Windows-based application that includes the following code segment. (Line
numbers are included for reference only.)
01 Public Sub password_Validating (ByVal sender As _
02 Object, ByVal e As _.
03 System.ComponentModel.CancelEventArgs)
04 Handles password.Validating
05 If ValidPassword() = False Then
06 Insert new code.
07 End If
08 End Sub
You must ensure that users cannot move control focus away from textPassword if
ValidPassword returns a value of False. You will add the required code on line 6.
Which code segment should you use?
A. e.Cancel = True
B. sender = textName
C. password.AcceptsTab = False
D. password.CausesValidation =False
482.
Suppose You develop a Windows Form that provides online help for users. You want the help functionality
to be available when users press the F1 key. Help text will be displayed in a pop-up window for
the text box that has focus.
To implement this functionality, you need to call a method of the HelpProvider control and pass
the text box and the help text.
Which method should you call?
A. SetShowHelp
B. SetHelpString
C. SetHelpKeyword
D. ToString
483.
You are preparing a localized version of a Windows Form named XYZLocal. Users of XYZLocal
speak a language that prints text from right to left. User interface elements on the form need to
conform to this alignment.
You must ensure that all user interface elements are properly formatted when the localized
Windows Form runs. You must also ensure that XYZLocal is easy to update and maintain.
What should you do?
A. Set the RightToLeft property of each control on the form to Yes.
B. Set the RightToLeft property of the form to Yes.
C. Set the Language property of the form to the appropriate language.
D. Set the Localizable property of the form to True.
484.
As a developer at XYZ you develop a new sales analysis application that reuses existing data
access components. One of these components returns a DataSet object that contains the data for
all customer orders for the previous year.
You want your application to display orders for individual product numbers. Users will specify the
appropriate product numbers at run time.
What should you do?
A. Use the DataSet.Reset method.
B. Set the RowFilter property of the DataSet object by using a filter expression.
C. Create a DataView object and set the RowFilter property by using a filter expression.
D. Create a DataView object and set the RowStateFilter property by using a filter expression..
485.
Suppose You develop a Windows-based application. The application uses a DataSet object that contains
two DataTable objects. The application will display data from the two data tables. One table
contains customer information, which must be displayed in a data-bound ListBox control. The
other table contains order information, which must be displayed in a DataGrid control.
You need to modify your application to enable the list box functionality. What should you do?
A. Use the DataSet.Merge method.
B. Define primary keys for the DataTable objects.
C. Create a foreign key constraint on the DataSet object.
D. Add a DataRelation object to the Relation collection of the DataSet object.
486.
Tell me What is the difference between Remoting and Client/Server application?
487.
Suppose You create three Windows services named EXService1, EXService2, and EXService3. You want
to install all three services on a computer named XYZA by using the Installer tool (Installutil.exe).
On the command line of XYZA, you enter and run the following command:
Installutil EXService1 EXService2 EXService3
During the installation process, EXService3 throws an installation error. The installation process
completes.
How many of the three services are now installed on XYZ1?
A. None
B. One
C. Two
D. Three.
488.
Suppose You are planning to create a DataSet object named EXDataSet to be used in a bond-trading
application.
Several developers will need to write code to manipulate EXDataSet, and you want to ensure that
myDataSet is easy for them to use. You decide to create EXDataSet as a strongly typed data set.
Which two actions should you take? (Each correct answer presents part of the solution. Choose
two)
A. Create an XSD schema that defines EXDataSet.
B. Create an XDR schema that defines EXDataSet.
C. Create a class for EXDataSet that is based on the schema and that inherits from the DataSet
class.
D. Create a class for EXDataSet that is based on the schema and that inherits from the
XmlSchema class.
E. Create a key pair for EXDataSet by using the Strong Name tool (Sn.exe).
489.
Suppose You create a serviced component named Scheduler. Scheduler is registered in a library
application. The Scheduler methods parse String objects into Date Time objects.
You write a console application named EXCoverage.exe to test each method in Scheduler. You
want Coverage.exe to test Scheduler for multiple cultures to verify its globalization support.
What should you do?
A. Create a CultureInfo object for each culture locale before calling the Scheduler methods.
B. Create a RegionInfo object for each culture locale before calling the Scheduler methods.
C. Set the current thread?s CurrentCulture property to each culture locale before calling the
Scheduler methods.
D. Create a EXCoverage.exe.config file and add a element to the configuration file for
each culture locale.
490.
Suppose You are creating an XML Web service named ListBoxService. This service provides content,
such as states, countries, and geographical regions, for use in drop-down list boxes.
ListBoxService contains a Web method named RetrieveRegionsListBox. This method runs a
DataSet object that contains every geographical region in the world.
RetrieveRegionsListBox calls a Microsoft SQL Server database to load the DataSet object with
region data. You want to minimize the amount of time the method takes to return to the caller.
What should you do?
A. Use a stored procedure to return the data.
B. Store each DataSet object by using the Session object.
C. Set the BufferResponse property of the WebMethod attribute to false.
D. Set the CacheDuration property of the WebMethod attribute to an interval greater than zero.
491.
Suppose You are debugging a visual studio .Net application named XYZApp. The application produces an
Xml documents object and then consumes the same object. This object moves data in the
application. The object has no schema, but it contains a declaration line that you must inspect.
You decide to transform the XML code and its declaration into a string for easy inspection.
What should you do?
A. Assign the ToString method of the Xml Document object to a string variable.
B. Assign the OuterXml property of the Xml document object to a string variable
C. Assign the OuterXml property of the Xml document element property of the Xml document
object to a string variable.
D. Use the WriteContentTo method of the XmlDocument object to write the document into a
MemoryStream object. Use the GetXml method of the DataSet object to get a string version of
the document.
492.
Suppose You create a Windows service that processes XML messages placed in a MSMQ queue. You
discover that the service is not functioning properly.
You need to debug the service to correct the program.
What should you do?
A. Start the Windows service.
Then attach a debugger to the process.
B. Attach a debugger to the Windows service.
Then start the Windows service.
C. Start the Windows service.
Then run the .NET Services Installation tool (Regsvcs.exe).
D. Place a breakpoint in the Main method of the Windows service.
Then run the application within the Visual Studio .NET integrated development environment
(IDE).
493.
You create a .NET Remoting object named EXPatientinfo that exposes medical patient
information.
Because of the confidential nature of the information, you must ensure that the data remains
secure.
You want client applications to connect to EXPatientinfo over a secure communication channel.
You want to accomplish this task by writing the minimum amount of code.
What should you do?
A. Create your own host application and use a TcpChannel and BinaryFormatter.
B. Create your own host application and use an HttpChannel and a SoapFormatter.
C. Install EXPatientinfo in an Internet Information Services (IIS) virtual directory.
Configure EXPatientinfo to use a TcpChannel and a BinaryFormatter.
Configure IIS to use SSL.
D. Install EXPatientinfo in an Internet Information Services (IIS) virtual directory.
Configure EXPatientinfo to use an HttpChannel and a SoapFormatter.
Configure IIS to use SSL.
494.
You are creating an XML Web service that processes highly confidential messages. The service
exposed a Web method named RetrieveMessage that takes as input a code name and returns an
encrypted message.
You create a SOAP extension and override the extension?s ProcessMessage method so that you
can encrypt the message before it is sent back to the caller.
You need to encrypt only the data within the RetrieveMessageResult node of the SOAP
response. You create a function named EncryptMessage that encrypts the
RetrieveMessageResult node. You need to ensure that this method gets called before sending
the message back to the caller.
During which SoapMessageStage should you call EncryptMessage?
A. BeforeSerialize
B. AfterSerialize
C. BeforeDeserialize
D. AfterDeserialize
495.
You have DataSet object named LoanCustomersDataSet that contains customers serviced by the
loan department of XYZ. You receive a second DataSet that contains customers serviced by the
asset management department of XYZ. Both objects have the same structure.
You want to merge assetCustomersDataSet into LoanCustomersDataSet and preserve the
original values in loanCustomersDataSet.
Which code segment should you use?
A. loanCustomersDataSet.Merge (assetCustomersDataSet)
B. loanCustomersDataSet.Merge (assetCustomersDataSet, True)
C. assetCustomersDataSet.Merge (loanCustomersDataSet)
D. assetCustomersDataSet.Merge (loanCustomersDataSet, True)
496.
You are creating an XML Web service named XYZService. This service has a function named
WriteMessage that writes messages to a flat file in the C:EXServiceLog directory..
You want to implement security for WriteMessage so that WriteMessage and all the code it calls
can write messages only to the EXServiceLog directory.
Which code segment should you use?
A. Dim filePermission As New
FileIOPermission_(FileIOPermissionAccess.Write, ?C:EXServiceLog?)
filePermission.Demand()
B. Dim filePermission As New
FileIOPermission_(FileIOPermissionAccess.Write, ?C:EXServiceLog?)
filePermission.Deny()
C. Dim filePermission As New
FileIOPermission_(FileIOPermissionAccess.Write, ?C:EXServiceLog?)
filePermission.PermitOnly()
D. Dim filePermission As New
FileIOPermission_(FileIOPermissionAccess.Write, ?C:EXServiceLog?)
filePermission.Assert()
497.
You have a DataSet object named myDataSet. This object contains two DataTable objects
named Customers and Orders. Customers has a column named CustomerID, which is unique to
each customer.
Orders also has a column named CustomerID. You want to use the GetChildRows method of the
DataRow object to get all orders for the current customers.
What should you do?
A. Add a foreign key constraint on CustomerID of Orders between Customers and Orders.
B. Add a data relation to myDataSet on OrderID between Customers and Orders.
C. Create a unique constraint on CustomerID of Customers..
D. Create a primary key on CustomerID of Customers.
498.
Your company frequently receives product information from external vendors in the form of XML
data.
You receive XML document files, an .xdr schema file, and an .xsd schema file.
You need to write code that will create a typed DataSet object on the basis of product information.
Your code will be used in several Visual studio .NET applications to speed up data processing.
You need to create this code as quickly as possible.
What should you do?
A. Create the code manually.
B. Use XmlSerializer.Serialize to generate the code.
C. Use the XmlSerializer.Deserialize to generate the code.
D. Use the Xml Schema Definition tool (Xsd.exe) to generate the code.
499.
Suppose You are creating an XML Web service that provides a daily quotation from literary works to its
customers. This quotation is requested in many different languages, thousands of times every
day, and by thousands of Web sites operating many different platform.
A Web method named GetEXQuotes takes a languageID as input. GetEXQuotes uses this
language ID to retrieve a translated version of the daily quotation from a Microsoft SQL Server
database and to return that quotation to the customer.
You want to minimize the time it takes to return the translated version.
What should you do?
A. Store each translated quotation by using the Cache object.
B. Store each translated quotation by using the Session object.
C. Set the BufferResponse property of the WebMethod attribute to false.
D. Set the CacheDuration property of the WebMethod attribute to an interval greater than zero.
500.
How to create a serviced component named SessionDispenser. This computer is in the XYZ.Utilities
assembly and is registered in a COM+ server application. SessionDispenser has multiple callers.
You discover that there are logic problems in the Create New Session method. You want to
debug any calls to this method.
What should you do?
A. Open the SessionDispenser solution.
Set a breakpoint on the CreateNewSession method.
Start the debugger.
B. Attach the debugger to the client process.
Set a breakpoint on the SessionDispenser.CreateNewSession method.
C. Attach the debugger to the XYZ.Utilites.exe process.
Set a breakpoint on the CreateNewSession method.
D. Attach the debugger to a Dllhost.exe process.
Set a breakpoint on the CreateNewSession method.
501.
Suppose You create an XML Web service named WeatherService. This service contains a Web method
named RetrieveWeather. RetrieveWeather takes as input a city named and returns the current
weather conditions for that city.
You need to provide callers of this service with the URL they need to issue an HTTP-GET against
WeatherService.
Which URL should you use?
A. http://XYZSrv/AppPath/WeatherService.asmx/cityname=somecity
B. http://XYZSrv/AppPath/WeatherService.asmx/RetrieveWeather?cityname=somecity
C. http://XYZSrv/AppPath/WeatherService/RetreieveWeather.asmx?cityname=somecity
D. http://XYZSrv/AppPath/WeatherService/RetrieveWeather?cityname=somecity
502.
Suppose XYZ Inc. provides a credit card processing application for its customers. The current application
supports only computers that run on a Microsoft Windows operating system.
You are asked to rewrite the current application as a .NET application. This .NET application
does not need to be backward compatible with the current application.
You must ensure that this new application meets the following requirements:
? Must support asynchronous processing.
? Must be able to pass data through firewalls.
? Must pass only SOAP-Compliant formatted data validated by using an XSD schema.
? Must not be limited to client computers running on a Microsoft operating system.
You want to accomplish this task by using the minimum amount of development effort.
Which type of .NET application should you use?
A. Windows service
B. XML Web service
C. Serviced component
D. .NET Remoting object
503.
Suppose You are creating a .NET Remoting object named PropertyCache. PropertyCache will hold a
Hashtable object or name/value pairs.
A variety of remote client applications will communicate with PropertyCache to set and get
property values. You need to ensure that properties set by one client application are also
accessible to other client applications.
Which two actions should you take? (Each correct answer presents part of the solution. Choose
two)
A. Configure PropertyCache to be a client-activated object.
B. Configure PropertyCache to be a server-activated Singleton object.
C. Configure PropertyCache to be a server-activated SingleCall object.
D. Derive the PropertyCache class from MarshalByRefObject and override
InitializeLifetimeService() to return null.
E. Mark the PropertyCache class with the Serializable attribute.
Implement the ISponsor interface in the PropertyCache class.
F. Implement the ISerializable and ILease interfaces in the PropertyCache class.
Implement ILease.CurrentLeaseTime to return Int32.MaxValue.
504.
You create an XML Web service named TimeService. Each time TimeService is started, it checks
for the existence of an event log named TimeServiceLog. If TimeServiceLog does not exist,
TimeService creates it.
You discover that when TimeService creates TimeServiceLog, it throws a
System.Security.SecurityException. The exception includes the following message: ?Requested
registry access is not allowed?. You need to resolve this problem.
What should you do?.
A. Configure Inetinfo.exe to run as the local administrator user account.
B. Create an installer for TimeService, and create the new event log in the installer code.
C. Modify the Web.config file by adding an identity element to impersonate the LOGON user
specified by Internet Information Services (IIS).
D. Modify the permissions of the
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesEventlog registry key to give
full control to the IUSR_computername user account.
505.
Suppose You create an XML Web service named XYZService. You must ensure that this service meets
the following URL authorization requirements.
? Anonymous access must be disabled for XYZService.
? An authenticated user named User1 cannot access XYZService.
? All other authenticared users can access XYZService.
You configure Internet Information Services (IIS) to meet these requirements. You now need to
configure the authorization section in the Web.config file to properly authorize the users.
Which code segment should you use?
A. .

B.

C.


D.

506.
Suppose You are creating an ASP.NET page for selling movie tickets. Users select a region, and then they
select from a list of cities in that region. The site displays the names and locations of movie
theaters in the city selected by the user.
Your company, XYZ Brothers, maintains a list of theaters in a database table that includes the
city, name, and street address of each theater. You want to minimize the time required to retrieve
and display the list of theater names after a user selects the region and city.
What should you do?
A. Modify the connection string to add the packet size property and set its values to 8192.
B. Add the following directive to the page:
OutputCache VaryByParam=?city?
C. Add the following directive to the page:
OutputCache VaryByControl=?region;city?
D. Modify the connection string to keep your database?s connection pool as small as possible.
507.
Suppose You are creating an ASP.NET page for XYZ. You create a DataGrid control that displays past
purchases made by the user. The DataGrid control is populated from an existing database when
the page is created.
The page contains TextBox controls that allow users to update their personal information, such as
address and telephone number.
You need to ensure that the page is refreshed as quickly as possible when users update their
contact information.
What should you do?
A. Set the Enable property of the DataGrid control to false.
B. Set the EnableViewState property of the DataGrid to false.
C. Write code in the Page.Load event handler that populates the DataGrid control only when the
IsPostBack property of the page is false.
D. Write in the Page.Load event handler that populates the DataGrid control only when the
IsPostBack property of the page is true.
508.
You ASP.NET application manages order entry data by using a DataSet object named
EXorderEntry. The EXorderEntry object includes two DataTable objects named orderNames and
OrderDetails. A ForeignKeyConstraint object named orderDetailsKey is defined between the two
DataTable objects.
You attempt to delete a row in orderNames while there are related rows in OrderDetails, and an
exception is generated.
What is the most likely cause of the problem?
A. The current value of OrderDetails.KeyDeleteRule is Rule.Cascade.
B. The current value of OrderDetails.KeyDeleteRule is Rule.SetNull.
C. The current value of OrderDetails.KeyDeleteRule is Rule.SetDefault.
D. The current value of OrderDetails.KeyDeleteRule is Rule.None.
509.
You create an ASP.NET page that uses images to identify areas where a user can click to initiate
actions. The users of the application use Internet Explorer.
You want to provide a pop-up window when the user moves the mouse pointer over an image.
You want the pop-up window to display text that identifies the action that will be taken if the user
clicks the image.
What should you do?
A. For each image, set the AlternateText property to specify the text you want to display, and set
the ToolTip property to True.
B. For each image, set the ToolTip property to specify the text you want to display.
C. In the onmouseover event handler for each image, add code that calls the RaiseBubbleEvent()
method of the System.Web.UI.WebControls.Image class.
D. In the onmouseover event handler for each image, add code that calls the ToString() method
of the System.Web.UI.WebControls.Image class.
510.
You create an ASP.NET application that produces sales reports for the XYZ corporation.
The sales data is stored in a Microsoft SQL Server database that is used for transaction
processing. The application consists of complex Transact-SQL statements.
Many users report that the report generation is taking longer to run each day. You need to
improve response times.
What are two possible ways to achieve this goal? (Each correct answer presents a complete
solution. Choose two)
A. Use an OleDbDataAdapter indexes exist on the SQL Server tables.
B. Ensure that appropriate indexes exist in the SQL Server tables.
C. Rewrite your SQL statements to use aliases for all table names.
D. Rewrite your direct SQL statements as stored procedures and call the stored procedures from
your application.
E. Configure queries to run in the security context of the user who is running the query.
511.
You are creating a Web site for XYZ. You receive product lists in the form of XML documents.
You are creating a procedure to extract information from these XML documents according to
criteria that your users will select.
When a user makes a request, you want the results of these requests to be returned as quickly
as possible. What should you do?
A. Create an XmlDataDocument object and load it with the XML data.
Use the DataSet property of the object to create a DataSet object.
Use a SQL SELECT statement to extract the requested data.
B. Create an XmlDataDocument object and load it with the XML data.
Use the SelectNodes method of the object to extract the requested data.
C. Create an XPathDocument object and load it with the XML data.
Call the CreateNavigator method to create an XPathNavigator object.
Call the Select method of the XPathNavigator object to run an XPath query that extracts the
requested data.
D. Create an XmlReader object.
Use the Read method of the object to stream through the XML data and to apply an Xpath
expression to extract the requested data.
512.
You are creating an ASP.NET page for a travel service. The page contains a CheckBoxList
control that contains travel destinations. Customer can select favorite destinations to receive
weekly e-mail updates of travel packages.
The CheckBoxList control is bound to a database table of possible destinations. Each destination
is ranked according to its popularity. You modify the page to sort the destination list by rank, from
the most popular to the least popular. The list has three columns.
You want the most popular destination to be on the top row of the check box list at run time.
Which property setting should you use for the CheckBoxList control?
A. Set the RepeatDirection property to Vertical.
B. Set the RepeatDirection property to Horizontal.
C. Set the RepeatLayout property to Flow.
D. Set the RepeatLayout property to Table.
513.
Suppose You ASP.NET application manages order entry data by using a DataSet object named
EXorderEntry. The EXorderEntry object includes two DataTable objects named orderNames and
OrderDetails. A ForeignKeyConstraint object named orderDetailsKey is defined between the two
DataTable objects.
You attempt to delete a row in orderNames while there are related rows in OrderDetails, and an
exception is generated.
What is the most likely cause of the problem?
A. The current value of OrderDetails.KeyDeleteRule is Rule.Cascade.
B. The current value of OrderDetails.KeyDeleteRule is Rule.SetNull.
C. The current value of OrderDetails.KeyDeleteRule is Rule.SetDefault.
D. The current value of OrderDetails.KeyDeleteRule is Rule.None.
514.
Suppose You are planning the deployment of an ASP.NET application named XYZApp. XYZApp uses a
Visual Studio .NET component named DataAccess that will be shared with other applications on
your Web server.
You are using Visual Studio .NET to create a Windows Installer package. You need to deploy
DataAccess and the ASP.NET application so that they can be uninstalled later if necessary.
What should you do?
A. Create a setup project for DataAccess.
Add the ASP.NET application in a custom action.
B. Create a setup project for the ASP.NET application.
Create another setup project for DataAccess.
C. Create a Web setup project for the ASP.NET application.
Add a project output for DataAccess.
D. Create a Web setup project for the ASP.NET application.
Add a merge module for DataAccess.
515.
Suppose You are creating an ASP.NET application for XYZ. Your application will call an XML Web service
run by Wide World Importers. The XML Web service will return an ADO.NET DataSet object
containing a list of companies that purchase wine.
You need to make the XML Web service available to your application.
What should you do?
A. On the .NET tab of the Reference dialog box, select System.Web.Services.dll.
B. In the Web References dialog box, type the address of the XML Web service.
C. Add a using statement to your Global.asax.cs file, and specify the address of the XML Web
service.
D. Write an event handler in the Global.asax.cs file to import the .wsdl and .disco files associated
with the XML Web service.
516.
Suppose You create English, French, and German versions of a test engine ASP.NET application you are
developing for XYZ Inc. You have separate resource files for each language version.
You need to deploy the appropriate resource file based on the language settings of the server.
What should you do?
A. Create an installer and set the Installer.Context property for each version of your application.
B. Create an installer that has a launch condition to verify the locale settings.
C. Create an installer that has a custom action to install only location-specific files.
D. Create an installer that has an MsiConfigureProduct function to install the appropriate version.
517.
Suppose You are creating an ASP.NET application for XYZ. An earlier version of the application uses
ActiveX components that are written in Visual Basic 6.0. The new ASP.NET application will
continue to use the ActiveX components.
You want the marshaling of data between your ASP.NET application and the ActiveX
components to occur as quickly as possible.
Which two actions should you take? (Each correct answer presents part of the solution. Choose
two)
A. Use ODBC binding.
B. Use late binding.
C. Use early binding
D. Set the AspCompat attribute of the Page directive to true.
E. Set the AspCompat attribute of the Page directive to false.
518.
You are creating an ASP.NET application to track XYZ sales orders. The application uses an
ADO.NET DataSet object that contains two DataTable objects. One table is named Orders, and
the other table is named OrderDetails. The application displays data from the Orders table in a list
box. You want the order details for an order to be displayed in a grid when a user selects the
order in the list box. You want to modify these objects to enable your code to find all the order
details for the selected order.
What should you do?
A. Add a DataRelation object to the Relations collection of the DataSet object.
B. Use the DataSet.Merge method to connect the Orders table and the OrderDetails table to each
other.
C. Add a ForeignKeyConstraint to the OrderDetails table.
D. Add a keyref constraint to the DataSet schema.
519.
Suppose You are configuring your ASP.NET application XYZApp. XYZApp will be hosted on a Web server
that also runs other applications.
You want to prevent any changes to the configuration settings of your application after the
application is deployed.
What should you do?
A. In the Machine.config file, set the allowOverride attribute in the location element to False.
Make no other changes to the Machine.config file.
B. In the Web.config file, set the allowOverride attribute in the location element to False.
Make no other changes to the Web.config file.
C. In the Machine.config file, set the allowOverride attribute in the appSettings element to False.
Make no other changes to the Machine.config file.
D. In the Web.config file, set the allowOverride attribute in the appSettings element to False.
Make not other changes to the Web.config file.
520.
Suppose You create an ASP.NET application to provide corporate news and information to XYZ?s
employees. The application is used by employees in New Zealand.
Default.aspx has a Web Form label control named currentDateLabel. The Page.Load event
handler for Default.aspx included the following line of code:
currentDateLabel.Text = DateTime.Now.ToString(?D?)
You need to ensure that the data is displayed correctly for employees in New Zealand. What
should you do?
A. In the Web.config file for the application, set the culture attribute of the globalization element to
en-NZ.
B. In the Web.config file for the application, set the uiCulture attribute of the globalization element
to en-NZ.
C. In Visual Studio .NET, set the responseEncoding attribute in the page directive for
Default.aspx to UTF-8.
D. In Visual Studio .NET, save the Default.aspx page for both versions of the application by
selecting Advanced Save Options from the File menu and selecting UTF-8.
521.
Suppose You are creating an ASP.NET page for XYZ. The page uses string concatenation to gather data
from multiple e-mail messages and format the data for display on the page.
You want to ensure that the page displays as quickly as possible.
What should you do?
A. Write code that uses the Append method of the StringBuilder object.
B. Write code that uses the Substring method of the String object.
C. Write code that uses the Concat method of the String object.
D. Write code that uses the plus-sign (+) operator to concatenate the strings.
522.
Suppose You develop a Windows-based application by using Visual Studio .NET. The application includes
a form named XYZForm and a class named Contact. XYZForm includes a button named
cmdCreateContact. You must ensure that your application creates an instance of Contact when a
user clicks this button. You want to write the most efficient code possible.
Which code segment should you use?
A. Contact contact = new Object();
B. Contact contact = new Contact;
C. Object contact = new Contact;
D. Contact contact = new Object;
523.
You use Visual Studio .NET to create an assembly, called XYZAssembly, that will be used by
other applications, including a standard COM client application.
You must deploy your assembly on the COM application to a client computer. You must ensure
that the COM application can instantiate components within the assembly as COM components.
What should you do?
A. Create a strong name of the assembly by using the Strong Name tool (Sn.exe).
B. Generate a registry file for the assembly by using the Assembly Registration tool
(Regasm.exe)
Register the file on the client computer.
C. Generate a type library for the assembly by using the Type Library Importer (Tlbimp.exe).
Register the file on the client computer.
D. Deploy the assembly to the global assembly cache on the client computer.
Add a reference to the assembly in the COM client application.
524.
You plan to develop a customer information application CustomEX that uses a Microsoft SQL
Server database. CustomEX will be used frequently by a large number of users. Your application
code must obtain the fastest possible performance when accessing the database and retrieving
large amounts of data. You must accomplish this goal with the minimum amount of code.
How should you design CustomEX?
A. Use classes in the System.Data.OleDb namespace.
B. Use classes in the System.Data.SqlClient namespace.
C. Use remoting to connect to the SQL Server computer.
D. Use interoperability to include legacy COM-based data access components.
525.
Suppose As a developer at XYZ you develop a new sales analysis application that reuses existing data
access components. One of these components returns a DataSet object that contains the data for
all customer orders for the previous year.
You want your application to display orders for individual product numbers. Users will specify the
appropriate product numbers at run time..
What should you do?
A. Use the DataSet.Reset method.
B. Set the RowFilter property of the DataSet object by using a filter expression.
C. Create a DataView object and set the RowFilter property by using a filter expression.
D. Create a DataView object and set the RowStateFilter property by using a filter expression.
526.
You develop a Windows-based application XYZ. XYZ uses a DataSet object that contains two
DataTable objects. XYZ will display data from two data tables. One table contains customer
information, which must be displayed in a data-bound ListBox control. The other table contains
order information, which must be displayed in a DataGrid control.
You need to modify XYZ to enable the list box functionality.
What should you do?
A. Use the DataSet.Merge method.
B. Define primary keys for the Data Table objects.
C. Create a foreign key constraint on the DataSet object.
D. Add a DataRelation object to the Relations collection of the DataSet object.
527.
Suppose As a programmer at XYZ inc, you use Visual Studio .NET to create several applications that will
be deployed commercially over the Internet. You must ensure that customers can verify the
authenticity of your software.
Which action or actions should you take? (Choose all that apply.)
A. Sign your portable executables by using Signcode.exe.
B. Generate an X.509 certificate by using Makecert.exe.
C. Purchase an X.509 certificate from a certificate authority.
D. Purchase a Software Publisher Certificate from a certificate authority.
E. Convert your certificate to a Software Publisher Certificate by using Cert2spc.exe.
528.
You execute a query on your external Oracle database named XYZSalesDate by using an
OleDbCommand object. The query uses the Average function to return a single value that
represents the average price of products in the inventory table. You want to optimize performance
when you execute this query.
To execute this query from your ADO.NET code, you need to use a method of the
OleDbCommand object. Which method should you use?
A. ExecuteNonQuery
B. ExecuteScalar
C. ToString
D. ExecuteReader
529.
Suppose You use Visual Studio .NET to create a Windows-based application that will track camera sales.
The applications main object is named Camera. The Camera class is created by the following
definition:
public class Camera {
}
You write code that sets properties for the Camera class. This code must be executed as soon as
an instance of the Camera class is created. Now you need to create a procedure in which you
can place your code. Which code segment should you use?
A. public Camera()
B. public void Camera()
C. public bool Camera()
D. public New()
E. public Camera New()
F. public Camera Camera()
530.
Suppose You use Visual Studio .NET to create a Windows-based application. The application includes a
form named XYZProcedures (EXP). EXP allows users to enter very lengthy text into a database.
When users click the Print button located on EXP, this text must be printed by the default printer.
You implement the printing functionality by using the native .NET System Class Libraries with all
default settings.
Users report that only the first page of the text is being printed.
How should you correct this problem?
A. In the BeginPrint event, set the HasMorePages property of the PrintEventArgs object to True.
B. In the EndPrint event, set the HasMorePages property of the PrintEventArgs object to True.
C. In the PrintPage event, set the HasMorePages property of the PrintPageEventArgs object to
True.
D. In the QueryPageSettings event, set the HasMorePages property of the
QueryPageSettingEventArgs object to True.
531.
You use Visual .NET to develop a Windows-based application whose project name is XYZMgmt.
You create an application configuration file that will be installed on the client computer along with
XYZMgmt.
You must ensure that the settings in the application configuration file are applied when
XYZMgmt is executed.
What should you do?
A. Name the configuration file XYZMgmt.exe.confing and copy it to the WindowsSystem32
folder.
B. Name the configuration file XYZMgmt.config and copy it to the WindowsSystem32 folder.
C. Name the configuration file XYZMgmt.exe.config and copy it to the application folder.
D. Name the configuration file XYZMgmt.config and copy it to the application folder.
E. Name the configuration file XYZMgmt.exe.config and copy it to the global assembly cache.
532.
You are a developer for a XYZ Inc that provides free software over the Internet. You are
developing en e-mail application that users all over the world can download.
The application displays text strings in the user interface. At run time, these text strings must
appear in the language that is appropriate to the locale setting of the computer running the
application.
You have resources to develop versions of the application for only four different cultures. You
must ensure that your application will also be usable by people of other cultures.
How should you prepare the application for deployment?
A. Package a different assembly for each culture.
B. Package a different executable file for each culture.
C. Package a main assembly for source code and the default culture.
Package satellite assemblies for the other cultures.
D. Package a main assembly for source code.
Package satellite assemblies for each culture.
533.
Suppose You use Visual Studio .NET to create a control that will be used on several forms in your
application.
It is a custom label control that retrieves and displays your company?s current stock price.
The control will be displayed on many forms that have different backgrounds. You want the
control to show as much of the underlying form as possible. You want to ensure that only the
stock price is visible. The rectangular control itself should not be visible.
You need to add code to the Load event of the control to fulfill these requirements. Which two
code segments should you use? (Each correct answer presents part of the solution. Choose two)
A. this.BackColor = Color.Transparent;
B. this.ForeColor = Color.Transparent;
C. this.BackImage = null;
D. this.SetStyle(ControlStyles.UserPaint, false);
E. this.SetStyle(ControlStyles.SupportsTransparentBackColor, true);
534.
Suppose You develop a Windows-based application by using Visual Studio .NET. The application includes
numerous method calls at startup. After optimizing your application code, you test the application
on a variety of client computers. However, the startup time is too slow.
You must ensure that your application starts as quickly as possible the first time it runs. What
should you do?
A. Precompile your application by using the Native Image Generator (Ngen.exe):
Install the precompiled application on the client computers.
B. Install your application on the client computers.
Precompile your application by using the Native Image Generator (Ngen.exe).
C. Precompile your application by using the JIT compiler.
Install the precompiled application on the client computers.
D. Install your application on the client computers.
Precompile your application by using the JIT compiler.
535.
You use Visual Studio .NET to create a Windows-based application. The application includes a
form named XYZForm, which displays statistical date in graph format. You use a custom
graphing control that does not support resizing.
You must ensure that users cannot resize, minimize, or maximize XYZForm. Which three actions
should you take? (Each answer presents part of the solution. Choose three)
A. Set XYZForm.MinimizeBox to False.
B. Set XYZForm.MaximizeBox to False.
C. Set XYZForm.ControlBox to False.
D. Set XYZForm.ImeMode to Disabled.
E. Set XYZForm.WindowState to Maximized.
F. Set XYZForm.FormBorderStyle to one of the Fixed Styles.
G. Set XYZForm.GridSize to the appropriate size.
536.
Tell me You work as software developer at XYZ inc. You need to develop a Windows form that provides
online help for users. You want the help functionality to be available when users press the F1 key.
Help text will be displayed in a pop-up window for the text box that has focus.
To implement this functionality, you need to call a method of the HelpProvider control and pass
the text box and the help text.
What should you do?
A. SetShowHelp
B. SetHelpString
C. SetHelpKeyword
D. ToString
537.
Suppose You are developing a Windows-based application that requires the use of a calculation function
named Calculate Value. This function includes the following signature: int Calculate Value(int x) ;
Calculate Value is located in an unmanaged DLL named Company Functions.dll, and is not part
of a COM interface.
You need to be able to use Calculate Value in your application.
Which action or actions should you take? (Choose all that apply)
A. Use Regsvr32.exe to register CompanyFunctions.dll.
B. Use Visual Studio .NET to add a reference to CompanyFunctions.dll.
C. To your application, add the following code segment: using CompanyFunctions;
D. To your application, add the following code segment: [DllImport("CompanyFunctions.dll")]
public static extern int Calculate Value(int x);
538.
Suppose You have an ASP.NET application named ES WebApp. This application uses a private assembly
named Employee to store and retrieve employee data. Employee is located in the bin directory of
ES WebApp. You develop a new ASP.NET application named ESWebApp2 that also needs to
use Employee. You assign Employee a strong name, set its version to 1.0.0.0, and install it in the
global assembly cache. You then create a publisher policy assembly for version 1.0.0.0 and
install it in the global assembly cache. You compile ESWebApp2 against version 1.0.0.0. You do
not recompile My WebApp. You then run ES WebApp.
What is the most likely result?
A. A Version Not Found Exception is thrown.
B. Employee is loaded from the bin directory.
C. Version 1.0.0.0 of Employee is loaded from the global assembly cache.
D. Version 1.0.0.0 of Employee is loaded by the publisher policy assembly.
539.
You have a .NET Remoting object named Utils. The Utils class is a client-activated .NET
Remoting object. You want to write a client application that creates and uses a Utils object. You
want the client application to hold onto a reference to a Utils object for the duration of its
execution.
What should you do?
A. Construct the Utils object, and hold the object in a member variable.
B. Construct the Utils object, and set the LifeTimeService.LeaseTime to 0.
C. In the client application, create an Implementation of the ISponsor interface. Implement the
Renewal method to extend the lease.
D. In the client application, create an Implementation of the ILease interface. Implement the
CurrentLeaseTime property to return Int32.MaxValue.
540.
You create a serviced component named CompanyScheduler. CompanyScheduler is registered
in a library application. The Scheduler methods parse String objects into Date Time objects. You
write a console application named Coverage.exe to test each method in Scheduler. You want
Coverage.exe to test Scheduler for multiple cultures to verify its globalization support.
What should you do?
A. Create a Culture Info object for each culture locale before calling the CompanyScheduler
methods.
B. Create a Region Info object for each culture locale before calling the CompanyScheduler
methods.
C. Set the current threads Current Culture property to each culture locale before calling the
CompanyScheduler methods.
D. Create a Coverage.exe.config file and add a element to the configuration file for
each culture locale.
541.
Suppose You are creating a .NET Remoting object named Payroll. The Payroll class allows remote client
applications to access payroll data for your company. Client applications are developed by using
Windows Forms and Web Forms. You must ensure that remote client applications are securely
authenticated prior to gaining access to Payroll object. You want to accomplish this task by
writing the minimum amount of code.
What should you do?
A. Use a Tcp Channel and a Binary Formatter for the Payroll class.
B. Use an Http Channel and a Soap Formatter for the Payroll class.
C. Host the Payroll class in Internet Information Services (IIS) and implement Basic
authentication.
D. Host the Payroll class in Internet Information Services (IIS) and implement Integrated Windows
authentication.
542.
You are creating a .NET Remoting object named Payroll. The Payroll class allows remote client
applications to access payroll data for your company. Client applications are developed by using
Windows Forms and Web Forms. You must ensure that remote client applications are securely
authenticated prior to gaining access to Payroll object. You want to accomplish this task by
writing the minimum amount of code.
What should you do?
A. Use a Tcp Channel and a Binary Formatter for the Payroll class.
B. Use an Http Channel and a Soap Formatter for the Payroll class.
C. Host the Payroll class in Internet Information Services (IIS) and implement Basic
authentication.
D. Host the Payroll class in Internet Information Services (IIS) and implement Integrated Windows
authentication.
543.
You create a Windows service that processes XML messages placed in a MSMQ queue. You
discover that the service is not functioning properly.
You need to debug the service to correct the program.
What should you do?
A. Start the Windows service.
Then attach a debugger to the process.
B. Attach a debugger to the Windows service.
Then start the Windows service.
C. Start the Windows service.
Then run the .NET Services Installation tool (Regsvcs.exe).
D. Place a breakpoint in the Main method of the Windows service. Then run the application within
the Visual Studio .NET integrated development environment (IDE).
544.
Suppose You are creating an ASP.NET application named CompanyWebApp. To CompanyWebApp, you
add a Web reference to an XML Web service named User Service. User Service consists of a
Web method named RetrieveUserInfo. This Web method takes a userID as input and returns a
DataSet object containing user information. If the userID is not between the values 1 and 1000, a
System Argument Exception is thrown. In CompanyWebApp, you write a try/catch block to
capture any exceptions that are thrown by User Service. You invoke RetrieveUserInfo and pass
1001 as the user ID.
Which type of exception will be caught?
A. System.ApplicationException
B. System.ArgumentException
C. System.Web.Service.Protocols.SoapException
D. System.Web.Service.Protocols.SoapHeaderException
545.
You are creating an XML Web service named ListBoxService. This service provides content,
such as states, countries, and geographical regions, for use in drop-down list boxes.
ListBoxService contains a Web method named RetrieveRegionsListBox. This method runs a
Dataset object that contains every geographical region in the world. RetrieveRegionsListBox calls
a Microsoft SQL Server database to load the Dataset object with region data. You want to
minimize the amount of time the method takes to return to the caller.
What should you do?
A. Use a stored procedure to return the datas.
B. Store each Dataset object by using the Session object.
C. Set the Buffer Response property of the Web Method attribute to false.
D. Set the Cache Duration property of the Web Method attribute to an interval greater than zero.
546.
Suppose Company Ltd. receives product information from manufactures in the form of an XML documents.
The product information is stored in a Microsoft SQL Server database. The format of each XML
document varies. Each one is located in a MemoryStream object named newProds. You create a
merge procedure that reads data and schema information in a Dataset object and merges the
information into your database. You now need to write code to transfer the XML document and its
schema into a Dataset object.
Which code segment should you use?
A. Dataset products = new Dataset("prodInfo");
XmlTextReader reader = new XmlTextReader(newProds);
XmlValidatingReader validReader = new
XmlValidatingReader(reader);
while (validReader.Read()) { products.WriteXml(validReader.Value);}
B. Dataset products = new Dataset("prodInfo");
products.ReadXml(newProds);
C. Dataset products = new Dataset("prodInfo");
XmlDataDocument document = new XmlDataDocument(products);
D. document.DataSet.ReadXmlSchema(newProds);
Dataset products = new Dataset("prodInfo");
string myXmlData = Encoding.UTF8.GetString(newProds.ToArrary());
SqlDataAdapter adapter = new SqlDataAdapter("LoadSchemaType=XML",myXmlData);
adapter.
Fill(products)
547.
Suppose You create an XML Web service named Time ESService. Each time ESService is started, it
checks for the existence of an event log named Time ESServiceLog. If TimeServiceLog does not
exist, Time ESService creates it. You discover that when Time ESService creates Time
ESServiceLog, it throws a System.Security.SecurityException. The exception includes the
following message: "Requested registry access is not allowed". You need to resolve this problem.
What should you do?
A. Configure Inetinfo.exe to run as the local administrator user account.
B. Create an installer for Time ESService, and create the new event log in the installer code.
C. Modify the Web.config file by adding an identity element to impersonate the LOGON user
specified by Internet Information Services (IIS).
D. Modify the permissions of the
KEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesEventlog registry key to give
full control to the IUSR_computername user account.
548.
Suppose You have a .NET Remoting object named ES ProductLoader. The ES ProductLoader class is a
server-activated Singleton object.
The ES ProductLoader class loads product data into a Microsoft SQL Server database. The Load
method of the ES ProductLoader class is a time-consuming method to call. You are developing a
client application that uses the ES ProductLoader class. You want to ensure that the client
application can continue to respond to user input while the Load method of the ES ProductLoader
class is called.
What should you do?
A. Use an AsyncDelegate instance to call the Load method.
B. Modify the ES ProductLoader class to be derived from IAsyncResult.
C. Configure the ES ProductLoader class to be a client-activated .NET Remoting object.
D. Configure the client application to have its own remoting channel that matches the servers
channel and formatter.
549.
Suppose You are planning to create a Dataset object named ES DataSet to be used in a bond-trading
application. Several developers will need to write code to manipulate myDataSet, and you want to
ensure that ES DataSet is easy for them to use. You decide to create ES DataSet as a strongly
typed data set. Which two actions should you take? (Each correct answer presents part of the
solution. Choose two)
A. Create an XSD schema that defines ES DataSet.
B. Create an XDR schema that defines ES DataSet.
C. Create a class for ES DataSet that is based on the schema and that inherits from the Dataset
class.
D. Create a class for ES DataSet that is based on the schema and that inherits from the
XmlSchema class.
E. Create a key pair for ES DataSet by using the Strong Name tool (Sn.exe).
550.
Suppose You create a serviced component named Session Dispenser. This computer is in the
Company.Utilities assembly and is registered in a COM+ server application. Session Dispenser
has multiple callers. You discover that there are logic problems in the Create New Session
method. You want to debug any calls to this method. What should you do?
A. Open the Session Dispenser solution.
Set a breakpoint on the Create New Session method.
Start the debugger.
B. Attach the debugger to the client process.
Set a breakpoint on the SessionDispenser.CreateNewSession method.
C. Attach the debugger to the Company.Utilites.exe process.
Set a breakpoint on the Create New Session method.
D. Attach the debugger to a Dllhost.exe process.
Set a breakpoint on the Create New Session method.
551.
Suppose You create an XML Web service named Postal Code. Your project source includes a codebehind
file and a file named PostalCode.asmx. During implementation, you use the Debug class to
record debugging log messages, to verify values, and to report debugging failures. You want to
deploy Postal Code to a production computer. You do not want any of the debugging code to
execute on the production computer. What should you do?
A. Set the projects active configuration to Release and rebuild the DLL.
B. Modify the trace element of the Web.config file by setting the enabled attribute to "false".
C. Modify the compilation element of the Web.config file by setting the debug attribute to "false".
D. Add code to the constructor of the Postal Code class to set the Auto Flash property of the
Debug class to false.
E. Add code to the constructor of the Postal Code class to call the Clear method of the
Debug.Listeners property.
552.
Suppose You create a .NET Remoting object named Patient info that exposes medical patient information.
Because of the confidential nature of the information, you must ensure that the data remains
secure. You want client applications to connect to Patient info over a secure communication
channel. You want to accomplish this task by writing the minimum amount of code.
What should you do?
A. Create your own host application and use a Tcp Channel and Binary Formatter.
B. Create your own host application and use an Http Channel and a Soap Formatter.
C. Install Patient info in an Internet Information Services (IIS) virtual directory.
Configure Patient info to use a Tcp Channel and a Binary Formatter.
Configure IIS to use SSL.
D. Install Patient info in an Internet Information Services (IIS) virtual directory.
Configure Patient info to use an Http Channel and a Soap Formatter.
Configure IIS to use SSL.
553.
You have a DataSet object named loanCustomersDataSet that contains customers serviced by
the loan department of ExamSlink Inc. You receive a second DataSet object named
assetCustomersDataSet that contains customers serviced by the asset management department
of your company. Both objects have the same structure. You want to merge
assetCustomersDataSet into loanCustomersDataSet and preserve the original values in
loanCustomersDataSet.
Which code segment should you use?
A. loanCustomersDataSet.Merge(assetCustomersDataSet);
B. loanCustomersDataSet.Merge(assetCustomersDataSet, true);
C. assetCustomersDataSet.Merge(loanCustomersDataSet);
D. assetCustomersDataSet.Merge(loanCustomersDataSet, true);
554.
Suppose You are developing an application named ExamSApp by using Visual C# .NET and Visual Basic
.NET. The application will use functions form a DLL written in unmanaged code. One function
requires the calling application to allocate unmanaged memory, fill it with data, and pass the
address of the memory to the function. On returning from the function, the calling application must
deallocate the unmanaged memory.
You need to decide how your application will handle unmanaged memory.
What should you do?
A. Use a byte array.
B. Use the methods of the Marshal class.
C. Use the methods of the MemoryStream class.
D. Derive a new class from the Stream class, and override the allocation methods.
555.
Suppose You create three Windows services named ES1, ES2, and ES3. You want to install all three
services on a computer named CompanyA by using the Installer tool (Installutil.exe).
On the command line of CompanyA, you enter and run the following command: Install util ES1
ES2 ES3
During the installation process, ES3 throws an installation error. The installation process
completes.
How many of the three services are now installed on CompanyA?
A. None
B. One
C. Two
D. Three
556.
Suppose You have a Dataset object named ES DataSet that is populated with data from a Microsoft SQL
Server database. This object contains insertions, deletions, and updates to the data. You want to
apply the data changes in ES DataSet to the database. You decide to use the Sulligent data
provider. You need to create a data object that you will use to update the database. Which code
segment should you use?
A. SqlDataReader myDataReader;
B. SqlDataAdapter mySqlDataAdapter = new sqlDataAdapter();
C. DataObject myDataObject = new DataObject();
D. SqlParameter myParameter = new SqlParameter();
557.
Suppose You develop an ASP.NET Web application
for Company?s intranet. The application accesses data that is stored in a Microsoft SQL Server
database. The application authenticates users by using Windows authentication, and it has
impersonation enabled. You configure database object permissions based on the identity of the
user of the application. You need to provide the user?s identity to the SQL Server database. What
should you do?
A. Connect to the database by using the following connection string
?Persists Security Info=False;Integrated Security=SSPI;
database=ApplicationDB;server=DataServer;?
B. Connect to the database by using the following connection string
?User ID=ASPNET;Persist Security Info=False;Integrated Security=False;
database=ApplicationDB;server=DataServer;?
C. Develop a serviced component that wraps all database operations.
Use COM+ role-based security to restrict access to database operations based on user
identity.
D. Disable impersonation.
558.
Suppose You are an application developer for your company. You develop library assemblies that are
called by your main applications. These library assemblies access confidential data in the
applications. To ensure that this data is not accessed in an unauthorized and unsafe manner,
users must not be allowed to call the library assemblies from their own applications. You apply a
strong name to all assemblies to support versioning. You need to prevent users from writing
managed applications that make calls to your library assemblies. You need to achieve this goal
while minimizing the impact on response times for applications. What should you do?
A. Use the internal access modifier to declare all classes and structs in each library.
B. Use the protected internal access modifier to declare all classes and structs in each library.
C. Add the following attribute to each class and struct in each library assembly.

D. Add the following attribute to each class and struct in each library assembly.
559.
Suppose You are an application developer for Company.com. You are developing an application that can
be extended by using custom components. The application uses reflection to dynamically load
and invoke these custom components. In some cases, custom components will originate from a
source that is not fully trusted, such as the Internet.
You need to programmatically restrict the code access security policy under which custom
components run so that custom components do not run with an elevated permission grant.
What are two possible ways to achieve this goal? (Each correct answer presents a complete
solution. Choose two)
A. Create a new application domain and set the security policy level. Run custom components in
this application domain.
B. Use permission class operations to modify the security policy.
C. Implement custom permission classes to protect custom component resources.
D. Programmatically modify the machine-level security policy file after loading a custom
component.
560.
Suppose You are
developing an ASP.NET Web application that users in the accounting department will use to
process payroll reports and view payroll reports. The application will use Integrated Windows
authentication to authenticate all users. Because payroll data is confidential only users in the
accounting department will be granted access to the application. All employees in the accounting
department belong to a specific Active Directory group. However, users in the IT department can
add themselves to various Active Directory groups in order to troubleshoot resource access
problems. These IT department users must not be granted access to the ASP.NET Web
application. The following rules can be used to distinguish between users in the accounting
department and users in the IT department:
? All users in the accounting department are members of a group named CompanyAccounting.
? Some users in the IT department are members of the CompanyAccounting group.
All users in the IT department are members of a group named CompanyDomain Admin.
?
? No users in the accounting department are members of the CompanyDomain Admin group.
You need to configure URL authorization for the application by adding an
element to the Web.config file in the application root. Which element should you use?
A.




B.




C.




D.



561.
Suppose You develop an ASP.NET Web application
that writes to an event log named EventLog1. All managers in Company will run this application.
During a exam on a manager?s client computer, the application fails in the following code
segment. (Line numbers are includes for reference only.)
1. Dim EventLog1 As New EventLog
2. If Not EventLog.SourceExists(?CompanyWebApp?) Then
3. EventLog.CreateEventSource(?CompanyWebApp?, ?Application?)
4. End If
5. EventLog1.Source = ?CompanyWebApp?
6. EventLog1.WriteEntry(?The event occurred.?)
You need to ensure that event data is written to EventLog1. You want to achieve this goal without
granting unnecessary permissions.
What should you do?
A. Insert the following code into the application.
Dim eventLogDir As String
eventLogDir = ?C:%windir?system32configAppEvent.Evt?
Dim FilePermission As _
New FileOPermission(FileIOPermissionAccess.AllAcces, eventLogDir)
FilePermission.Assert()
B. Replace line 6 of the code segment with the following line of code.
EventLog1.WriteEntry(?The event occurred?,?EventLogWriter?)
C. Grant the managers the Full Control permission for the event log file.
D. Add the aspnet_wp account to the Administrators group.
E. Create the event log source in the installer class of the application.
562.
Suppose You create an ASP.NET Web application
that all authenticated network users will access. The authentication mode in the Web.config file is
currently set to None. Due to recent security threats, the network administrator requires that all
connections to the application?s Web server use the network credentials of the authenticated
user. You need to configure the application to use the network credentials of the authenticated
user as HTTPContext.Current.User. Which action or actions should you perform? (Choose all that
apply)
A. Ask the network administrator to configure the IIS directory security to Anonymous
authentication.
B. Ask the network administrator to configure the IIS directory security to Integrated Windows
authentication.
C. Set the authentication mode in the Web.config file to Forms.
D. Set the authentication mode in the Web.config file to Windows.
E. Set the impersonation attribute of the identity element in the Web.config file to true.
563.
Users who are temporary employees are
members of a group named TemporaryEmployees. You develop a serviced component named
CompanyComponent. CompanyComponent is part of a COM+ application named MyApplication.
CompanyComponent is secured by using the SecurityRole attribute for the Employees role. You
need to ensure that members of the TemporaryEmployees group are assigned to the Employees
role. You decide to add the TemporaryEmployees group to the existing Employees role. Which
tool should you use?
A. The code Access Security Policy tool.
B. The Permission View tool.
C. The Component Services tool.
D. The Secutil tool.
E. The Microsoft .NET Framework Configuration tool.
564.
Suppose You develop a Windows Forms application
that connects to a local Microsoft SQL Server database by using the Microsoft .NET Framework
Data Provider for SQL Server. The application currently connects to the database by using an
account that is a member of the System Administrator role in SQL Server. You need to ensure
that the application can connect to the database by using the user account of the interactive user
without providing additional permissions. What should you do?
A. Modify the application to activate a SQL Server application role.
B. Modify the application to use SQL Server integrated security.
C. Modify the application to send a security token that contains the authentication information in a
Kerberos ticket.
D. Modify the application to use a COM+ security roles.
565.
Suppose You are developing an application that will
be used both by company users and by contractors. Contractors will install the application on
their own portable computers. A written company policy prohibits contractors from easily
accessing or reviewing the source code of company applications. The file servers that contain the
source code for the application are configured so that only company software developers have
access. You need to ensure that the contractors cannot easily access the application source
code. What should you do?
A. Run Dotfuctaor Community Edition on each of the application assemblies.
B. Apply a strong name to each of the application assemblies.
C. Run the Code Access Security Policy tool for each of the application assemblies before
distributing the application.
D. Use Encrypting File System (EFS) to encrypt the compiled application assemblies.
566.
Suppose You create a Web Forms application to track
employee expense report information. Information is entered by each user and stored in a
Microsoft SQL Server database. The application uses Integrated Windows authentication with
impersonation enabled to communicate with the database. All users are assigned to the
DataReader role and the DataWriter role in SQL Server.
The employee expense report form contains client-side validation scripts and additional server
controls. This form is ViewState enabled. All employee expense reports must be approved by the
accounting department by using a separate form in the application before payment is made.
You need to unit exam the security of the application.
What should you do?
A. Copy the ViewState information to a text file and attempt to decrypt it.
B. Exam the application from the hosting computer and from the client computers.
C. Create your own page that mimics the approved page and submit that page to the server.
D. Sign on as a user in the accounting department and verify that you can approve expense
reports.
567.
Suppose You are an application developer for your company. You are conducting a code review of a
Windows Forms application that was developed by another developer. The application
includes a function named Logon(), which validates a users logon credentials. The function
displays a dialog box for the user to enter the users credentials, and the function validates those
credentials by using a database.
The function returns a value of 0 if the users password is incorrect, a value of 1 if the users user
ID is incorrect, and a value of 2 if both are correct. Users should receive access to the application
only if the function returns a value of 2. A function named EndApp() is used to exit the application.
The application must display a message to the user, depending on the result of the Logon()
function.
The application contains the following code segment.
int logonresult = Logon();
switch(logonresult) {
case 0:
MessageBox.Show("User name is OK, password incorrect.");
break;
case 1:
MessageBox.Show("User name is incorrect.");
break;
default:
MessageBox.Show("Welcome!");
break;
}
if(logonresult != 2) {
EndApp();
}
You need to improve the security of this code segment while maintaining its funtionality. You
decide to replace the existing code segment.
Which code segment should you use?
A. if(Logon() != 2) {
Console.WriteLine("Logon error.");
EndApp();
}
B. if(Logon() != 2) {
Console.WriteLine("Logon error.");
EndApp();
}
else {
MessageBox.Show("Welcome!");
}
C. int logonresult = Logon();
switch(logonresult) {
case 0:
MessageBox.Show("User name is OK, password incorrect.");
EndApp();
break;
case 1:
MessageBox.Show("User name is incorrect.");
EndApp();
break;
default:
MessageBox.Show("Welcome!");
break;
}
D. int logonresult = Logon();
if(logonresult == 2) {
MessageBox.Show("Welcome!");
}
else {
MessageBox.Show("User name or password was incorrect.");
EndApp();
}
568.
How to prevent malicious code from running, a
written company policy does not permit developers to log on by using accounts that have more
permissions than necessary.
Your user account is a member of the Users group and the VS Developers group. You attempt to
run an application that requires Administrator-level permissions. You receive an error message
that states that permission is denied.
You need to be able to run the application.
What should you do?
A. Ask the network administrator to add your user account to the domain Administrators group.
B. Ask the administrator of your client computer to add your user account to the local
Administrators group.
C. Add the administrator of your client computer to add your user account to the Power Users
group.
D. Run the application by using the runas command and specify a user account in the local
Administrators group.
569.
Suppose You develop an application that customers
will be able to automate by using Microsoft Visual Basic for Applications (VBA) scripts. The
application will be accompanied by sample VBA scripts. Customers must be able to review the
sample VBA scripts. You want customers to be able to automate the installed application by using
any of the sample VBA scripts or by creating their own automation scripts. You also want to allow
customers to choose not to apply any automation scripts.
You need to distribute the sample VBA scripts with your application in a manner that minimizes
security risks for the customer.
What should you do?
A. On installation, place all the sample VBA scripts in a subfolder of the application?s installation
folder.
B. On installation, as the user to choose one sample VBA script to install as the application?s
automation script.
C. Do not install the same VBA scripts.
Leave the files in a folder on the installation media.
D. Encrypt same VBA scripts on the installation media and decrypt the files during installation.
570.
Suppose You are an application developer for your company. You are developing a Windows Forms
application. You deploy a supporting assembly named MyAssembly.dll to the global assembly
cache. During testing, you discover that the application is prevented from accessing
MyAssembly.dll.
You need to ensure that the application can access MyAssembly.dll.
What should you do?
A. Digitally sign the application by using a digital certificate.
B. Run the caspol.exe -s on command from the command line.
C. Run the Assembly Linker to link MyAssembly.dll to the application.
D. Modify the security policy to grant the application the FullTrust permission.
571.
Suppose You are developing an application that will
be used by members of three domain user groups in your company. The user groups are named
CompanySales, CompanyMarketing, and AccountManagement. Each of the three user groups
will have different permission within the application.
You log on to your development computer by using a domain user account that is a member of
only the Domain Users and the Developers domain user groups. On your development computer,
you user account is a member of only the local Users group.
When you finish developing the application, you need to ensure that the application runs correctly
before you send the application to the company?s internal software examing department.
How should you exam the application?
A. Select one user from each of the three user groups that will run the application.
Deploy the application to the client computer of each of these three users.
Exam the application on each of the computers.
B. Deploy the application to a client computer.
Ask a domain administrator to place the computer?s domain account into all three of the user
groups that will run the application.
Exam the application on the client computer.
C. Ask a domain administrator to create a domain user account for examing.
Place the account in each of the three user groups that will run the application.
Exam the application, logging on to your computer by using the exam domain user account.
D. Ask a domain administrator to create three domain user accounts for examing.
Place one account in each of the three user groups that will run the application.
Exam the application three times, logging on to your computer by using a different exam
domain user account for each exam.
572.
You create an ASP.NET Web application
that all authenticated network users will access. The authentication mode in the Web.config file is
currently set to None. Due to recent security threats, the network administrator requires that all
connections to the application?s Web server use the network credentials of the authenticated
user.
You need to configure the application to use the network credentials of the authenticated user as
HTTPContext.Current.User.
Which action or actions should you perform? (Choose all that apply)
A. Ask the network administrator to configure the IIS directory security to Anonymous
authentication.
B. Ask the network administrator to configure the IIS directory security to Integrated Windows
authentication.
C. Set the authentication mode in the Web.config file to Forms.
D. Set the authentication mode in the Web.config file to Windows.
E. Set the impersonation attribute of the identity element in the Web.config file to true.
573.
Suppose Each client computer in Company runs
either Microsoft Windows XP Professional or Windows 98. You are developing an application that
will be used by all users in Company.
Users log on to their client computers by using a domain user account that is a member of the
local Power Users group and the user?s computer. You log on to your Windows XP Professional
computer by using a domain user account that is a member of the local Administrators group and
Power Users group on your computer.
When examing your application, you need to ensure that your exams accurately reflect the
production environment in which the application will run.
How should you exam the application?
A. Ask a domain administrator to temporarily remove your domain user account from the local
Administrators group on your computer while you are examing the application.
B. Exam the application on your computer.
When examing, log on to the computer by using a domain user account that is a member of
only the local Power Users group on your computer.
C. Deploy the application to a Windows XP Professional computer and a Windows 98 computer.
Log on to each computer by using a domain user account that is a member of only the local
Power Users group.
D. Compile the assemblies of the application from the command line by running the runas
command and specifying a domain user account that is a member of only the local Power
Users group on your computer.
574.
Suppose You are developing a three-tier application.
You enter sample data to exam the application. The following exception is caught by the data
layer before the application continues to run. Cannot set column ?Column1? to ?Text too long for
maximum length?. The value violates the MaxLength limit of this column.
You need to improve the security of the application. Which two actions should you perform?
(Each correct answer presents part of the solution. Choose two)
A. Increase the maximum length of data characters allowed in the column.
B. Validate all incoming data character lengths at the business layer.
C. Modify the data layer to process data above the maximum length.
D. Modify the user interface to prevent users from entering data above the maximum character
length.
575.
Suppose You are an application developer for Company.com. You develop a Windows Forms application
that connects to a local Microsoft SQL Server database by using the Microsoft .NET Framework
Data Provider for SQL Server. The application currently connects to the database by using an
account that is a member of the System Administrator role in SQL Server.
You need to ensure that the application can connect to the database by using the user account of
the interactive user without providing additional permissions.
What should you do?
A. Modify the application to activate a SQL Server application role.
B. Modify the application to use SQL Server integrated security.
C. Modify the application to send a security token that contains the authentication information in a
Kerberos ticket.
D. Modify the application to use a COM+ security roles.
576.
Suppose A. Create a new application domain and set the security policy level. Run custom components in
this application domain.
B. Use permission class operations to modify the security policy.
577.
Users who are temporary employees are
members of a group named TemporaryEmployees. You develop a serviced component named
CompanyComponent. CompanyComponent is part of a COM+ application named MyApplication.
CompanyComponent is secured by using the SecurityRole attribute for the Employees role.
You need to ensure that members of the TemporaryEmployees group are assigned to the
Employees role.
You decide to add the TemporaryEmployees group to the existing Employees role.
Which tool should you use?
A. The code Access Security Policy tool.
B. The Permission View tool.
C. The Component Services tool.
D. The Secutil tool.
E. The Microsoft .NET Framework Configuration tool.
578.
You are developing an application that will
be used both by company users and by contractors. Contractors will install the application on
their own portable computers. A written company policy prohibits contractors from easily
accessing or reviewing the source code of company applications. The file servers that contain the
source code for the application are configured so that only company software developers have
access.
You need to ensure that the contractors cannot easily access the application source code.
What should you do?
A. Run Dotfuctaor Community Edition on each of the application assemblies.
B. Apply a strong name to each of the application assemblies.
C. Run the Code Access Security Policy tool for each of the application assemblies before
distributing the application.
D. Use Encrypting File System (EFS) to encrypt the compiled application assemblies.
579.
Suppose You are developing a Windows-based
payroll application that will be used by all payroll administrators in the company. The application
has a single executable file that uses a separate assembly to modify payroll data.
You need to design security for your application to ensure that the assembly cannot be called by
unauthenticated and unauthorized users.
What should you do?
A. Run the application by using a user account that has access to the application directory.
B. Modify the application to validate all user-entered data.
C. Modify the application to authenticate and authorize user access within each assembly as it is
called.
D. Modify the application to authenticate and authorize user access when each user runs the
executable file.
E. Set the folder-level permissions to the executable file by using directory security.