Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Microsoft 70-548(VB) Exam - Cheat-Test.com

Free 70-548(VB) Sample Questions:

Q: 1 You create Microsoft Windows-based applications. You are creating a sales management application. The application does not use message queuing technology. The logical datacenter diagram for the current solution is displayed in the exhibit. (Click the Exhibit button.)

Before deploying the application, you verify the list of operational requirements. You decide to meet the following operational requirements:
Access to the data must be available even if a database server or a Web server is offline.
Access to the database must resume automatically.
You need to decide how to implement the solution. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A. Place the business components in a component load-balancing cluster.
B. Add a database server to the network and place the database in a failover cluster.
C. Add a Web server to the network and place the Web services in a Network Load Balancing cluster.
D. Maintain an offline copy of the business components on a backup server.
E. Maintain an offline copy of the database on a backup server.
F. Maintain an offline copy of the Web services on a backup server.
Answer: B, C

Q: 2 You create Microsoft Windows-based applications. You are creating a sales management application. The application will consume Web services to retrieve and save data to a database server. These Web services will be exposed to a partner extranet so that partners can write applications that will access the same data. The deployment diagram for the entire solution is as shown in the following exhibit. (Click the Exhibit button.)

After deploying the solution, local users and partners report that they are not able to retrieve any data. You find that the client computers are able to access Web applications and Web services hosted by the Web server. You also find that the local applications are able to access other databases on the database server. You need to troubleshoot the issue. What should you conclude?
A. Firewall settings are blocking access from the Web server to the database server.
B. Firewall settings are blocking access from the client computers to the Web server.
C. The Web server is offline.
D. The database server is offline.
Answer: A

Q: 3 You create Microsoft Windows-based applications. You are creating an application that runs statistical sales models. The application will be used by 400 users on the local network. After the application is deployed, users report that the application stops responding. The application takes more than 10 minutes to resume to normal when a specific action is performed. The performance chart is shown in the Performance exhibit, and the task list of the application that is running on a sample computer is shown in the Processes exhibit. (Click the Exhibit button.)


You need to evaluate the problem by analyzing the monitored data. What should you conclude?
A. The computer does not have enough memory to perform the task. A memory upgrade is necessary.
B. The computer does not have enough space in the paging file. The paging file has to be extended.
C. The application has a memory leak. The application needs to be debugged to find the root cause.
D. The application consumes too much processor time. The application needs to be debugged to find the root cause.
Answer: D

Q: 4 You create Microsoft Windows-based applications. You are creating a sales management application that accesses data from a Microsoft SQL Server 2005 database. The application uses Microsoft Windows Authentication Mode to access SQL Server 2005. After testing, the design team moves the database from the test server to the production server. The design team modifies the connection string on the application. You test the new configuration on your computer and the application runs successfully. You deploy the application to five client computers. The five client computers use other applications on the network that access different databases on the production server by using Windows Authentication Mode. You evaluate the application design and the production configuration. You conclude that the application will not connect to the database. What is the most likely cause of the problem?
A. Users do not have valid logons for SQL Server.
B. Users do not have the correct permissions for the sales database.
C. Client computers are not configured correctly to use the network.
D. The database server is not configured correctly to use the network.
Answer: B

Q: 5 You create Microsoft Windows-based applications. You are creating an application that is used to run statistical sales models. Users run this application from 09:00 to 17:00 hours every day to run their analysis. The application requirements state that the application must not consume more than 20 percent of the processor time. The network administrator in your company sends you a graph displaying the processor usage for the application on a specific machine. The graph shows the processor usage for an entire day. The graph referenced by the network administrator is shown in the exhibit. (Click the Exhibit button.)

You need to evaluate the design to find whether the application performance is within the requirements. What should you conclude?
A. The application performance meets the requirements. The spikes display specific points in time when the application usage is at its peak.
B. The analysis of the performance chart conclusively indicates that the application has a bug that needs to be fixed.
C. The analysis of the performance chart is inconclusive. Code profiling must be used to find what is happening with the application.
D. The analysis of the performance chart is inconclusive. A load test must be used to find what is happening with the application.
Answer: C

Q: 6 You create Microsoft Windows-based applications. You are creating a sales management application for your company. The application will be used by 250 users on the companys network. In the future, the company will be expanding the user base to include at least 1,000 more users.
The application will be stored locally on every computer. The application uses a set of assemblies that are installed in the global assembly cache for business rules. The application retrieves data from a Microsoft SQL Server 2005 database by using a set of methods from a Web service. The SQL Server 2005 database is hosted on a local server. The Web service is maintained at a local IIS 6.0 Server. You need to evaluate which aspects of the physical design can be modified to accommodate more users. Which two aspects should you consider modifying? (Each answer presents part of the solution. Choose two.)
A. Windows-based application
B. assemblies in the global assembly cache
C. database on the SQL Server 2005 server
D. Web service on the IIS 6.0 Server
E. number of assemblies installed by the application
Answer: C, D

Q: 7 You create Microsoft Windows-based applications. You are creating an application that uses Microsoft Visual Studio 2005 to support the human resources department.
The application stores information in a Microsoft SQL Server 2005 database. The application tracks information on the following fields:
Employees
Managers
Departments
Relationships between them
The database diagram is as shown in the following exhibit. (Click the Exhibit button.)

You need to evaluate the database diagram to ensure that the application correctly handles the data. Which three conclusions should you reach? (Each correct answer presents part of the solution. Choose three.)
A. The database does not store data about managers.
B. The data about employees and managers is stored in the same table.
C. An employee can work for only one department.
D. An employee can work for any number of departments.
E. An employee has only one job title.
F. An employee can have any number of job titles.
Answer: B, D, E

Q: 8 You create Microsoft Windows-based applications. You need to evaluate the design concept of an application.
The application must meet the following requirements:
The application relies on the operating system for authentication.
The application minimizes the amount of data sent over the network when connecting to the database.
The application exposes data access code so that the future Web-based and mobile applications can reuse them.
The application permits users to view and edit data contained in tables from a Microsoft SQL Server 2005 database.
The application controls access to the SQL Server 2005 database at the table level.
The design contains the following elements:
The SQL Server 2005 database uses the Windows Authentication mode.
A database schema that grants rights to the users at the table level.
A stored procedure in Transact-SQL that accesses the necessary data required by the application.
A Web service that uses a pre-defined credential to access the database and run the stored procedures.
A Microsoft Windows-based application that impersonates the logged-on user and calls the Web service to retrieve and update the data.
You need to evaluate the design and recommend appropriately. What should you recommend?
A. The design meets all the requirements.
B. Change the Windows-based application to use Windows Authentication.
C. Change the Web service to impersonate the caller.
D. Change the database schema to use stored procedures.
Answer: C

Q: 9 You create Microsoft Windows-based applications. You are creating a banking application. ATMs will use the application.
The application will authenticate a user, based on a personal identification number (PIN). When the user is authenticated, a list of accounts that belongs to the user will be displayed. The user can select any account. On selecting an account, the user can perform the following actions:
view the account number and current balance print a list of transactions withdraw, deposit, and transfer money You are representing the outlined specifications in the form of classes. You create a class named Account to represent bank accounts. You need to identify minimal number of the properties and methods that belong to the Account class. Which properties and methods should belong to the Account class?
To answer, drag the appropriate properties and methods to the correct locations in the answer area.

Answer:

Q: 10 You create Microsoft Windows-based applications. You are creating a sales management application. This application will permit sales personnel to search for customer information in a Microsoft SQL Server 2005 database. All communication with the database server is done by using an SSL channel.
When a user needs to search for customer information based on a name, the following sequence of actions occurs:
1.The user types a name into a text box.
2.The user clicks a button to initiate the search.
3.The component validates that the value the user types is less than 200 characters.
4.The value that is typed is passed as a string to a component.
5.The component concatenates the typed value to a Select statement in the Where clause of the component.
6.The statement is executed to generate a DataTable object.
7.The DataTable object is used to display the results to the user.
You need to identify the risk factor in this application design. What should you conclude?
A. SQL injection can be used to execute malicious SQL statements.
B. Code injection can be used to elevate privileges of malicious code.
C. A buffer overflow can be caused by typing a very large string in the text box.
D. Canonicalization can be used to add invalid characters to the search string.
Answer: A


© 2014 Cheat-Test.com, All Rights Reserved