Microsoft 70-554 Real Exam Questions
UPGRADE: MCSD Microsoft .NET Skills to MCPD Enterprise Application Developer by Using the Microsoft .NET Framework: Part 2
1: You write an XML Web service. The XML Web service contains Web methods that return large amounts of non-sensitive public data. The data is transferred over the Internet. You need to be able to detect if the data was tampered with during transit. The implementation must be configurable at run time. Your solution must minimize the impact on the performance of the Web service. What should you do?
A.Configure the virtual directory to require the Secure Sockets Layer (SSL) protocol.
B.Apply Web Services Enhancements (WSE) 3.0 security to the Web service that is configured to use an X.509 certificate with the Sign and Encrypt protection level.
C.Apply Web Services Enhancements (WSE) 3.0 security to the Web service that is configured to use an X.509 certificate with the Sign-Only protection level.
D.Configure the virtual directory that hosts the XML Web service to use basic authentication.
Correct Answers: C
2: You are writing a Web service application that uses Web Services Enhancements (WSE) 3.0 policies. The Web service request and response data must be signed. Routing occurs between the client and server computers, and uses the Action SOAP header of the SOAP messages. You need to ensure that the SOAP signature is not invalidated when the SOAP message is routed. What should you do?
A.In the policy file, set the signatureOptions attribute to IncludeAddressing.
B.In the policy file, set the signatureOptions attribute to IncludeSoapBody.
C.Sign the SOAP request with a UserName token that includes a password to allow the SOAP message to be signed again during routing.
D.Sign a SOAP request that encapsulates the initial SOAP request.
Correct Answers: B
3: You write a client application that uses a Web service. The Web service is hosted in a Windows service application. The Web service can be called only by using TCP. You are provided with the proxy that is enabled by Web Services Enhancements (WSE) 3.0. The proxy was generated by adding a Web reference by using Microsoft Visual Studio 2005. You need to ensure that the proxy calls the Web service correctly. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
A.On the Destination property of the proxy, set the TransportAddress property to the TCP address of the hosted Web service.
B.Set the Action object in the SOAP request’s addressing headers to the name of the Web service method you want to call.
C.Change the URL of the proxy to the TCP address of the hosted Web service.
D.Set the Action object in the SOAP request’s addressing headers to the TCP address of the Web service you want to call.
Correct Answers: B C
4: You write a Web service that uses Web Services Enhancements (WSE) 3.0 for security. The Web service must support both the kerberosSecurity policy and the mutualCertificateSecurity policy. Both policies have the same options set for encryption and signatures. You need to ensure that the Web service can use either policy. What should you do?
A.Create two policy files: one with the kerberosSecurity policy, and the other with the mutualCertificateSecurity policy.
B.Create one policy file that contains a policy element for the kerberosSecurity policy and a policy element for the mutualCertificateSecurity policy.
C.Create one policy file that contains a policy element, which contains a kerberosSecurity policy element and a mutualCertificateSecurity policy element.
D.Create two policy files: one with the Extensions element, and the other with a single policy element that contains both the kerberosSecurity policy element and the mutualCertificateSecurity policy element.
Correct Answers: B
5: A Web service application provides security data about employees to applications that control access to company facilities. The Web service is accessed by using TCP and is protected by using Web Services Enhancements (WSE) 3.0 security for message encryption. The company has added fingerprint readers to grant employees access to the facilities. Images of employee fingerprints are maintained by the Web service application. You need to ensure that the existing WSE security encryption policy can be applied to the fingerprint image. Your solution must minimize the size of the Web service message. What should you do?
A.Configure the Web service to use base64 encoding to pass the binary fingerprint image.
B.Configure the Web service to use Message Transmission Optimization Mechanism (MTOM) to pass the binary fingerprint image.
C.Create a SOAP filter to manage encryption for the message.
D.Create a SOAP extension to manage encryption for the message.
Correct Answers: B
6: You have a Web service that is deployed on an unsecured network. You need to implement encryption on the Web service. The implementation must be configurable at run time. What should you do?
A.Write a custom SOAP extension attribute class to encrypt and decrypt the SOAP message. Apply the attribute to the Web service class.
B.Apply Web Services Enhancements (WSE) 3.0 security to the Web service that is configured to use an X.509 certificate with the Sign and Encrypt protection level.
C.Apply Web Services Enhancements (WSE) 3.0 security to the Web service that is configured to use an X.509 certificate with the Sign-Only protection level.
D.Write custom code in each Web method of the Web service that encrypts the data by using the DESCryptoServiceProvider class.
Correct Answers: B
7: You are an enterprise application developer. You create an application that has three layers:
Layer 1 contains the Microsoft Windows client and the input validation logic.
Layer 2 contains business entities, business workflows, and business rules.
Layer 3 contains the data access classes and stored procedures.
You need to analyze the layers and identify dependencies that exist between these layers. Which two dependencies should you identify? (Each correct answer presents part of the solution. Choose two.)
A.Layer 1 depends on Layer 2.
B.Layer 3 depends on Layer 1.
C.Layer 2 depends on Layer 3.
D.Layer 1 depends on Layer 3.
E.Layer 2 depends on Layer 1.
Correct Answers: A C
8: You are an enterprise application developer. You are creating an application that will track shipments. This application must support integration with applications that run on different platforms and operating systems. The application that you are creating can be invoked only through SOAP messages over HTTP. You choose Web services instead of .NET Remoting to meet these requirements. You need to specify the reason for choosing Web services. Which statement should influence your decision?
A.SOAP messages cannot be exchanged in .NET Remoting.
B.Web Services Description Language documents cannot be generated from .NET Remoting class definitions.
C..NET Remoting objects will not be interoperable with other platforms.
D..NET Remoting objects cannot be invoked through HTTP.
Correct Answers: C
9: You are an enterprise application designer. You are designing a three-tier enterprise application. The application currently consists of a business layer and a data layer. The application must perform the following tasks:
Support a smart client interface and a Web client interface.
Achieve maximum reuse between the smart client interface and the Web client interface.
Reduce code duplication.
The systems analyst recommends adding a UI layer to perform the required tasks. You need to evaluate this recommendation. What should you conclude?
A.Adding a UI layer will meet the requirements.
B.Adding a UI layer will not meet the requirements. Recommend adding a UI process layer.
C.Adding a UI layer will not meet the requirements. Recommend adding a service layer.
D.Adding a UI layer will not meet the requirements. Recommend adding a business workflow layer.
Correct Answers: B
Download | Password: certificatexam.com