Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Microsoft 70-549(VB) Exam - Cheat-Test.com

Free 70-549(VB) Sample Questions:

Q: 1 You are an enterprise application developer. You are creating an application. Within your application, an order contains order lines. Order lines are always contained within an order. You need to analyze this structure and show the link between the order and the order line by using a class diagram. Which diagram should you choose?

A. A
B. B
C. C
D. D
Answer: A

Q: 2 You are an enterprise application developer. You are designing an application. The database for the application currently has a one-to-one relationship between order and product.
The application must meet the following business requirements:
An order must contain orders for many products.
An order must store the ordered quantity of each product.
You need to evaluate the existing design and recommend changes to meet the business requirements.
Which two changes should you recommend? (Each correct answer presents a complete solution. Choose two.)
A. Change the relationship between order and product to one-to-many.
B. Change the relationship between order and product to many-to-many.
C. Create a new table named Order line. Establish a one-to-many relationship between order and Order line and a one-to-one relationship between product and Order line.
D. Create a new table named Order line. Establish a one-to-many relationship between order and Order line and a one-to-many relationship between product and Order line.
Answer: B, D

Q: 3 You are an enterprise application developer. You are creating an application that will track shipments. This application must support integration with applications that run on different platforms and operating systems. The application that you are creating can be invoked only through SOAP messages over HTTP. You choose Web services instead of .NET Remoting to meet these requirements. You need to specify the reason for choosing Web services. Which statement should influence your decision?
A. SOAP messages cannot be exchanged in .NET Remoting.
B. Web Services Description Language documents cannot be generated from .NET Remoting class definitions.
C. .NET Remoting objects will not be interoperable with other platforms.
D. .NET Remoting objects cannot be invoked through HTTP.
Answer: C

Q: 4 You are an enterprise application developer. You are evaluating a component that monitors a Web-based application.
The component stores monitoring information in a database and performs the following functions:
Retrieves the number of orders placed per second.
Tracks the data for peak usage of the application and displays the data in a tabular form.
Subsequently, monitoring requirements change in the following manner:
Users must be able to view data graphically.
Users must be able to analyze data in real time.
Users must be able to correlate the number of orders placed per second with the memory usage in the Web server.
You need to evaluate whether the component meets the new requirements and propose a solution, if required. What should you conclude?
A. The component meets the new requirements.
B. The component does not meet the new requirements. You need to update a text file by using trace statements instead of storing data in a database.
C. The component does not meet the new requirements. You need to update a custom performance counter instead of a database.
D. The component does not meet the new requirements. You need to update a custom event log instead of a database.
Answer: C

Q: 5 You are an enterprise application developer. You are designing an intranet Web application.
This application must meet the following requirements:
The employees must log on to use the application.
The database authentication mechanism must be as secure as possible.
The number of connection pools must be minimized.
You decide to use Microsoft SQL Server authentication and a specific SQL Server account. You need to evaluate whether the design will meet the business requirements and make recommendations, if required. What should you conclude?
A. The design meets the requirements.
B. The design does not meet the requirements. Use Windows Authentication with a specific Windows account.
C. The design does not meet the requirements. Use SQL Server authentication and the credentials of the logged on user.
D. The design does not meet the requirements. Use Windows Authentication with the Windows account of the logged on user.
Answer: B

Q: 6 You are an enterprise application developer. You are creating a client/server application. You need to install the application on the company network.
The client/server application must meet the following criteria:
The server component is a class library that is created by using the .NET Framework.
The client component is a Microsoft Windows-based application that is created by using the .NET
Framework.
The client component and the server component must communicate by using a binary protocol.
The fewest possible ports are opened between the client component and the server component.
You need to identify a technology that permits the server to communicate with the client component through the TCP/IP protocol. Which technology should you use?
A. Message Queuing
B. .NET Remoting
C. Web services
D. DCOM
Answer: B

Q: 7 You are an enterprise application developer. You are evaluating the physical design of a Web-based application. Fifty customers will use the application from different regions. The use of the application will trigger events of different severities. These events must be logged, extracted, and then filtered on the basis of customer, region, or severity of events. The event details also must be persisted, backed up, and archived for later retrieval. The development team plans to use an event log for logging events. On evaluation, you find the plan does not meet the requirements. You need to explain why an event log fails to meet the requirements. What should you conclude?
A. Event logs cannot track custom application events.
B. Event logs cannot be filtered to meet the requirements.
C. Event logs cannot be backed up or archived.
D. Event logs cannot be persisted and will be deleted when the Web server shuts down.
Answer: B

Q: 8 You are an enterprise application developer. You create an application that has three layers:
Layer 1 contains the Microsoft Windows client and the input validation logic.
Layer 2 contains business entities, business workflows, and business rules.
Layer 3 contains the data access classes and stored procedures.
You need to analyze the layers and identify dependencies that exist between these layers. Which two dependencies should you identify? (Each correct answer presents part of the solution. Choose two.)
A. Layer 1 depends on Layer 2.
B. Layer 3 depends on Layer 1.
C. Layer 2 depends on Layer 3.
D. Layer 1 depends on Layer 3.
E. Layer 2 depends on Layer 1.
Answer: A, C

Q: 9 You are an enterprise application developer. You are evaluating a database design for a human resource application. The existing database schema meets the following criteria:
The database has an Employee table.
The Employee table has an Employee ID field and several other fields.
You must accommodate the following new requirements:
Employees are either supervisors or line workers.
A supervisor will supervise zero or more line workers.
An employee will be supervised by only one supervisor.
A database administrator suggests creating a table named Supervisor and copying the supervisor data from the Employee table to the new table. The database administrator also wants to create a foreign key in the Supervisor table to reference the Employee table. You need to evaluate the suggested change to ensure that there is minimal impact on the existing database schema. What should you conclude?
A. The suggested schema change will meet the requirements.
B. The suggested schema change will not meet the requirements. Recommend creating a table named Supervisor and copying the supervisor data from the Employee table to the new table. Create a foreign key in the Employee table to reference the Supervisor table.
C. The suggested schema change will not meet the requirements. Recommend creating a column named SupervisorID in the Employee table to reference the supervisor for an employee. Create a foreign key between this column and the Employee table.
D. The suggested schema change will not meet the requirements. Recommend creating a column named LineWorkerID in the Employee table to reference the line worker for a supervisor. Create a foreign key between this column and the Employee table.
Answer: C

Q: 10 You are an enterprise application developer. You are designing a Microsoft Windows-based application that will use a third-party library. The third-party library is available in a single assembly. The library contains classes inside the Com.Util namespace. You can access the source code for this library. You must provide additional functionality that is not available in the third-party library. To conform to corporate policy, the additional functionality must be available in the Com.Util namespace. A developer in your team decides to implement the additional functionality by modifying the source code of the third-party library. You need to evaluate whether this implementation simplifies maintenance when new versions of the third-party library are released. What should you conclude?
A. The current implementation satisfies the requirements.
B. The current implementation does not satisfy the requirements. You need to create partial classes inside the third-party library for the extra functionality. Compile the partial classes as a single assembly and use it in the application.
C. The current implementation does not satisfy the requirements. You need to create a separate assembly and create classes inside the Com.Util namespace. Use this assembly along with the third-party library assembly in the application.
D. The current implementation does not satisfy requirements. You need to create partial classes in a separate assembly for the classes in the third-party library assembly. Use the separate assembly along with the third-party library assembly in the application.
Answer: C

Q: 11 You are an enterprise application developer. You are creating a component that will be used in an order fulfillment process.
The component performs the following two tasks:
Modifies data in a local Microsoft SQL Server database
Adds data to a remote SQL Server database
The application that uses the component is multithreaded. Each application thread that uses the
component creates its own instances of the component classes. You need to ensure that the component either performs both tasks successfully or performs neither task. What should you do?
A. Use the System.Threading.Monitor class to synchronize the code segment that performs the data modifications and submits the message.
B. Use classes in the System.Transactions namespace to enlist both tasks in a distributed transaction.
C. Enable Multiple Active Result Sets (MARS) for each database connection.
D. Use ADO.NET DataAdapter objects that are configured to support batch updates.
Answer: B

Q: 12 You are an enterprise application developer. You are creating the first version of an application to manage rich text documents.
The application must meet the following design requirements:
Support the file system and a Microsoft SQL Server database as data stores.
Ensure the following for future versions:
o Add support for additional data stores, including network storage.
o Acquire the ability to interface with third-party-distributed authoring and versioning tools.
Bring additional storage options online without having to redeploy the entire application.
You need to identify an appropriate approach to meet these requirements. Which approach should you choose?
A. Create a single Document component to represent the rich text content of a document and include methods on the component to persist and retrieve rich text for each type of data store.
B. Create a single Document component to represent the rich text content of a document and an enumeration to represent each available data store. Include a parameter of the enumerated type in methods interfacing with a data store.
C. Create a single Document component to represent the rich text content of a document and an enumeration to represent each available data store. Include a property on the Document component to permit the selection of a data store.
D. Create a Document component to represent the rich text content of a document. Create a DocumentRepository component to manage the various data stores.
Answer: D

Q: 13 You are an enterprise application developer. You are creating a component that processes loan requests. Your component will be used inside Microsoft Windows Forms client applications. The loan request form is complex and time consuming to complete. Loan data is saved to a Microsoft SQL Server 2005 database. You need to ensure that in case of a system failure the loan officer does not need to re-enter any loan data. What should you do?
A. Implement a Private Save method that saves all Property values to the database. Call the Save method from inside your components finalizer.
B. Implement code inside the Set accessor for each Property that saves the Property value to the database.
C. Implement a Public Save method that saves all Property values to a Shared variable.
D. Implement code inside the Set accessor that saves the Property value to a Shared variable.
Answer: B

Q: 14 You are an enterprise application developer. You create a component that generates medical documents. Your component is used by multiple document management systems.
Users generate documents throughout the entire day and most documents are generated during business hours. You notice that user load is increasing and performance is degrading. You need to identify sections of code on which to focus performance tuning efforts. Which two actions should you recommend? (Each correct answer presents part of the solution. Choose two.)
A. Analyze the resource usage for the objects created in the component.
B. Analyze the execution time for methods in the component.
C. Analyze the time periods of peak frequency of document creation.
D. Analyze which application users are generating the greatest number of documents.
E. Analyze which client applications are generating the greatest number of documents.
Answer: A, B

Q: 15 You are an enterprise application developer. You are creating a component that will be deployed as part of a class library. The component must meet the following specifications:
The interface of the component must be accessible to components outside the hosting assembly.
The interface of the component must be interoperable with components written in any other .NET Framework languages.
The implementation of the component cannot be expanded upon by a derived class.
You need to design the interface of the component. Which three tasks should you perform? (Each correct answer presents part of the solution. Choose three.)
A. Apply the CLSCompliant(True) attribute to the assembly and component definition.
B. Apply the MustInherit keyword to the component definition.
C. Apply the ComVisible(True) attribute to the assembly and component definition.
D. Create a primary interop assembly for the assembly that hosts your component.
E. Apply the NotInheritable keyword to the component definition.
F. Apply the Public keyword to the component definition.
Answer: A, E, F

Q: 16 You are an enterprise application developer. You design a data access component that interacts with a Microsoft SQL Server database. The component uses a database connection string. The database connection string is stored in clear text in the ConnectionStrings section of the application configuration file. During testing, you discover that the component might be vulnerable to SQL injection attacks. You need to adopt a strategy to protect the component from SQL injection attacks. What should you do?
A. Replace all dynamic SQL statements with parameterized SQL statements that use strongly typed SQL parameters.
B. Construct all dynamic SQL statements by using a SecureString object.
C. Modify the method so that it throws an exception if the SQL statement does not return any rows.
D. Encrypt the ConnectionStrings section of the configuration file.
Answer: A

Q: 17 You are an enterprise application developer for Woodgrove Bank. You are creating an application to manage different loan types. All loan types share a common implementation for interacting with the financial systems of Woodgrove. Each loan type must implement its own rules for calculating interest. In the first version of the application, you must support car loans and house loans.
You need to develop an architecture for the different loan types within your application. What should you do?
A. Implement Loan as a MustInherit class. Implement CarLoan and HouseLoan as concrete classes.
B. Implement Loan as an interface. Implement CarLoan and HouseLoan as concrete classes.
C. Implement Loan as a concrete class. Implement CarLoan and HouseLoan as interfaces.
D. Implement Loan as a NotInheritable class. Implement CarLoan and HouseLoan as abstract classes.
Answer: A

Q: 18 You are an enterprise application developer. You are creating a .NET Remoting component. The Version 1.0 of the component is deployed as a well-known server-activated object. The strong-named component is installed into the global assembly cache. Ten distributed applications in your company utilize the component, and each application has an independent schedule for upgrades and deployment. You add new features to the component. These additions will change the signatures of the public methods on the component. You need to devise a deployment strategy for the component. What should you do?
A. Deploy the component in place of the existing well-known object.
B. Deploy the component as a well-known object.
C. Increment the version number of the component assembly. Deploy the component in place of the existing well-known object.
D. Increment the version number of the component assembly. Deploy the component as a new well-known object.
Answer: D

Q: 19 You are an enterprise application developer. You are implementing a new component for an application. The component accesses a database to populate a list of customer objects and exposes a method that is named GetAllCustomers. The component uses a design pattern to access the database only on an as-needed basis. A caching mechanism exists in a lower tier of the application architecture. The component must not cache data. You need to implement the logic for populating a list of customer objects by using a database query. You also need to ensure that you meet the company guidelines for the component design pattern. What should you do?
A. Execute a query in the constructor of the component to populate a field of type List(Of Customer). Return the List reference in the call to the GetAllCustomers method.
B. Execute a query in the static constructor of the component to populate a static field of type List(Of Customer). Return the List reference in the call to the GetAllCustomers method.
C. Execute a query in the GetAllCustomers method to populate a local variable of type List(Of Customer). Return the List reference.
D. Execute a query in the GetAllCustomers method to populate a field of type List(Of Customer) only if the field is null. Return the List reference.
Answer: C

Q: 20 You are an enterprise application developer. You are creating an application that has a layered architecture as shown in the following diagram. A component that resides in the workflow layer manages transactions across one or more activities in the business logic layer. You need to make modifications to the component. You need to identify the layers that might require modification when the component in the workflow layer is modified. Which two layers should you identify? (Each correct answer presents part of the solution. Choose two.)

A. Presentation layer
B. Service facade layer
C. Business logic layer
D. Data access layer
Answer: A, B


© 2014 Cheat-Test.com, All Rights Reserved