Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

Microsoft 70-549 Exam - Cheat-Test.com

Free 70-549 Sample Questions:

1. You are an enterprise application developer. You are implementing a new component for an application.
The component accesses a database to populate a list of customer objects and exposes a method that is named GetAllCustomers.
The component uses a design pattern to access the database only on an as­needed basis. A caching mechanism exists in a lower tier of the application architecture. The component must not cache data.
You need to implement the logic for populating a list of customer objects by using a database query. You also need to ensure that you meet the company guidelines for the component design pattern.
What should you do?
A. Execute a query in the constructor of the component to populate a field of type List(Of Customer). Return the List reference in the call to the GetAllCustomers method.
B. Execute a query in the static constructor of the component to populate a static field of type List(Of Customer). Return the List reference in the call to the GetAllCustomers method.
C. Execute a query in the GetAllCustomers method to populate a local variable of type List(Of Customer). Return the List reference.
D. Execute a query in the GetAllCustomers method to populate a field of type List(Of Customer) only if the field is null. Return the List reference.
Answer: C

2. You are an enterprise application developer. You create a component that exposes a Shared method. The Shared method performs a complex business algorithm and the method must support concurrent callers. You use asynchronous processing to implement the method.
You need to ensure that the client application is notified about the completion of the method. What should you do?
A. Add a Public Shared Event to the component and raise the event when processing is complete.
B. Pass a callback Delegate from the client application as a parameter to the processing method. Invoke the Delegate when processing is complete.
C. Add a Public Shared Property to the component and permit the client application to poll the component for completion.
D. Add a constructor that accepts a callback Delegate as parameter from the client application. Invoke the Delegate when processing is complete.
Answer: B

3. You are an enterprise application developer. You are creating a component that will be deployed as part of a class library. The component must meet the following specifications:
The interface of the component must be accessible to components outside the hosting assembly. The interface of the component must be interoperable with components written in any other .NET Framework languages.
The implementation of the component cannot be expanded upon by a derived class. You need to design the interface of the component.
Which three tasks should you perform? (Each correct answer presents part of the solution. Choose three.)
A. Apply the CLSCompliant(True) attribute to the assembly and component definition.
B. Apply the MustInherit keyword to the component definition.
C. Apply the ComVisible(True) attribute to the assembly and component definition.
D. Create a primary interop assembly for the assembly that hosts your component.
E. Apply the NotInheritable keyword to the component definition. F. Apply the Public keyword to the component definition.
Answer: A, E, F

4. You are an enterprise application developer for Woodgrove Bank. You are creating an application to manage different loan types.
All loan types share a common implementation for interacting with the financial systems of Woodgrove.
Each loan type must implement its own rules for calculating interest. In the first version of the application, you must support car loans and house loans.
You need to develop an architecture for the different loan types within your application. What should you do?
A. Implement Loan as a MustInherit class. Implement CarLoan and HouseLoan as concrete classes.
B. Implement Loan as an interface. Implement CarLoan and HouseLoan as concrete classes.
C. Implement Loan as a concrete class. Implement CarLoan and HouseLoan as interfaces.
D. Implement Loan as a NotInheritable class. Implement CarLoan and HouseLoan as abstract classes.
Answer: A

5. You are an enterprise application developer. You are creating a component that processes loan requests. Your component will be used inside Microsoft Windows Forms client applications.
The loan request form is complex and time consuming to complete. Loan data is saved to a Microsoft SQL Server 2005 database.
You need to ensure that in case of a system failure the loan officer does not need to re­enter any loan data. What should you do?
A. Implement a Private Save method that saves all Property values to the database. Call the Save method from inside your components finalizer.
B. Implement code inside the Set accessor for each Property that saves the Property value to the database.
C. Implement a Public Save method that saves all Property values to a Shared variable.
D. Implement code inside the Set accessor that saves the Property value to a Shared variable.
Answer: B

6. You are an enterprise application developer. You are creating a component to process geospatial data. The component retrieves large sets of data from a Microsoft SQL Server database. Each data point consists of two decimal values: one value represents longitude and the other value represents latitude.
You need to design a data format that minimizes the managed heap memory allocation needed for each data point within the component.
What should you do?
A. Design a custom class that contains Private fields for the longitude and the latitude, and design read­only Public properties for the longitude and the latitude.
B. Design an XML element that contains an attribute for each longitude value and each latitude value.
C. Design an ADO.NET DataRow class that contains DataColumns for the longitude and latitude values.
D. Design a custom Structure that contains a Public field for the longitude value and a Public field for the latitude value.
Answer: D

7. You are an enterprise application developer. You create a Microsoft Windows client application that communicates with a business layer component.
The business layer component contains the following class, named Utility. Public Class Utility
Public Sub New()
...
End Sub
Public Sub ChangeData()
...
End Sub
End Class
The application must fulfill the following criteria:
Instances of the Utility class must be created only within the business component.
The Windows client application must be able to invoke the methods inside the Utility class. You review the code for the Utility class and decide it requires modification.
You need to recommend modifications for the code. What should you recommend?
A. Change the scope of the constructor to Private.
B. Change the scope of the constructor to Friend.
C. Change the scope of the Utility class to Private.
D. Change the scope of the Utility class to Friend.
Answer: B

8. You are an enterprise application developer. You create a data access layer for an order processing application.
The data access layer meets the following criteria:
The data access layer contains a GetConnectionString method to retrieve and return the connection string for the database.
The data access layer contains a stored procedure named GetTotalOrderAmount.
The stored procedure runs a select query to return only the sum of the OrderAmount column for the active orders. At times, there might be no active orders.
You create the following method to execute the stored procedure and return the total.
Public Function GetTotalOrderAmount() As Double
Dim con As New SqlConnection(GetConnectionString()) Dim sql As String = "GetTotalOrderAmount"
Dim cmd As New SqlCommand(sql, con)
Dim rd As IDataReader = cmd.ExecuteReader() Dim amt As Double = 0.0
If rd.Read() Then
amt = rd.GetDouble(0) End If
rd.Close() con.Close() Return amt End Function
You need to review the code and recommend modifications to simplify the code and improve performance, if necessary.
What should you conclude and recommend?
A. The code does not need to be modified.
B. The code needs to be modified. You must remove the condition that verifies whether the DataReader object returned any rows.
C. The code needs to be modified. You must use a DataSet object instead of a DataReader object.
D. The code needs to be modified. You must use the ExecuteScalar method instead of the ExecuteReader method.
Answer: D

9. You are an enterprise application developer. You are performing a peer code review for an entry­level developer. The developer is implementing server­side business objects.
The business objects must be accessed and activated by using .NET Framework remoting. In addition, the business objects must meet the following requirements:
Implement an interface for client­side access. Inherit from a base business object class.
The developer writes the following code segment.
Public Class UserObject
Inherits BaseBizObject, MarshalByRefObject
Implements IUserObject
End Class
When the developer attempts to compile the code, an error message is received. You need to review the code and recommend a solution.
What should you recommend?
A. The class must derive from the MarshalByRefObject class. The UserObject class can access methods in the BaseBizObject class by creating an instance of the BaseBizObject class.
B. The class must derive from the BaseBizObject class. The BaseBizObject class must derive from the MarshalByRefObject class.
C. Change the approach so that the client computer accesses a wrapper class that derives from the MarshalByRefObject class.
D. The class must derive from the MarshalByValue class instead of the MarshalByRefObject class.
Answer: B

10. You are an enterprise application developer. You are manipulating a collection of customer, product, and supplier objects. The collection objects must fulfill the following requirements:
The objects must use custom sort methods on different properties of the respective classes.
The objects must be strongly typed.
A developer from your team decides to use the following collection classes. Public MustInherit Class MyCollectionBase Inherits System.Collections.CollectionBase
Public MustOverride Sub Sort() End Class
Public Class CustomerCollection
Inherits MyCollectionBase
'Code overrriding CollectionBase methods
Public Overrides Sub Sort()
'Customer sorting method
End Sub
End Class
Public Class SupplierCollection
Inherits MyCollectionBase
'Code overrriding CollectionBase methods
Public Overrides Sub Sort()
'Supplier sorting method
End Sub
End Class
Public Class ProductCollection
Inherits MyCollectionBase
'Code overrriding CollectionBase methods
Public Overrides Sub Sort()
'Product sorting method
End Sub
End Class
You need to review the code and recommend improvements to simplify maintenance, if necessary. What should you conclude and recommend?
A. The code does not need to be modified.
B. The code needs to be modified. The MyCollectionBase class must implement the ICollection interface instead of inheriting from the CollectionBase class.
C. The code needs to be modified. Use List(Of T) class instead of creating custom collections.
D. The code needs to be modified. The child collection classes must inherit from the CollectionBase class instead of the MyCollectionBase class.
Answer: C

11. You are an enterprise application developer. You are creating a client/server application. You need to install the application on the company network.
The client/server application must meet the following criteria:
The server component is a class library that is created by using the .NET Framework.
The client component is a Microsoft Windows­based application that is created by using the .NET Framework.
The client component and the server component must communicate by using a binary protocol. The fewest possible ports are opened between the client component and the server component.
You need to identify a technology that permits the server to communicate with the client component through the TCP/IP protocol.
Which technology should you use?
A. Message Queuing
B. .NET Remoting
C. Web services
D. DCOM
Answer: B

12. You are an enterprise application developer. You are creating an application that will track shipments. This application must support integration with applications that run on different platforms and operating systems. The application that you are creating can be invoked only through SOAP messages over HTTP.
You choose Web services instead of .NET Remoting to meet these requirements.
You need to specify the reason for choosing Web services.
Which statement should influence your decision?
A. SOAP messages cannot be exchanged in .NET Remoting.
B. Web Services Description Language documents cannot be generated from .NET Remoting class definitions.
C. .NET Remoting objects will not be interoperable with other platforms.
D. .NET Remoting objects cannot be invoked through HTTP.
Answer: C

13. You are an enterprise application developer. You are creating an application for the sales department. Users in the sales department are occasionally connected to the network. Users enter orders through a smart client interface. The orders are sent to a business component that is installed on an application
server. The business component updates the orders.
You need to ensure that the orders are reliably delivered to the server. Which technology should you choose?
A. .NET Remoting
B. Web services
C. Message Queuing
D. DCOM
Answer: C

14. You are an enterprise application developer. You are designing a Microsoft Windows­based application that will use a third­party library. The third­party library is available in a single assembly. The library contains classes inside the Com.Util namespace. You can access the source code for this library. You must provide additional functionality that is not available in the third­party library. To conform to corporate policy, the additional functionality must be available in the Com.Util namespace.
A developer in your team decides to implement the additional functionality by modifying the source code of the third­party library.
You need to evaluate whether this implementation simplifies maintenance when new versions of the third­party library are released.
What should you conclude?
A. The current implementation satisfies the requirements.
B. The current implementation does not satisfy the requirements. You need to create partial classes inside the third­party library for the extra functionality. Compile the partial classes as a single assembly and use it in the application.
C. The current implementation does not satisfy the requirements. You need to create a separate assembly and create classes inside the Com.Util namespace. Use this assembly along with the third­party library assembly in the application.
D. The current implementation does not satisfy requirements. You need to create partial classes in a separate assembly for the classes in the third­party library assembly. Use the separate assembly along with the third­party library assembly in the application.
Answer: C

15. You are an enterprise application developer. You are creating an application. The application uses different database products for different customers.
You need to ensure maximum reuse of the code that is available in the different layers of the application. You also need to ensure that the application uses the unique features of each database product.
Which layer should you create for each database product?
A. Business layer
B. Data access layer
C. Business process layer
D. Service layer
Answer: B

16. You are an enterprise application developer. You are creating the first version of an application to manage rich text documents.
The application must meet the following design requirements:
Support the file system and a Microsoft SQL Server database as data stores. Ensure the following for future versions:
oAdd support for additional data stores, including network storage.
oAcquire the ability to interface with third­party­distributed authoring and versioning tools. Bring additional storage options online without having to redeploy the entire application.
You need to identify an appropriate approach to meet these requirements. Which approach should you choose?
A. Create a single Document component to represent the rich text content of a document and include methods on the component to persist and retrieve rich text for each type of data store.
B. Create a single Document component to represent the rich text content of a document and an enumeration to represent each available data store. Include a parameter of the enumerated type in methods interfacing with a data store.
C. Create a single Document component to represent the rich text content of a document and an enumeration to represent each available data store. Include a property on the Document component to permit the selection of a data store.
D. Create a Document component to represent the rich text content of a document. Create a DocumentRepository component to manage the various data stores. Answer: D

17. You are an enterprise application developer. You create an application that has three layers: Layer 1 contains the Microsoft Windows client and the input validation logic.
Layer 2 contains business entities, business workflows, and business rules.
Layer 3 contains the data access classes and stored procedures.
You need to analyze the layers and identify dependencies that exist between these layers.
Which two dependencies should you identify? (Each correct answer presents part of the solution. Choose two.)
A. Layer 1 depends on Layer 2.
B. Layer 3 depends on Layer 1.
C. Layer 2 depends on Layer 3.
D. Layer 1 depends on Layer 3.
E. Layer 2 depends on Layer 1.
Answer: A, C

18. You are an enterprise application developer.
Your company operates a Microsoft Windows­based client application. The application is deployed to 50 client computers on the network. The application uses a separate class library as a data access layer. The data access layer is currently deployed to the application folder of the client application.
It is time consuming to deploy new versions of the data access layer.
You need to evaluate the current physical design of the application and recommend changes to speed up deployment of new versions of the data access layer.
What should you recommend?
A. Deploy the data access layer component to the global assembly cache of a server on the network
B. Deploy the data access layer component to the Windows system folder. Use a <codeBase> tag in the Windows­based client application configuration file to point to the deployed library.
C. Deploy a copy of the data access layer component to the global assembly cache along with each instance of the Windows­based client application.
D. Deploy the data access layer component to a server on the network. Use a <codeBase> tag in the Windows­based client application configuration file to point to the deployed library.
Answer: D

19. You are an enterprise application developer. You are designing an application. The database for the application currently has a one­to­one relationship between order and product.
The application must meet the following business requirements: An order must contain orders for many products.
An order must store the ordered quantity of each product.
You need to evaluate the existing design and recommend changes to meet the business requirements. Which two changes should you recommend? (Each correct answer presents a complete solution. Choose two.)
A. Change the relationship between order and product to one­to­many.
B. Change the relationship between order and product to many­to­many.
C. Create a new table named Order line. Establish a one­to­many relationship between order and Order line and a one­to­one relationship between product and Order line.
D. Create a new table named Order line. Establish a one­to­many relationship between order and Order line and a one­to­many relationship between product and Order line.
Answer: B, D

20. You are an enterprise application developer. You are evaluating a database design for a human resource application. The existing database schema meets the following criteria:
The database has an Employee table.
The Employee table has an Employee ID field and several other fields. You must accommodate the following new requirements:
Employees are either supervisors or line workers.
A supervisor will supervise zero or more line workers.
An employee will be supervised by only one supervisor.
A database administrator suggests creating a table named Supervisor and copying the supervisor data from the Employee table to the new table. The database administrator also wants to create a foreign key in the Supervisor table to reference the Employee table.
You need to evaluate the suggested change to ensure that there is minimal impact on the existing database schema.
What should you conclude?
A. The suggested schema change will meet the requirements.
B. The suggested schema change will not meet the requirements. Recommend creating a table named Supervisor and copying the supervisor data from the Employee table to the new table. Create a foreign key in the Employee table to reference the Supervisor table.
C. The suggested schema change will not meet the requirements. Recommend creating a column named SupervisorID in the Employee table to reference the supervisor for an employee. Create a foreign key between this column and the Employee table.
D. The suggested schema change will not meet the requirements. Recommend creating a column named LineWorkerID in the Employee table to reference the line worker for a supervisor. Create a foreign key between this column and the Employee table.
Answer: C

21. You are an enterprise application developer. You are designing a Web­based application to maintain appointment details.
You consider implementing the following steps to delete an appointment:
Enter a date range or a client ID, or enter a date range and a client ID to get a list of appointments. Click the Appointment hyperlink. The appointment details are retrieved and displayed.
Click the Delete button.
You need to analyze the requirements and recommend stored procedures.
Which three stored procedures should you recommend? (Each correct answer presents part of the solution. Choose three.)
A. Search for appointments by using client ID.
B. Search for appointments by using date range.
C. Search for appointments by using client ID and date range.
D. Verify if an appointment exists.
E. Retrieve an appointment.
F. Retrieve and delete an appointment.
G. Delete an appointment.
Answer: C, E, G

22. You are an enterprise application developer. You are creating a three­tier application. The business layer contains 10 business functions. These business functions write messages to message queues and update records in a Microsoft SQL Server database.
You need to identify the transaction mechanism for these business functions to group both the activities together as one atomic transaction unit.
Which transaction mechanism should you choose?
A. ADO.NET transaction
B. T­SQL transaction
C. COM+ transaction
D. ASP.NET transaction
Answer: C

23. You are an enterprise application developer. You are evaluating a component that monitors a Web­based application.
The component stores monitoring information in a database and performs the following functions: Retrieves the number of orders placed per second.
Tracks the data for peak usage of the application and displays the data in a tabular form. Subsequently, monitoring requirements change in the following manner:
Users must be able to view data graphically. Users must be able to analyze data in real time.
Users must be able to correlate the number of orders placed per second with the memory usage in the Web server.
You need to evaluate whether the component meets the new requirements and propose a solution, if required.
What should you conclude?
A. The component meets the new requirements.
B. The component does not meet the new requirements. You need to update a text file by using trace statements instead of storing data in a database.
C. The component does not meet the new requirements. You need to update a custom performance counter instead of a database.
D. The component does not meet the new requirements. You need to update a custom event log instead of a database.
Answer: C

24. You are an enterprise application designer. You are designing a three­tier enterprise application. The application currently consists of a business layer and a data layer.
The application must perform the following tasks:
Support a smart client interface and a Web client interface.
Achieve maximum reuse between the smart client interface and the Web client interface.
Reduce code duplication.
The systems analyst recommends adding a UI layer to perform the required tasks. You need to evaluate this recommendation.
What should you conclude?
A. Adding a UI layer will meet the requirements.
B. Adding a UI layer will not meet the requirements. Recommend adding a UI process layer.
C. Adding a UI layer will not meet the requirements. Recommend adding a service layer.
D. Adding a UI layer will not meet the requirements. Recommend adding a business workflow layer.
Answer: B

25. You are an enterprise application developer. You are designing an intranet Web application. This application must meet the following requirements:
The employees must log on to use the application.
The database authentication mechanism must be as secure as possible. The number of connection pools must be minimized.
You decide to use Microsoft SQL Server authentication and a specific SQL Server account. You need to evaluate whether the design will meet the business requirements and make recommendations, if required.
What should you conclude?
A. The design meets the requirements.
B. The design does not meet the requirements. Use Windows Authentication with a specific Windows account.
C. The design does not meet the requirements. Use SQL Server authentication and the credentials of the logged on user.
D. The design does not meet the requirements. Use Windows Authentication with the Windows account of the logged on user.
Answer: B

26. You are an enterprise application developer. You are evaluating the physical design of a Web­based application. Fifty customers will use the application from different regions.
The use of the application will trigger events of different severities. These events must be logged, extracted, and then filtered on the basis of customer, region, or severity of events. The event details also must be persisted, backed up, and archived for later retrieval.
The development team plans to use an event log for logging events. On evaluation, you find the plan does not meet the requirements.
You need to explain why an event log fails to meet the requirements. What should you conclude?
A. Event logs cannot track custom application events.
B. Event logs cannot be filtered to meet the requirements.
C. Event logs cannot be backed up or archived.
D. Event logs cannot be persisted and will be deleted when the Web server shuts down.
Answer: B

27. You are an enterprise application developer. Your company has a Web­based application that runs on a single Web server. Session information is currently being stored by using the default session mode.
You are redesigning the application to run in a Web farm. You must ensure that the failure of any single server does not make session information unavailable. A developer in your team recommends using the default session mode on each server in the Web farm.
You need to evaluate this recommendation. What should you conclude?
A. The recommended solution meets the requirements.
B. The recommended solution does not meet the requirements. Store the session information in a separate state process on each Web server in the Web farm.
C. The recommended solution does not meet the requirements. Store the session information in a separate state process on a dedicated session state server.
D. The recommended solution does not meet the requirements. Store the session information in a Microsoft SQL Server failover cluster.
Answer: D


© 2014 Cheat-Test.com, All Rights Reserved