C# .NET XML Web Services
1. You have created an ASP.NET application using .NET Remoting objects and Serviced Components. You are allowing anonymous authentication on your IIS server. You have configured your application's web.config file with the identity element set to.
What account will ASP.NET use when a user accesses the application?
A. The IUSR_ComputerName account
B. The user's Windows account
C. The ASPNET account
D. The local SYSTEM account
>> !
-
- Answer: A
When impersonation is enabled and anonymous authentication is allowed, then the IUSR_ComputerName account is the account that is used by ASP.NET to access the resources of the application.
When impersonation is enabled and Windows authentication is selected, then the user's Windows account is used by ASP.NET to access the resources of the application. The correct account for this setting is IUSR_ComputerName.
When impersonation is not enabled, then the ASPNET account is used by ASP.NET to access the resources of the application. This account is a special unprivileged account that is used by default.
The SYSTEM account is a high privileged account that can be used by ASP.NET if you configure the machine.config file to set the userName attribute of the element to SYSTEM.
2. You have created an ASP.NET application using .NET Remoting objects and Serviced Components. You are allowing Windows Integrated Authentication on your IIS server. You have configured your application's web.config file with the identity element set to.
What account will ASP.NET use when a user accesses the application?
A. The IUSR_ComputerName account
B. The user's Windows account
C. The ASPNET account
D. The local SYSTEM account
>> !
-
- Answer: B
When impersonation is enabled and Windows Authentication is selected then the user's Windows account is used by ASP.NET to access the resources of the application.
When impersonation is enabled and anonymous authentication is allowed, then the IUSR_ComputerName account is the account that is used by ASP.NET to access the resources of the application. The correct account for this setting is the user's Windows account.
When impersonation is not enabled, then the ASPNET account is used by ASP.NET to access the resources of the application. This account is a special unprivileged account that is used by default.
The SYSTEM account is a high privileged account that can be used by ASP.NET if you configure the machine.config file to set the userName attribute of the element to SYSTEM.
3. You have created an ASP.NET application using .NET Remoting objects and Serviced Components. You have enabled impersonation and you are using Windows integrated authentication in IIS. You have configured the web.config file as follows:
name="DEPT4302\CBrown"
password="Snoopy"/>
What account will ASP.NET use when any user accesses the application?
A. The IUSR_ComputerName account
B. The user's Windows account
C. The ASPNET account
D. The DEPT4302/CBrown account
>> !
-
- Answer: D
When impersonation is enabled you can specify a user name and password that will be used to access the application's resource regardless of the user currently authenticated by IIS.
When impersonation is enabled and anonymous authentication is allowed, then the IUSR_ComputerName account is the account that is used by ASP.NET to access the resources of the application. The correct account for this setting is the DEPT4302/CBrown account.
When impersonation is enabled and Windows Authentication is selected, then the user's Windows account is used by ASP.NET to access the resources of the application.
When impersonation is not enabled, then the ASPNET account is used by ASP.NET to access the resources of the application. This account is a special unprivileged account that is used by default.
4. You have created an ASP.NET application using .NET Remoting objects and Serviced Components. You reconfigured the machine.config file so that the userName attribute of the element is set to SYSTEM, and the password attribute is set to AutoGenerate. You have rebooted the server after making these changes.
What account will ASP.NET use when a user accesses the application?
A. The IUSR_ComputerName
B. The user's Windows account
C. The ASPNET account
D. The local SYSTEM account
>> !
-
- Answer: D
The SYSTEM account is a high privileged account that can be used by ASP.NET if you configure the machine.config file to set the userName attribute of the element to SYSTEM.
When impersonation is enabled, and anonymous authentication is allowed, then the IUSR_ComputerName account is the account that is used by ASP.NET to access the resources of the application.
When impersonation is enabled, and Windows Authentication is selected, then the user's Windows account is used by ASP.NET to access the resources of the application.
When impersonation is not enabled, then the ASPNET account is used by ASP.NET to access the resources of the application. This account is a special unprivileged account that is used by default.
5. You have created an ASP.NET application using .NET Remoting objects and Serviced Components. You have left the Internet Information Server (IIS) configured at the default impersonation level, which is disabled.
What account will ASP.NET use when a user accesses the application?
A. The IUSR_ComputerName account
B. The user's Windows account
C. The ASPNET account
D. The local SYSTEM account
>> !
-
- Answer: C
When impersonation is not enabled, then the ASPNET account is used by ASP.NET to access the resources of the application. This account is a special unprivileged account that is used by default.
When impersonation is enabled, and anonymous authentication is allowed, then the IUSR_ComputerName account is the account that is used by ASP.NET to access the resources of the application.
When impersonation is enabled, and Windows Authentication is selected, then the user's Windows account is used by ASP.NET to access the resources of the application.
The SYSTEM account is a high privileged account that can be used by ASP.NET if you configure the machine.config file to set the userName attribute of the element to SYSTEM.
6. You are a developer for a software company that provides components that control telemarketing communications equipment. Your company has developed a new solution and you are working on the drivers. You want to sign an assembly named TeleComDrv.dll for testing purposes. You do not have the final key pair that your company will use to ship the component.
Which commandline using the sn.exe tool will allow you to do this?
A. sn.exe -Vr TeleComDrv.dll
B. sn.exe -Vu TeleComDrv.dll
C. sn.exe -Vl TeleComDrv.dll
D. sn.exe -vf TeleComDrv.dll
>> !
-
- Answer: A
The -Vr switch tells the strong name tool to register the assembly with verification skipping turned on. This will enable you to install the assembly into the GAC without using the public/private key pair for your company.
The -Vu switch tells the strong name tool to unregister the assembly with verification skipping turned on.
The -Vl switch tells the strong name tool to list the current settings verification for the assembly.
The -vf switch tells the strong name tool to verify the strong name for the assembly.
7. You have created an application using the .NET Framework. You want to control the application's ability to access certain resources during execution.
Which .NET security feature should you use?
A. Code Access security
B. Role-Based security
C. Authentication
D. Type Safety
>> !
-
- Answer: A
Code Access security allows the execution of an application depending on where the code calls from and other information contained in metadata about the code.
Role-Based security allows applications access to data or resources based on role or responsibility of the user. The correct .NET security feature for this application is Code Access security.
Authentication security examines the user's credentials and validates them prior to giving access to information or a resource.
Type safety code can only read memory locations it has permission to access. Type safety code cannot read information in areas where it does not have permission or scope.
8. You have created an application using the .NET Framework. You want to control the user's ability to access certain functionality during execution based on the department or function that they work in.
Which .NET security feature should you use?
A. Code Access security
B. Role-Based security
C. Authentication
D. Type Safety
>> !
-
- Answer: B
Role-Based security allows applications access to data or resources based on role or responsibility of the user.
Code Access security allows the execution of an application depending on where the code calls from and other information contained in metadata about the code.
Authentication security examines the user's credentials and validates them prior to giving access to information or a resource.
Type safety code can only read memory locations it has permission to access. Type safety code cannot read information in areas where it does not have permission or scope.
9. You have created an application using the .NET Framework. You want to control the user's ability to access certain functionality or information during execution.
Which .NET security feature should you use?
A. Code Access security
B. Role-Based security
C. Authentication
D. Type Safety
>> !
-
- Answer: C
Authentication security examines the user's credentials and validates them prior to giving access to information or a resource.
Code Access security allows the execution of an application depending on where the code calls from and other information contained in metadata about the code.
Role-Based security allows applications access to data or resources based on role or responsibility of the user.
Type safety code can only read memory locations it has permission to access. Type safe code cannot read information in areas where it does not have permission or scope.
10. You have created an application using the .NET Framework. You want to make sure that the code only accesses the memory and variable information that it is allowed to access.
Which .NET security feature should you use?
A. Code Access security
B. Role-Based security
C. Authentication
D. Type Safety
>> !
-
- Answer: D
Type safety code can only read memory locations it has permission to access. Type safe code cannot read information in areas where it does not have permission or scope.
Code Access security allows the execution of an application depending on where the code calls from and other information contained in metadata about the code.
Role-Based security allows applications access to data or resources based on role or responsibility of the user.
Authentication security examines the user's credentials and validates them prior to giving access to information or a resource.
11. Your company is using XML web services to provide information to other departments. As one of the company's internal web developers, your job is to know what XML web services are available internally and how you will be able to use them in your application projects.
What tool would you use to discover the existing XML web services in your company?
A. Use the UDDI registry to locate all active XML web services in your company
B. Send email to all of the departments asking for the URLs to their XML web services
C. Perform a search on your corporate network for any file named *.wsdl
D. Use the Disco.exe tool to search provided URLs for XML web services
>> !
-
- Answer: D
The disco.exe tool from the .NET Framework SDK allows you to discover the necessary information about an XML web service so that you are able to create a web reference to the service from your client application.
The UDDI registry is a directory of XML web services that is published on the Internet. These web services usually provide information for the company that is mission critical and rarely exposes internal web services. This is not the appropriate location for internal web services to be registered.
While sending email may be helpful in gaining access to the various URLs in the company, it is only part of the solution. Once you have the URL you still need to get the appropriate information about the XML web service that will allow you to add a web reference to your client application. The disco.exe tool allows you do this.
While searching for *.wsdl files may be helpful in finding potential XML web services in the company, it is only part of the solution. You still need the URL to get the appropriate information about the XML web service that will allow you to add a web reference to your client application. The disco.exe tool allows you do this.
12. As a web developer of your company, you have been asked to create a stock ticker control that can be added to various web sites in the company. You would like to be able to use an XML web service that will provide you the data stream of the stock information.
How do you find an existing XML web service that will provide you with the stock information?
A. Visit web sites of stock quote service companies and see if they have any services available
B. Use the UDDI registry to find any available stock quoting XML web services
C. Use the disco.exe tool to find any available stock quoting XML web services
D. Ask your manager if they know of any XML web services that provide this information
>> !
-
- Answer: B
The UDDI registry is like an XML web service "yellow pages" that can provide you information about XML web services that exist and what kind of information they will provide you. Once the XML web service is located, you can use the provided information to link your client application to the XML web service.
Visiting web sites would be a very difficult way to find an XML web service. It is also possible that even though a company may provide such an XML web service, it would not be publicized on the web site. The better solution would be to use the UDDI registry to search for an appropriate XML web service.
You could potentially use the disco.exe tool to get the information about a known XML web service, but you would still need to know the URL in order to locate the necessary files. The better solution would be to use the UDDI registry to search for an appropriate XML web service.
Getting help from your manager is only effective if your manager has memorized the Internet! The better solution would be to use the UDDI registry to search for an appropriate XML web service.
13. You are the developer of a Windows service for your company. You want to create the necessary classes in your service so that you can use the InstallUtil.exe tool to install your service on your users' computers.
What do you need to do in order to use the InstallUtil.exe tool with your service?
A. Add the ServiceInstaller class to the project
B. Create a setup project for the service's project
C. Select the Add Installer link in the service's Properties window
D. Nothing, the necessary classes are already in the project
>> !
-
- Answer: C
Selecting the Add Installer link in the service's properties window adds the classes needed to install the service to the project. You can then customize the Installer classes to conform to your service.
Adding the ServiceInstaller class is a requirement of using the InstallUtil.exe. However, you also need to add the ServiceProcessInstaller class as well.
A setup project is another method of deployment but this will create a Windows Installer application that will deploy the service. This does not use the InstallUtil.exe tool to add the service to the services database.
14. You are writing an XML web service to provide information about your company's sales figures that will be used internally to publish information about sales on a real time basis. You want to be able to publish some methods, like SalesByEmployee() and SalesByOrganization(), but not some methods, such as CalculateSales(), which are used to provide data for the exposed interfaces.
How do you make only certain methods visible via the XML web service? (Choose all that apply)
A. You can't. All XML web service methods are exposed via the web service
B. Add the <%@ WebService %> directive to the method declaration
C. Add the [WebMethod] attribute to the method declaration
D. Add the public attribute to the method declaration
>> !
-
- Answer: B & C
The [WebMethod] attribute is used to declare which methods are to be visible to the user of the XML web service. These will constitute your XML web service's "API" and will provide the interface to the information that the XML web service provides.
This is obviously not true. You can specify which XML web service methods to expose to the user of the XML web service by adding the [WebMethod] attribute to the declaration of the method.
The <%@ WebService %> directive is used to define an XML web service, not individual XML web service methods. You can specify which XML web service methods to expose to the user of the XML web service by adding the [WebMethod] attribute to the declaration of the method.
Using the public attribute in the method declaration does make the method available to the user of the XML web service. The public attribute is used to declare the scope and storage class of the method. You can specify which XML web service methods to expose to the user of the XML web service by adding the [WebMethod] attribute to the declaration of the method.
15. You are a developer for a large company. You have been asked to design an application that monitors email traffic for your email server and filter out spam so that your users do not have to deal with it. Your application will bounce back all spam as defined by your custom filters while allowing legitimate email into your email system. This application should run continuously with little to no interaction from your users.
What type of project would you use to create this application?
A. A Windows Forms project
B. A Windows Service project
C. A Web Forms project
D. A Web Service project
>> !
-
- Answer: B
A Windows Service is an application that runs without any user interface and will perform actions for the user. It normally runs either as a system account or under the credentials of a specified account.
A Windows Forms project would allow you to do the same function as a Windows Service account but would also have an associated user interface.
A Web Forms project would not provide the necessary functionality on your computer. A web forms project works with an IIS service over Internet protocols to perform some function.
A Web Service project creates a service that runs on a web server. Similar in function to a Windows Service, a Web service is only available when accessed by a web client application.
16. You are a developer for a small company. The program manager wants to create a new application using .NET technologies. He wants to implement a part of the application as a Windows Service but is unsure if this will work or not. He has assigned to you the task of investigating this technology and reporting to him whether it will meet the needs of that portion of the application. You determine that the best way to answer his question is telling him what a Windows Service can do.
Which is NOT a characteristic of a Windows Service?
A. Runs as a user or local system account that is typically different from the current user
B. Provides execution event information via the NT event log
C. Runs as a background process and performs a function for the system or an application
D. Uses a user interface for rich error reporting
>> !
-
- Answer: D
Windows Services do not have user interfaces. The reason for this is that they run in the background and could even be executed while there is not an interactive user logged in. If you need a user interface, you should create a Windows application.
Windows Services normally run as a local system account or as a user that differs from the current user. This is because oftimes the current user may not have rights that are needed by the service to run correctly.
Windows Services log event information about its execution into the NT event log as specified by the developer of the service. Since there is no UI, this allows the service to communicate information to the user.
Windows Services normally run as a background process and do not interact with the user. They provide valuable information or services for applications that may be running on the system that are invoked by the user.
17. You are a developer of a small company. The program manager wants to create a new application using .NET technologies. He wants to implement a part of the application as a serviced component but is unsure if this will work or not. He has assigned to you the task of investigating this technology and reporting to him whether it will meet the needs of that portion of the application. You determine that the best way to answer his question is telling him what a serviced component can do.
Which is NOT a characteristic of a serviced component?
A. A serviced component can be accessed by COM/COM+ objects
B. A serviced component runs as a windows service as a specific user
C. A serviced component is a .NET assembly that can use COM/COM+ services
D. A Serviced component must be registered with the COM+ catalog
>> !
-
- Answer: B
Serviced Components may run as a part of a Windows Service but do not specifically work like a Windows Service. Therefore, the component is called under the authentication of the logged in user but does not run as a specified user.
Serviced Components in the .NET Framework allow for interaction with COM/COM+ objects as well as can be accessed by COM/COM+ objects if they are prepared properly and registered in the COM+ Catalog.
Serviced Components are .NET Assemblies that can access COM+ services because they are registered in the COM+ catalog.
Registering the Serviced Component into the COM+ catalog is what allows an assembly derived from the System.EnterpriseServices.ServicedComponent class to work as a Serviced Component.
18. You are a developer of a small company. The program manager wants to create a new application using .NET technologies. He wants to implement a part of the application as a .NET Remoting object but is unsure if this will work or not. He has assigned to you the task of investigating this technology and reporting to him whether it will meet the needs of that portion of the application. You determine that the best way to answer his question is telling him what a .NET Remoting object can do.
Which is NOT a characteristic of a .NET Remoting Object?
A. A .NET Remoting objects contain the functionality necessary to control computers remotely
B. A .NET Remoting objects allow you to create distributed applications more easily
C. A .NET Remoting objects allow you to create objects that can be invoked remotely in other applications or processes
D. A .NET Remoting objects allow you to create objects that can be invoked on remote computers
>> !
-
- Answer: A
.NET Remoting objects do not contain functionality to control a computer remotely. The main purpose of .NET Remoting objects is to facilitate the creation of distributed applications.
.NET Remoting objects do allow you to create distributed applications more easily by providing functionality necessary to provide for security and remote activation of objects.
.NET Remoting objects can be invoked in other applications or processes if the object security allows for this. This allows programmers to breach the process boundary in a secure way.
.NET Remoting objects can be invoked on remote computers. This allows you to create distributed applications that can span a large and/or remote set of computers.
19. You are a developer for a small company. The program manager wants to create a new application using .NET technologies. He wants to implement a part of the application as a XML Web service but is unsure if this will work or not. He has assigned to you the task of investigating this technology and reporting to him whether it will meet the needs of that portion of the application. You determine that the best way to answer his question is telling him what a XML Web service can do.
Which is NOT a characteristic of a XML Web Service?
A. XML Web Services allow you to provide data to web client applications programmatically
B. XML Web Services are discoverable via UDDI
C. XML Web Services are web sites that provide dynamic information and web content
D. XML Web Services can be created with any .NET language
>> !
-
- Answer: C
XML Web Services do not provide a web site for users to browse. The information that a web service provides is delivered to the web client application via SOAP messages. It is up to the web client developer to create the necessary user interface.
XML Web Services provide information via exposed methods in a contractual way described by WSDL to web clients so that developers can access specialized data on the web for content.
XML Web Services are discoverable via UDDI. A web service developer can register his web service with the Universal Description, Discover and Integration service so that other developers can use his web service.
XML Web Services can be created with Managed Visual C++, C# and Visual Basic .NET.
20. You have created a serviced component for your application that will allow COM objects to access the code that you have replaced using .NET technologies. In order to complete the installation of the component you need to register it into the Global Assembly Cache (GAC).
What tool do you use to register the Serviced Component into the GAC?
A. GACUtil.exe
B. SN.exe
C. RegAsm.exe
D. Secutil.exe
>> !
-
- Answer: A
The GACUtil.exe tool is used to manage assemblies that are registered into the Global Assembly Cache.
The SN.exe tool is used to create strong name key pairs to be used to sign .NET assemblies. It is necessary to sign assemblies before using the GACUtil.exe tool to register them into the GAC.
The RegAsm.exe tool is used to add information to the assembly so that it can be used transparently from a COM object. You need to use the GACUtil.exe tool to register assemblies into the GAC.
The SecUtil.exe tool is used to manage strong name information in an assembly. You should use the GACUtil.exe tool to register assemblies into the GAC.
21. You are creating an XML Web Service that does credit card transactions. You would like to create a SOAP extension that validates that the incoming credit card number is in the proper format prior to passing it to the XML Web Service. The extension will run on the server, and when it discovers an improperly formatted card number, it will send an error message to the client application and terminate processing.
At what stage in the SOAP message processing should you invoke this functionality?
A. BeforeSerialize
B. AfterSerialize
C. BeforeDeserialize
D. AfterDeserialize
>> !
-
- Answer: C
The BeforeDeserialize stage occurs after a network request containing the SOAP message for an XML Web Service method call is received, but before the SOAP message is deserialized into an object. This is the correct time to validate the information.
You would want to do this validation prior to the call to the XML Web Service method. The BeforeSerialize stage occurs after the call to the XML Web Service method returns, but before the return value being serialized into XML is sent back to the client.
You would want to do this validation prior to the call to the XML Web Service method. The AfterSerialize stage occurs after an XML Web Service method returns and any return values are serialized into XML, but before the SOAP message is sent back to the client.
The AfterDeserialize stage occurs after a network request containing the SOAP message for an XML Web Service method call is deserialized into an object, but before the XML Web service method is called. You could also do it here, but that would be done in code and not as a SOAP extension.
22. You are creating an XML Web Service that does credit card transactions. You would like to create a SOAP extension that encrypts the outgoing credit card number prior to passing it to the client application to ensure security of the data.
At what stage in the SOAP message processing should you invoke this functionality?
A. BeforeSerialize
B. AfterSerialize
C. BeforeDeserialize
D. AfterDeserialize
>> !
-
- Answer: B
The AfterSerialize stage occurs after an XML Web Service method returns and any return values are serialized into XML, but before the SOAP message is sent back to the client. You could encrypt the credit card number here with out having to build encryption code into the XML Web Service.
The BeforeSerialize stage occurs after the call to the XML Web Service method returns, but before the return value being serialized into XML is sent back to the client. Doing it at this stage would require that encryption techniques would be part of the XML Web Service.
The BeforeDeserialize stage occurs after a network request containing the SOAP message for an XML Web Service method call is received, but before the SOAP message is deserialized into an object. Encrypting the credit card here would make it impossible for the XML Web Service to use the data. You would want to decrypt the credit card number at this time.
The AfterDeserialize stage occurs after a network request containing the SOAP message for an XML Web Service method call is deserialized into an object, but before the XML Web service method is called. Encrypting the credit card here would make it impossible for the XML Web Service to use the data. You would want to decrypt information that was incoming but still in SOAP format.
23. You are designing a capital equipment order processing system. This application is hosted on a server in the company's headquarters and is accessed by a large number of locations around the world. For security purposes, all of the remote locations have firewalls protecting their networks. Additionally, bandwidth in certain locations is small. You would like to use a channel and formatter combination that would allow you to connect without reconfiguring the firewalls and optimize communication speed.
Which of the following combination channel/formatter best meets your need?
A. HTTP channel/Binary formatter
B. HTTP channel/SOAP formatter
C. TCP channel/Binary formatter
D. TCP channel/SOAP formatter
>> !
-
- Answer: A
Since you are communicating through firewalls, HTTP would be the best choice as most firewalls allow HTTP communication without any additional configuration. Selecting the binary formatter allows for a compressed datastream so that you don't need a lot of bandwidth to communicate.
Since you are communicating through firewalls, HTTP would be the best choice as most firewalls allow HTTP communication without any additional configuration. Selecting the SOAP formatter, however, requires more data bandwidth because of the type and verbosity of the format. A better choice would have been HTTP channel/Binary formatter.
Since you are communicating through firewalls, TCP would not be a good choice because you may have to reconfigure firewalls to create ports. Selecting the binary formatter allows for a compressed datastream so that you don't need a lot of bandwidth to communicate. A better choice would have been HTTP channel/Binary formatter.
Since you are communicating through firewalls, TCP would not be a good choice because you may have to reconfigure firewalls to create ports. Selecting the SOAP formatter, however, requires more data bandwidth because of the type and verbosity of the format. A better choice would have been HTTP channel/Binary formatter.
24. You are designing a capital equipment order processing system. This application will run only at your company's headquarters which is located in Chicago, IL. All remote locations will use a web page to submit orders that then will be processed by your system. This application will be distributed throughout the company and will use .NET remoting objects for different parts of the applications in Accounting and other departments. This will allow the various departments' developers to make changes to their particular part without affecting the whole. You would like to use a channel and formatter combination that would allow you to connect at high rates of speed and also use a standard messaging format.
Which of the following combination channel/formatter best meets your need?
A. HTTP channel/Binary formatter
B. HTTP channel/SOAP formatter
C. TCP channel/Binary formatter
D. TCP channel/SOAP formatter
>> !
-
- Answer: D
Since you are communicating locally on a network, TCP allows communication to remote computers via the existing network protocols. Selecting the SOAP formatter allows for a standard message format that meets the needs of the application.
Since you are communicating locally on a network, HTTP would not be the best choice as it would require the use of IIS in the application. Selecting the binary formatter allows for a compressed datastream so that you don't need a lot of bandwidth to communicate, however the messaging format is not standard. A better choice would have been TCP channel/SOAP formatter.
Since you are communicating locally on a network, HTTP would not be the best choice as it would require the use of IIS in the application. Selecting the SOAP formatter allows for a standard message format that meets the needs of the application. A better choice would have been TCP channel/SOAP formatter.
Since you are communicating locally on a network, TCP allows communication to remote computers via the existing network protocols. Selecting the binary formatter allows for a compressed datastream so that you don't need a lot of bandwidth to communicate; however, the messaging format is not standard. A better choice would have been TCP channel/SOAP formatter.
25. You are the developer of an XML Web Service. You have made some additions to your XML Web Service. You have added new methods that provide additional functionality to your XML Web Service. Currently, any web client application that uses your service will not be able to access these new methods.
What do you need to tell developers to do in order for their client applications to use the new methods of your XML Web Service?
A. Inform them that they need to update their web reference to your XML Web Service.
B. Inform them that they need to make the same modifications to their client applications.
C. Inform them that they need to modify the .wsdl file for your XML Web Service.
D. Inform them to recompile their client applications.
>> !
-
- Answer: A
In order to make the client application work with the changes to the XML Web Service, it is necessary for the developers of the client applications to update the web reference to your XML Web Service. This will get a new .wsdl file that describes the new methods of the XML Web Service and create the necessary code in their applications that will work upon recompile.
It is neither necessary nor possible for the developers to make the changes to their client applications. Refreshing the web reference to your XML Web Service will update the source code of the client application with the necessary information.
It is not possible for the developers to accurately make the necessary changes to the .wsdl file in order for the new functionality to be available to them.
Recompiling the client application will not solve the problem unless you have a new copy of the .wsdl file that describes the new methods of the XML Web Service.
26. You are the developer of an XML Web Service that provides weather information for a region of the United States. The incoming traffic has been growing and you are having complaints from your users that their applications are running slow. You find that this is a result of all the calls to the XML Web Service being done synchronously. You feel that if you allow for asynchronous calls, it will improve the performance of the traffic overall.
How do you create an XML Web Service that allows asynchronous calls?
A. The XML Web Service must create callback methods that can send the information to the client application.
B. No additional work is necessary. The correct methods are built into the proxy .dll when the web reference is created.
C. Execution must be passed to a separate thread in the web service that will return data when available to the client applications.
D. Only synchronous calls are allowed in XML Web Services.
>> !
-
- Answer: B
Both Asynchronous and synchronous method calls are supported by XML Web Services. Asynchronous and synchronous method calls to the web service are created in the proxy class when the web reference is established.
Callback methods are normally placed into the client application and the reference to the method passed to the service. However, asynchronous calls are handled by methods created in proxy class when the web reference is established.
Asynchronous and synchronous method calls to the web service are created in the proxy class when the web reference is established. This allows the client to create a callback method and then pass that information to the XML Web Service to receive the data when available.
While you could create a multithreaded XML Web Service, this will not help with performance on the client side because the call to the XML Web Service would still be of a synchronous nature. The appropriate asynchronous method calls are created for you in a proxy class when you establish a link to the web reference.
27. You are the developer of a .NET application where you have some .NET Remoting objects that are activated when the client application makes a method call to the remote object. Design requirements state that a new instance of the .NET Remoting objects are to be created for each method call that a client makes. This will increase the scalability of the application.
How should the remotable object be hosted?
A. A server activated object using SingleCall activation.
B. A server activated object using Singleton activation.
C. A client activated object using the HTTP channel with SOAP formatter.
D. A client activated object using the TCP channel with binary formatter.
>> !
-
- Answer: A
A server activated object that uses SingleCall activation is the correct choice. This allows an instance of the .NET Remoting object to be activated when a client application makes a method call to the object. On the next method call, another instance will be created. Previous instances will be recycled by the CLR (Common Language Runtime).
A server activated object that uses Singleton activation is not correct. This activation model creates a single instance of the .NET Remoting object which is used by all clients in the application.
Using client activation, an instance of a remote object will service a particular reference in that particular client. It would not create another new instance for each method call. Moreover, this approach is not as scalable as server activated object using SingleCall activation.
28. You are the developer of a .NET Remotable object that is used in your inventory application. The object is responsible for doing searches on a database based on queries from a client application. The object does not have any user interface but it uses Integrated Windows Authentication to validate users. You would like to use existing technology to host the object and make it so you don't have to write a lot of code.
How would you host the .NET Remotable object?
A. Host the object via Internet Information Services
B. Host the object in a Windows Service
C. Host the object in a Windows Form Application
D. Host the object in a XML Web Service
>> !
-
- Answer: A
Internet Information Services already supports Integrated Windows Authentication. You can host the object under IIS and take advantage of this functionality.
You could host the object in a Windows Service and provide support for the Integrated Windows Authentication but you would have to write the necessary code for this support. An easier solution would be to use IIS to host the object.
You could host the object in a Windows Form Application and provide support for the Integrated Windows Authentication but you would have to write the necessary code for this support and there would be unnecessary user interface involved. An easier solution would be to use IIS to host the object.
You could host the object in an XML Web Service and provide support for the Integrated Windows Authentication but you would have to write the necessary code for this support. An easier solution would be to use IIS to host the object.
29. You are a developer of an XML Web Service. You want to be able to create client applications that communicate with your XML Web Service via the remoting technology that is part of the .NET Framework.
What tool would you use to help you create the code that you would need to do this?
A. Tlbimp.exe
B. Soapsuds.exe
C. Tlbexp.exe
D. InstallUtil.exe
>> !
-
- Answer: B
Soadsuds.exe is the correct tool. It allows you to create client applications that communicate with XML Web services using .NET remoting.
Tlbimp.exe is a tool that is used to create a Runtime Callable Wrapper to allow .NET components to call methods in a COM component. The correct answer is Soapsuds.exe.
Tlbexp.exe is a tool that generates a type library from a .NET assembly so that you can use the .NET assembly within a COM based application by referencing the type library information.
InstallUtil.exe is a tool that allows you to install server components where the System.Configuration.Install namespace is used.
30. You are the developer of a .NET application where you have some .NET Remoting objects that are activated when the client application makes a method call to the remote object. Due to design restrictions, there can only be one instance of the .NET Remoting object regardless of the number of clients that are trying to contact it.
How should the remotable object be hosted?
A. A server activated object using SingleCall activation.
B. A server activated object using Singleton activation.
C. A client activated object using the HTTP channel with SOAP formatter.
D. A client activated object using the TCP channel with binary formatter.
>> !
-
- Answer: B
A server activated object that uses Singleton activation is the correct choice. This allows one instance of the .NET Remoting object to be activated for all client applications accessing the object.
A server activated object that uses SingleCall activation is not correct. This activation model creates a single instance of the .NET Remoting object for each method call by a client application. The correct activation model is Singleton.
Because the .NET Remoting object resides on the server, client side activation is not the correct activation model.
31. You are the developer of a sales tracking application. As a part of the application you have created a .NET serviced component that needs to make a call to a COM component that has some shared functionality with another COM application. You would have liked to convert the functionality to a .NET component but you don't have time. You know that you need to use the Tlbimp.exe tool to create the interop assembly.
What command line switch should use?
A. Use the /keyfile switch
B. Use the /publickey switch
C. Use the /primary switch
D. Use the /out switch
>> !
-
- Answer: C
The /primary switch creates a primary interop assembly for the named type library. You only use the /primary switch if you are the creator of the type library and that type library needs to be shared with others. Also note that a primary interop assembly must be signed with a strong name in order to be registered into the GAC.
The /keyfile switch signs the created assembly with a strong name using the specified key pair file. The correct switch to use is /primary to create a Primary Interop Assembly (PIA).
The /publickey switch specifies a file containing a public key to use in signing the assembly. The /publickey switch is for creating an assembly that is delay signed. The correct switch to use is /primary to create a Primary Interop Assembly (PIA).
The /out switch specifies the name of the interop assembly to be created. The correct switch to use is /primary to create a Primary Interop Assembly (PIA).
32. You are a developer for an aircraft parts supplier. You have been given the task to migrate an existing COM application to C#. The existing application is a classic client/server architecture. You want to update the user interface of the application and migrate it to C# with minimal risk.
What should you do?
A. Rewrite only the user interface components in C#. Use interop to communicate with the server components.
B. Rewrite the whole application. It won't work otherwise.
C. Rewrite only the server components in C#. Use interop to communicate with the user interface components.
D. Why in the world would you want to migrate to C#?
>> !
-
- Answer: A
If you only migrate the user interface components into C#, you can then use COM interop to communicate with the server components. Therefore, you can migrate the server components later if you wish.
It is not necessary to rewrite the entire application. You can migrate the user interface components into C# you can then use COM interop to communicate with the server components.
If you only migrate the server components into C#, then you would also have to migrate the user interface as well to achieve your goal. You should migrate the user interface components.
Migrating to C# will help you obtain the benefits of .NET programming!
33. You have developed a Windows Service that needs to use a network protocol library that is developed by a third-party developer. This network protocol library is a legacy COM object.
What do you need in order to use the methods in the network protocol library?
A. Use the Tlbimp.exe tool to create a signed assembly for the library. Install the assembly in the GAC.
B. Get the Primary Interop Assembly (PIA) for the library. Install the PIA in the GAC.
C. Use the Tlbimp.exe tool to create an assembly for the library. Install the assembly into the Windows Service's subdirectory.
D. Create a Primary Interop Assembly (PIA) for the library. Install the PIA in the GAC.
>> !
-
- Answer: B
When the software publisher provides a PIA for your use, you are able to match the library with the appropriate assembly. When you obtain a new version of the library, the publisher can also provide you with the new assembly.
Creating an assembly for the library using the Tlbimp.exe tool would allow you to access the features of the library. However, You would need to update the assembly each time the network protocol library was updated. The better solution is to get a PIA from the software publisher.
Creating a PIA for the library using the Tlbimp.exe tool would allow you to access the features of the library. However, PIAs should be created by the developer of the third party library. The better solution is to get a PIA from the software publisher.
34. You are the developer of a legacy COM based application. You have recently converted portions of the program to .NET, but there are several COM components that you have not converted. You have created Runtime Callable Wrappers (RCWs) for the application to call these components. Now that you are shipping the application you want to make sure that you have the same version number for all of the binaries.
How do you set the version number in the RCWs?
A. Use the Tlbimp.exe tool to set the version of the RCWs.
B. Use the Tlbexp.exe tool to set the version of the RCWs.
C. Set the version number in the COM object as the Tlbimp.exe tool will use that number.
D. Set the version number in the COM object as the Tlbexp.exe tool will use that number.
>> !
-
- Answer: A
Using the /asmversion switch of the Tlbimp.exe tool allows you to explicitly set the version number of the RCW. This allows you to match the version number of the RCW with your other binaries.
The Tlbexp.exe tool is used to create a type library from a .NET assembly. There is no version number in the resulting type library.
Setting the version number in the COM component does not affect the version number that is assigned implicitly by the Tlbimp.exe tool.
Setting the version number in the COM component does nothing as the Tlbexp.exe tool creates a type library.
35. You are a developer of a legacy COM application used to keep track of expense reports. Your application has several classes that you would like to use in your new .NET application. However, you also want to modify them so that you can take advantage of benefits of managed code, like garbage collection and type safety.
What do you need to do?
A. Use the Tlbimp.exe tool with the /namespace switch and set the namespace to System.
B. Use the Tlbimp.exe tool to create a Primary Interop Assembly.
C. Use the Tlbimp.exe tool to create an Runtime Callable Wrapper.
D. Nothing, you have to write the desired functionality as a .NET assembly.
>> !
-
- Answer: D
There is no shortcut or tool to help you with this. In order to gain the benefits of managed code, it is necessary to rewrite the functions into a managed code assembly.
Using the Tlbimp.exe tool to set the namespace to System will not give you the ability to grant managed code benefits to the COM components.
Using the Tlbimp.exe tool to create a Primary Interop Assembly will not give you the ability to grant managed code benefits to the COM components.
Using the Tlbimp.exe tool to create a Runtime Callable Wrapper will not give you the ability to grant managed code benefits to the COM components.
In order to get the listed benefits, it is necessary to rewrite the functions into a managed code assembly.
36. You are a developer in a small Internet company. You are using Windows services to monitor your network traffic on your web servers. The Windows service needs some startup parameters in order to determine information that is to be monitored. However, the information may differ from one web server to another.
Which method in the Windows service would you use to get and process these parameters?
A. Main()
B. OnStart()
C. OnContinue()
D. Run()
>> !
-
- Answer: B
OnStart() is the correct method to use when getting and processing startup parameters. This method is called when a service is started. The parameters are passed to the method as the input parameters to the method.
Main() is the method called first in a Windows Forms application.
OnContinue() is the method that is called when the service is restarted after being paused.
Run() is the main entry point for the Windows Service application. It prepares a service so that it can be started.
37. You have been asked to create a Windows service application that will allow the company to track the Internet usage of your company's computers. This application needs to run on all of your company's computer systems. In your research you have determined that the Windows service will not run on all operating systems in your company.
Which operating system(s) do not support Windows services? (Choose all that apply)
A. Windows 98
B. Windows 2000 Workstation
C. Windows XP Professional
D. Windows XP Home
E. Windows ME
F. Windows 2000 Server
>> !
-
- Answer: A & E
Windows services do not run on operating systems that are not based on Windows NT technology. Windows 95, Windows 98 and Windows ME all do not support Windows services.
Windows NT, Windows 2000, Windows XP and Windows Server 2003 all support Windows services as they are based on the Windows NT technologies that support services running on the operating system.
38. You have been given the responsibility to create a document that will allow your users to manipulate the status of the Windows service that you have written for an application. You want to instruct the user on what tool to use to do this.
A. The Windows Service Control Manager
B. The Windows Service Installer
C. The Microsoft Management Console
D. The GACUtil tool
>> !
-
- Answer: A
The Windows Service Control Manager is an MMC plug-in that allows you to control such states of the Windows service such as: starting, stopping, pausing or resuming a service, querying status as well as installing or uninstalling a service.
The Windows Service Installer is used to help install or uninstall a service. It does not control the various states of the service.
The Microsoft Management Console is an application that executes snap-ins that perform different types of functionality. While the Windows Service Controller does run under the MMC, the MMC does not control services without the appropriate snap-in.
The GACUtil tool is used to manage .NET components in the Global Assembly Cache. It does not work with Windows services.
39. You are a developer of a Windows service for your company. Currently, the service cannot be suspended by the user. You have had some requests to enhance the service so that the user can set the state of the service in this manner.
What do you need to do to enable suspending execution of the service?
A. Set the CanStop property to true.
B. Set the CanPauseAndContinue property to true.
C. Set the CanStop property to true and implement the OnStop() method.
D. Set the CanPauseAndContinue property to true and implement the OnPause() method.
>> !
-
- Answer: D
Implementing the pausing of a service is a two step process. First, you must set the CanPauseAndContinue property to true and then implement the OnPause() method to do what is necessary when pausing the service.
Setting the CanStop property is not correct as this property is used to implement the OnStop() method, which controls the shutdown of a service.
Setting the CanPauseAndContinue property is a correct step but if you do not implement the OnPause() method then the Windows service will throw an exception when the OnPause message is received.
40. You are a developer of a small company. You have created a windows service that uses COM+ services. You need to use RegAsm.exe to install the service into the registry so that it will be recognized by COM+.
What do you still need to do to the service before running RegAsm.exe?
A. Use GACUtil.exe to install the service into the Global Assembly Cache.
B. Use SN.exe to strong name the assembly.
C. Use Regsvcs.exe to register the service.
D. Nothing further is required.
>> !
-
- Answer: B
You need to use the SN.exe tool to create a strong named assembly in order to use the RegAsm.exe tool to make the assembly visible to COM+.
Using the GACUtil.exe tool will install the assembly into the GAC; however, this is not needed in order to use the RegAsm.exe tool.
RegSvcs.exe is used to register .NET services and does not expose the service to COM+.
41. You need to create a strongly named assembly for a service component. You need to create a new key pair that will be used to sign the assembly.
How do you create a key pair?
A. Use SN.exe
B. Use AL.exe
C. Use RegSvcs.exe
D. Use SecUtil.exe
>> !
-
- Answer: A
The SN.exe is the strong name utility that is used to create a key pair to be used either in the code of your assembly with the [assembly: AssemblyKeyFile(@"..\..\..\mykeypair.snk")] directive or by using the AL.exe tool.
The AL.exe tool does help with the signing but does not create the key pair that you need.
RegSvcs.exe is used to create the registry settings so that your .NET component can be accessed by COM objects. It needs a strongly named assembly to do the registration but does not do the signing itself.
The SecUtil.exe tool is used to extract X.509 certificate information or a strong name from an assembly for use in code.
42. You are developing a .NET serviced component that you want to have interact with some of your COM based services that are currently in production. You have found that .NET provides a mechanism for you to do just that. If you derive from a certain class, .NET will provide the services necessary for your component to work with the legacy services
What do you need to do?
A. Derive your component class from the ServicedComponent class.
B. Add to your component the ServicedComponent class.
C. Add the System.EnterpriseServices namespace to your component.
D. Add a reference to System.EnterpriseServices.
>> !
-
- Answer: A
The correct answer is to Derive your component class from the ServicedComponent class. Doing this will give you the methods necessary for the serviced component to communicate with COM services once the assembly has been registered using the RegAsm.exe tool.
The ServicedComponent class is important to solving the problem but the component's class needs to be derived from ServicedComponent rather than just instantiating an instance of the ServicedComponent class.
The ServicedComponent class resides in the System.EnterpriseServices namespace but just adding the namespace to your code or adding a reference to it is not sufficient to solve the problem.
43. You have created a database for your application that will be used to track purchases and buyers for your products. You need to create a schema for your application to represent this data.
How do you most easily create the schema?
A. In your Windows Application project, Add a New Item and select XML schema.
B. Open the Server Explorer and drag a table of the database into your project.
C. Open the Server Explorer and right click on the table that you want and then select Design Table.
D. In your Windows Application project, Add a New Item and select XML file.
>> !
-
- Answer: A
In order to create a XML schema file in your project, you need to select Add New Item and select the XML Schema template. Once the template is opened, you can then create the elements, attributes, types and relationships needed in your schema.
Opening the Server Explorer and dragging a table into your project will create a connection object in your project for accessing that table. However, this does not create a schema for your application to be able to use to reference elements in the table.
Opening the Server Explorer and selecting the Design Table option will allow you to create/modify a table definition in the database. This does not create a schema for your application to be able to use to reference elements in the table.
Selecting the XML File template in the Add New Items dialog will create a template for a freeform XML document. While you can create an XML schema file this way, it does require a significant amount of work that is not necessary if you use the XML Schema Designer.
44. You have a database that you want to use with your application. You want to create a strongly typed relationship between your code and the data that you will be using. You want to use the existing database and would like to have the XML Schema created for your application.
How do you create the XML Schema file from the existing data?
A. In your Windows Service project, Select Project, Add New Item and select the XML Schema template. You can then drag the needed table(s) onto the form created for you to create the schema from the existing database.
B. In your Windows Service project, Select Project, Add New Item and select the XSLT File template. You can then drag the needed table(s) onto the form created for you to create the schema from the existing database.
C. In your Windows Service project, Select Project, Add New Item and select the Dataset template. You can then drag the needed table(s) onto the form created for you to create the schema from the existing database.
D. In your Windows Service project, Select Project, Add New Item and select the XML File template. You can then drag the needed table(s) onto the form created for you to create the schema from the existing database.
>> !
-
- Answer: C
Using a Dataset template is the correct method. This not only will create an XML schema for your application but will also help you to create the necessary classes that your application will use to access the dataset.
Using an XML Schema template would accept the table into your schema for your service. However, using just the XML Schema does not prepare other elements that are needed by your application that the Dataset template provides.
Using an XSLT File template would not create an XML schema for your service from the provided database. XSLT Files are used to transform XML data into a form desired by the XSLT designer for the purpose of transforming data or placing XML data into reports.
Using an XML File template will not help you to create an XML schema for your service. This template provides the basic editor for creating an XML document.
45. As lead developer, you have been given the task of creating a web service that will provide environmental status information about a buildings HVAC system. This web service will provide the data to client applications that will monitor the statistics and report abnormal data into a feedback system that will attempt to solve the problem automatically. You need to unit test the web service to see if the various methods work as expected.
What is the fastest way to test the XML Web Service?
A. Start (F5) the XML Web Service in Visual Studio .NET.
B. Using Visual Basic, create a test framework application that implements the methods of the web service and sends test data to the web service to exercise the functionality.
C. Using C#, create a test framework application that implements the methods of the web service and sends test data to the web service to exercise the functionality.
D. Access the web service via Internet Explorer on the development machine.
>> !
-
- Answer: A
Pressing F5 while the project is loaded will start the web service and provide a test page that exposes all methods that are supported. You can then enter test values into the page and see how the web service will respond.
While creating a test framework, either in C# or Visual Basic, is a common method of testing applications and APIs, it is not the fastest way to test an XML web service under .NET. Pressing F5 while the project is loaded will start the web service and provide a test page that exposes all methods that are supported. You can then enter test values into the page and see how the web service will respond.
You will not be able to access the web service via Internet Explorer. Depending on the permissions set to the directory, you will most likely get an access denied error. Pressing F5 while the project is loaded in Visual Studio .NET will start the web service and provide a test page that exposes all methods that are supported. You can then enter test values into the page and see how the web service will respond.
46. You have developed an XML web service and you now want to perform some unit testing before providing the XML web service to test for final verification. .NET provides a tracing mechanism so that you can see trace information from the service. This information would be invaluable in your unit testing to make sure that everything is working as expected.
How would you modify the trace element in the web.config file to log trace information into the trace.axd?
A.
<trace
enabled="true"
pageOutput="false"
traceMode="SortByTime"
localOnly="false"
/>
B.
<trace
enabled="true"
pageOutput="false"
traceMode="SortByTime"
localOnly="true"
/>
C.
<trace
enabled="true"
pageOutput="true"
traceMode="SortByTime"
localOnly="true"
/>
D.
<trace
enabled="true"
pageOutput="true"
traceMode="SortByTime"
localOnly="false"
/>
>> !
-
- Answer: B
These settings would enable tracing and they will not put the trace information into the page. Also, with the localOnly attribute set to true, the trace.asx file would only be available on the server machine.
The "<trace
enabled="true"
pageOutput="false"
traceMode="SortByTime"
localOnly="false"
/>"
settings would enable tracing and it will not put the trace information into the page. Also with the localOnly attribute set to false, the trace.asx file would also be available on the client machine as well as the server.
The "<trace
enabled="true"
pageOutput="true"
traceMode="SortByTime"
localOnly="true"
/>"
settings would enable tracing, but they would put the information into the page. Also, with the localOnly attribute set to true, the trace.asx file would only be available on the server machine.
The "<trace
enabled="true"
pageOutput="true"
traceMode="SortByTime"
localOnly="false"
/>"
settings would enable tracing, but they would put the information into the page. Also, with the localOnly attribute set to false the trace information would also be displayed on pages run remotely and not just on the server.
47. You are a tester of an XML web service that will help users search for information about, and compare insurance quotes for, different insurance companies. You are trying to create a test plan to describe your approach to testing the website. You know that there are many different testing strategies to choose from.
Which of the following is NOT a valid testing strategy?
A. Unit testing
B. Integration testing
C. Regression testing
D. Preview releases
>> !
-
- Answer: D
Preview releases can generate some bug reports from consumers as they explore a prerelease product but is not a systematic approach to testing. You should not rely on customers to find problems in your code, but should enact a systematic approach to testing.
Unit testing refers to testing a class or object that contains a certain amount of functionality. A unit test is successful if the features of the class or object behave as expected.
Integration testing refers to testing multiple features together to make sure that, when one feature interacts with another, there are no failures in use. This is also sometimes referred to as scenario testing.
Regression testing refers to testing bug fixes to make sure that a repair to a class or object did not create additional problems in the code.
48. You are a developer working on a problem with a recipe XML web service. You are experiencing a bug when you attempt to retrieve a new recipe from the web service. The bug seems to be related to the output of the recipe description as the description stored in the service is not what you found in the search but appears to be corrupted. However, you are unable to determine further what the problem might be using code inspection.
What is the best way to debug the application further?
A. Set a breakpoint on the function that receives the description of the recipe and execute that application. Using the autos window, examine the input string to make sure that the value is what you expect.
B. Set a breakpoint on the function that receives the description of the recipe and execute that application. Using the memory window, examine the memory assigned to the input string to make sure that the value is what you expect.
C. Set a breakpoint on the function that receives the description of the recipe and execute that application. Using the call stack window, examine the function call sequence to make sure that it is as expected.
D. Set a breakpoint on the function that receives the description of the recipe and execute that application. Using the registers window, examine the value of the register to make sure that the value is what you expect.
>> !
-
- Answer: A
The autos windows automatically shows all of the variables and values that are currently in scope at the time of the break in execution. This allows you to quickly identify the values of different variables. In this problem, this would help you to quickly identify if there is a string corruption problem and then you could follow that variable as the code executes until the problem you are experiencing occurs.
The memory window gives you a view of the raw data in the memory at the location that you specify. This can sometimes help you to understand how the data is stored or relates to other information. However, this will not help you debug this particular problem unless there is a problem with memory access.
The call stack window provides information about the function calls that preceded the location where the debugger is currently set. This information can be helpful when you want to make sure that your execution path is as you expected. However, this information will not usually be your first debug technique for this problem.
The registers window is going to reflect values of the machine registers in the CPU. This will not be of any value in the problem that you are trying to debug as the information is too low level.
49. You have a Windows Service running on a remote machine. It is not working the way that you expect and you would like to debug it but you do not have Visual Studio running on that machine.
How do you debug the remote service?
A. Install the Full Remote Debugging components on the remote server. Start the remote debugger and the service and then attach to the remote machine from your local Visual Studio IDE. Set a breakpoint in the client code that calls the service and then begin the debug session.
B. Install the Native Remote Debugging components on the remote server. Start the remote debugger and the service and then attach to the remote machine from your local Visual Studio IDE. Set a breakpoint in the client code that calls the service and begin the debug session.
C. From your local machine, start the Visual Studio debugger on the client software after you have set a breakpoint on the call to the service on the remote machine.
D. Use the Just in Time (JIT) debugger.
>> !
-
- Answer: A
The Full Remote Debugging components will allow you to create debugging session with your local machine that will provide a rich debugging environment without having to install and run the debugger on the remote machine. Using the Full Remote Debugging components will allow you to debug native, managed and script running on the remote machine.
The Native Remote Debugging components will allow you to create debugging session with your local machine that will provide a rich debugging environment without having to install and run the debugger on the remote machine. However, using the Native Remote Debugging components will only allow you to debug native code running on the remote machine.
Without the TCP/IP debug monitor or the remote debugging components, you will be unable to debug the remote process and get information about the debug state. You will only be able to debug the local process.
The JIT debugger will only work when there is an unhandled exception and if the Visual Studio debugger is installed on the remote machine. In order to debug the remote service correctly, you will need to install the Full Remote Debugger components.
50. You are a developer of a large automobile manufacturer. You have an ASP.NET application that uses forms-based authentication. During testing some users report that they cannot access the application. You have determined that the users with the problem have entered the correct password for the application.
What is the most likely problem?
A. The browser does not have cookies enabled.
B. The user has not signed into Microsoft Passport.
C. The browser does not support forms-based authentication.
D. The password is not being passed to the verification code.
>> !
-
- Answer: A
Cookies need to be enabled in order for forms-based authentication to work correctly. Enable cookies in the browser to fix the problem.
Microsoft Passport can be used to help with authentication but it does not work in conjunction with forms-based authentication.
Forms-based authentication is in fact a feature of ASP.NET. The only requirement for the browser is to support cookies.
The challenge dialog is not a part of the application but is part of the forms-based authentication feature.
51. You have created an XML web service and configured its web.config file so that you have enabled tracing information on the server. You have been experiencing a problem with the service and you would now like to view the trace data.
How do you best view the trace log from that server?
A. Using Notepad, open the trace.axd file in the http://localhost/mywebservice directory to view the log information.
B. Using Internet Explorer, open the trace.axd file in the http://localhost/mywebservice directory to view the log information.
C. Using Internet Explorer, open the trace.axd file in the http://localhost/aspx directory to view the log information.
D. Using Notepad, open the trace.axd file in the http://localhost/aspx directory to view the log information.
>> !
-
- Answer: B
Opening the trace.axd file in the mywebservice directory with Internet Explorer is the correct solution. This will provide you a web page of the trace information and make it easier to find the problem in your service.
Opening the trace.axd file in the mywebservice directory will open the correct file. However, by using Notepad you will only see the raw XML that is in the file, making it harder to read.
Opening the trace.axd file in the aspx directory will give you the trace information, if any, of the ASP.NET service. You need to go to the root directory of your webservice to find its trace information. However, this information is best viewed in Internet Explorer, not Notepad.
52. You have created a Windows Service for which you now need to create a setup project. In the Property Pages dialog box of the project, you've set the compression property to Optimized for size.
Which of the following two answers are true?
A. The installation package will be quicker.
B. The installation package will be slower.
C. The installation package will be larger.
D. The installation package will be smaller.
E. The installation package will be the same speed.
>> !
-
- Answer: B & D
Since you are optimizing the setup project for size, the installation package will be slower due to compression overhead.
Since you are optimizing the setup project for size, the installation package will be smaller due to compression.
Since you are optimizing the setup project for size, the installation package will be slower due to compression. Therefore, the package will not be quicker nor will it be the same speed.
Since you are optimizing the setup project for size, the installation package will be smaller due to compression. Therefore, the package will not be larger.
53. You have developed a Web Service application that maintains a database of parts for an airline repair company. You are creating a setup project to deploy the service. However, a requirement of the service is that the database is also properly installed. If this is not done, you want to reverse the installation and return the machine to a clean state.
Which editor will help you to do this?
A. Registry Editor
B. File System Editor
C. User Interface Editor
D. Custom Actions Editor
>> !
-
- Answer: D
The Custom Actions Editor is used to manage dependencies in the installation.
The Registry Editor is used to manage keys and values in the Windows Registry. To manage dependencies in the installation, you should use the Custom Actions Editor.
The File System Editor is used to manage the location and installation of directories and files to the computer.
The User Interface Editor is used to manage the dialogs that are used in the installation application.
54. You have created a .NET remoting application for your company's order tracking system. This system uses components that are shared with .NET components that are used in other applications that are produced by your company. You need to be able to access these components without installing duplicate files or disturbing the execution of these other applications
Where should you install the shared .NET components?
A. Install them in the Global Assembly Cache.
B. Install them in the application's subdirectory.
C. Install them in the Windows subdirectory.
D. Install them in the Windows\System32 subdirectory.
>> !
-
- Answer: A
When you need to share .NET assemblies, you should register them into the Global Assembly Cache. This will allow you to update the assemblies without disrupting the installation of your applications that use them.
Installing the assemblies into the application's subdirectory would work for that application's installation but would duplicate files and potentially cause a version conflict on the computer. It would be better to register the assemblies into the Global Assembly Cache.
Installing the assemblies into the Windows subdirectory would work for that application's installation if the application was configured to look there for the assemblies, but would duplicate files and potentially cause a version conflict on the computer. It would be better to register the assemblies into the Global Assembly Cache.
Installing the assemblies into the Windows\System32 subdirectory would work for that application's installation if the application was configured to look there for the assemblies, but would duplicate files and potentially cause a version conflict on the computer. It would be better to register the assemblies into the Global Assembly Cache.
55. You have developed a Web Service for an airline repair company. You are creating a setup project to deploy the service. However, a requirement of the project is to create a custom set of dialogs to be used during the installation of the service.
Which editor will help you to do this?
A. Registry Editor
B. File System Editor
C. User Interface Editor
D. Custom Actions Editor
>> !
-
- Answer: C
The User Interface Editor is used to manage the dialogs that are used in the installation application.
The Registry Editor is used to manage keys and values in the Windows Registry.
The File System Editor is used to manage the location and installation of directories and files to the computer.
The Custom Actions Editor is used to manage dependencies in the installation.
56. You have developed a Web Service for an airline repair company. You are creating a setup project to deploy the service. One of the needs of the Windows Service is to have several keys and values placed into the Window Registry in order to configure the service correctly.
Which editor will help you to do this?
A. Registry Editor
B. File System Editor
C. User Interface Editor
D. Custom Actions Editor
>> !
-
- Answer: A
The Registry Editor is used to manage keys and values in the Windows Registry.
The File System Editor is used to manage the location and installation of directories and files to the computer. To manage keys and values in the Windows Registry you should use the Registry Editor.
The User Interface Editor is used to manage the dialogs that are used in the installation application.
The Custom Actions Editor is used to manage dependencies in the installation.
57. You have developed a Web Service for an airline repair company. You are creating a setup project to deploy the service. As a part of the installation you want to be able to have the installation be placed in a known directory structure under the root directory specified by the user.
Which editor will help you to do this?
A. Registry Editor
B. File System Editor
C. User Interface Editor
D. Custom Actions Editor
>> !
-
- Answer: B
The File System Editor is used to manage the location and installation of directories and files to the computer.
The Registry Editor is used to manage keys and values in the Windows Registry. To manage the location and installation of directories and files you should use the File System Editor.
The User Interface Editor is used to manage the dialogs that are used in the installation application.
The Custom Actions Editor is used to manage dependencies in the installation.
58. You have created a .NET remoting application for your company's order tracking system. This system uses components that are not shared with a .NET components that are used in other applications that is produced by your company. When updates to the components are needed, they will only be needed by this application.
Where should you install the shared .NET components?
A. Install them in the Global Assembly Cache
B. Install them in the application's subdirectory
C. Install them in the Windows subdirectory
D. Install them in the Windows\System32 subdirectory
>> !
-
- Answer: B
Installing the assemblies into the application's subdirectory is correct. The application would need to be configured properly to look in its subdirectories for the assemblies which is specified in the element.
When you need to share .NET assemblies you should register them into the Global Assembly Cache. This will allow you to update the assemblies without disrupting the installation of your applications that use them. since we are not sharing components, this is not necessary. It would be better to place them in the application's subdirectory.
Installing the assemblies into the Windows subdirectory or in the Windows\System32 subdirectory would work for that application's installation if the application was configured to look there for the assemblies. However, these are not appropriate locations according to the .NET Framework. It would be better to place them in the application's subdirectory.
59. You are the developer of an application that uses ASP.NET. You want to create an authentication method that uses Microsoft Passport to validate users.
Which authentication element will allow this?
A. <authentication mode="Windows">
B. <authentication mode="Forms">
C. <authentication mode="Passport">
D. <authentication mode="None">
>> !
-
- Answer: C
The "Passport" setting will allow the application to use Microsoft Passport authentication for verification.
The "Windows" setting will allow the application to use Integrated Windows authentication for verification.
The "Forms" setting will allow the application to use Forms-Based authentication for verification.
The "None" setting will disable any type of authentication for verification.
60. You are creating an application for your company that will track the computers used by your employees. Each employee's ID will be assigned a computer tracking number but you also want to make sure that no one computer tracking number is accidentally assigned to more than one employee.
How to you create the XML schema file to do this?
A. Make EmployeeID a unique key and TrackingNumber a primary key in the schema file.
B. Make EmployeeID a primary key and TrackingNumber a unique key in the schema file.
C. Make EmployeeID a primary key and TrackingNumber a primary key in the schema file.
D. Make EmployeeID a unique key and TrackingNumber a unique key in the schema file.
>> !
-
- Answer: B
The EmployeeID is the primary key in the table. Since you want to make sure that the Tracking number is not assigned to anyone else in the table then you would want to make the TrackingNumber element a unique key in the table.
Making the TrackingNumber the primary key and the EmployeeID key the unique key would work. However, this would mean that your queries would have to be based on the TrackingNumber as it is the primary key. It would be more convenient to make EmployeeID the primary key.
Having only two primary keys is incorrect as you cannot have two primary keys in one table at once. You can only have one primary key defined in a table at any given time.
Having two unique keys and no primary key is incorrect as you have not defined a primary key for the table. This will hinder your ability to create relationships to the data in this table.
|