New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an ASP.NET Web application using .NET Framework 3.5. The application will be accessed by Internet users. You need to enable users to authenticate from the client-side script. You add the following code fragment in the Web.config file of the application:

You must configure the application to ensure that user credentials are validated against Active Directory by using the client-side script. What will you do to accomplish this?

Each correct answer represents a part of the solution. Choose two.

A.

Add the following code fragment to the Web.config file of the application:

B.

Configure the application to use the ActiveDirectoryMembershipProvider class.

C.

Add the following code fragment to the Web.config file of the application:

D.

Configure the application to use the SqlMembershipProvider class.

E.

Add the following code fragment to the Web.config file of the application:

You work as a Software Developer for ABC Inc. You have created a console application that uses two threads, named thread1 and thread2. You need to modify the code to prevent the execution of thread1 until thread2 completes its execution. Which of the following steps will you take to accomplish this task?

A.

Call the SpinWait() method of thread1.

B.

Use a WaitCallBack delegate to synchronize the threads.

C.

Call the sleep() method of thread1.

D.

Configure thread1 to run at a lower priority.

E.

Configure thread2 to run at a higher priority.

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You create an ASP.NET Web application using the .NET Framework 3.5. The application uses Session objects. You are changing the application to run on a Web farm. You want to make sure that the application can access the Session objects from all the servers in the Web farm. You also make sure that when any server in the Web farm restarts or stops responding, the Session objects are not lost. What will you do?

A.

Use InProc Session Management mode to store session data in the ASP.NET worker process

B.

Use StateServer Session Management mode to store session data in a common State Server process on a Web server in the Web farm

C.

Use SQLServer Session Management mode to store session data in an individual database for each Web server in the Web farm

D.

Use SQLServer Session Management mode to store session data in a common Microsoft SQL Server 2005 database

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are creating a .NET remoting application using .NET Framework 2.0. The object of the application will be shared by multiple applications. You want to use simple, modular, extensible, and XML-based protocol to exchange messages between remoting applications. What will you do to accomplish the task?

A.

Use the SOAP protocol.

B.

Use the SoapFormatter class.

C.

Use the BinaryFormatter class.

D.

Use client activated objects.

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows application using .NET Framework 3.5. The application uses a SQL Server 2008 database on the network.

You use ADO.NET Data Services that exposes data as resources that are addressable by URIs. You access and change data by using the semantics of representational state transfer (REST), specifically the standard HTTP verbs of GET, PUT, POST, and DELETE. You must ensure that when a service violates any other constraint, the service cannot strictly be referred to as RESTful. What will you do?

A.

Use the layered system constraint.

B.

Use the code on demand constraint.

C.

Use the client-server constraint.

D.

Use the stateless constraint.

E.

Use the cacheable constraint.

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. You are using string datatype in the application to store text based information. You want to match character in a string in such a way that the match must occur at the point where the previous match ended. Which of the following characters will you use to accomplish the task?

A.

\z

B.

\b

C.

\Z

D.

\G

John works as a Web Developer for ProMetaworks Inc. He creates an ASP.NET application, named MyApp1, by using Visual Studio .NET. MyApp1 contains a page, named Page1. Page1 contains several TextBox controls that accept users' input. John uses several validation controls on the page to validate input controls. He wants to display all the validation error messages on the page in a message box. However, he does not want the validation summary to be displayed inline on the Web page. What will he do to accomplish the task?

A.

Add a CustomValidator control to the page. Write a custom client-side script function. Set the ClientValidationFunction property of the control to the name of the function.

B.

Add a ValidationSummary control to the page. Set its ShowMessageBox and ValidationSummary properties to True.

C.

Add a ValidationSummary control to the page. Set its ShowMessageBox property to True and ValidationSummary property to False.

D.

Add a ValidationSummary control to the page. Set its DisplayMode property to MessageBox .

You work as a Software Developer for ABC Inc. You develop a Windows-based application named MyApp. The application contains a form named MyForm1 that displays a submit form for registered users. You want to implement a user interface for the application. Which of the following requirements will you consider for the user interface?

Each correct answer represents a complete solution. Choose all that apply.

A.

The application saves the user-entered data and checks the integrity of the data.

B.

The application components are allowed to handle logging of user-entered data.

C.

The user-entered data are validated through the validation checks applied in the Windows Forms controls.

D.

Users are allowed to enter data in the required fields on the form.

Allen works as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. Allen creates an application that will be used to handle security information related to the company. He wants to secure the application by using the most secure authentication method. The method should have a strong key for encryption and send the encrypted password across the network. Which of the following authentication methods will Allen use to accomplish the task?

A.

Integrated Windows authentication

B.

Basic authentication

C.

Certificate-based authentication

D.

Digest authentication

John works as a Web Developer for ABC Inc. He develops an ASP.NET application, named MyApp1, using Visual Studio .NET. The application will be used in the Sales department to generate monthly reports. John wants to deploy the application on the company's intranet. The company uses Microsoft Windows authentication. John wants to deny access to all the members of the Guest1 role. Which of the following attributes will he use in the <authorization> element of the application's Web.config file to accomplish the task?

A.

B.

C.

D.