REAL QUESTIONS SUBMIT MATERIAL ADVERTISE
Braindumps

Microsoft

Cisco

Citrix

CIW

CompTia

CWNA

Apple

Adobe

HP

Legato

Exin

Filemaker

Brocade

Ericsson

TIA

Veritas

ISEB

SCP

IISFA

ISM

OMG

Apc

Mile2

Foundry

Huawei

McData

Symantec

TeraData

RedHat

Solar Winds

Blue Coat

Riverbed

 

 
 
Click on name of dumper to view the dump
 
James
 
 

Braindumps of 70-548
Designing and DevelopingWindows-Based Applications by
Using the Microsoft .NET Framework

 

Exam Questions, Answers, Braindumps (70-548)
Submitting dumps with some changes. The original is also available in www.braindumps.org.


QUESTION 1:
You work as the Enterprise application developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003. The design of applications forms part of your responsibilities at Abc .com. Abc .com operates as a financial institution. As such they are obligated to comply with the legislation governing the financial institutions while protecting the assets of their customers. One of these laws governing financial institutions and the rights of the customers involves the assurance that the risk of hackers tampering with information is negated. Another of these laws states that Abc .com must be able to submit data to the government in case of them auditing all transactions that involves amounts greater than $10,000. You are currently developing an application for Abc .com. This application will allow Abc .com to submit relevant data to the government. This application must thus meet the following requirements:
1. It must prevent malicious users from interpreting the data.
2. It must prevent malicious users from tampering with the data.
Following are the aspects included in the design of the application:
1. Submit data to the government by accessing an Extensible Markup Language (XML) Web service.
2. Encrypt data before transmission by using the government's public key.
It is now up to you to make a decision as to whether the design will meet the data integrity requirement.
What conclusion can you draw?
A. The design meets the data integrity requirement.
B. The design does not meet the data integrity requirement. You should use the Abc .com private key to sign the data.
C. The design does not meet the data integrity requirement. You should use the Abc .com public key to sign the data.
D. The design does not meet the data integrity requirement. You should use the government's public key to sign the data.
Answer: B
Explanation:
The design should make provision for the signing of the data to prevent malicious tampering. When you sign data, you in essence hash the data and encrypt the hash with a private key that is only known to the signer. When the government receives the data, they will decrypt the hash by using the Abc .com public key, rehash the data, and comparing the hash with the decrypted hash. If the two hash values match, then you have proof that the data was not tampered with. Thus the data integrity requirement is not met in this scenario and you should make use of the Abc .com private key to sign the data.
Incorrect answers:
A: This design does not meet with the data integrity requirements.
C: You cannot use the Abc .com public key to sign the data. Encryption makes provision for confidentiality, not data integrity. Furthermore if you encrypt data using a public key, then only the corresponding private key can be used to decrypt the data.
Because the Abc .com private key should only be available to Abc .com, the government will not be able to decrypt the data.
D: You cannot use the government public key to sign the data. Public keys are publicly available and will thus allow malicious users to tamper with the data and then resign it as if the data is still intact and not tampered with.

|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||


QUESTION 2:
You work as the Enterprise application developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003. The design of applications forms part of your responsibilities at Abc .com. Abc .com operates as a College of Education. You are planning to develop a Microsoft Windows Forms application for Abc .com. This application will allow the Abc .com educational centers to manage transcripts. The plan is to make use of Microsoft SQL Server 2005 to store the transcripts for the application. The logical design of the application indicates a many-to-many relationship between candidates and examinations. The physical design suggests making use of three tables that are named Candidate, Examination, and CandidateExamination, respectively. These three tables are to be stored in the same database.
Following is a list of the requirements that should be met by the design:
1. Referential integrity between the candidates and the examinations must be maintained by SQL Server.
2. There should be no excessive duplication of data in existence.
You need to make a decision as to whether the design meets these requirements. What conclusion can you draw?
A. The design does meet the requirements.
B. The design does not meet the requirements. The data of the three tables should be consolidated into one table named Transcript in the same database.
C. The design does not meet the requirements. The three tables should be placed in different databases on the same server.
D. The design does not meet the requirements. The data of the three tables should be consolidated into two tables named Candidate and Examination in the same database.
Answer: A
Explanation:
Since it is mentioned that there is a many-to-many relationship between two entities, there is a need for a junction table which only exists to hold data that is unique to the relationship. Because the three tables are located in the same database, you can allow SQL Server to enforce referential integrity between the tables.
Incorrect answers:
B: The three tables should not be consolidated into a single table named Transcript in the same database. This will not prevent the excessive duplication of data.
C: The three tables should not be placed in different databases on the same server. This way SQL Server cannot enforce referential integrity between data in different databases.
D: Though this consolidation of the three tables into two tables named Candidate and Examination in the same database will allow SQL Server to enforce referential integrity, it does not prevent excessive duplication of data because either Examination data would need to be duplicated for each candidate who takes a particular examination, or Candidate data would need to be duplicated for each examination that the candidate takes.

|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||


QUESTION 3:
You work as the Enterprise application developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003. Your responsibilities at Abc .com include the design and development of applications. All applications should be in a Microsoft Windows Forms environment. Abc .com offers financial and accounting services to their customers. You are currently developing a Microsoft Windows-based application for Abc .com. This application will allow the CertK ign.com employees to manage the customer accounts. The following exhibit illustrates the event handler which is called when a Abc .com employee attempts to withdraw funds from an account. Exhibit:
01 Private Sub Button_Click(ByVal sender As Object, ByVal e As EventArgs)
02 Try
03 Dim financeAccount As Account = New Account(_account TextBox.Test)
04 financeAccount.Withdraw(Double.Parse(_amountTestBox.Text))
05 Catch ex As AccountOverdraftException
06
07 End Try
08 End Sub
You need to notify the Abc .com employee if an account overdraft would occur. The Abc .com employee would then inform the customer and change the amount of the withdrawal if necessary. To this end you need to add code at line 10 to accomplish this goal. What should you do?
A. Use the Throw New ApplicationException("An account overdraft would occur.", ex); code segment.
B. Use the Throw New Exception("An account overdraft would occur."); code segment.
C. Use the MessageBox.Show("An account overdraft would occur."); code segment.
D. Use the MessageBox.Show(ex.ToString() + "An account overdraft would occur."); code segment.
Answer: C
Explanation:
When you call the Show method of the MessageBox class to display a user-friendly message you will allow the Abc .com employee to change the amount of the withdrawal without causing the application to fail.
Incorrect answers:
A: When you throw an exception it will not allow the Abc .com employee to change the amount of the withdrawal and the application will fail.
B: When you throw an exception it will not allow the Abc .com employee to change the amount of the withdrawal and the application will fail since the exception will be considered unhandled.
D: You should not pass the value returned from the ToString method of the AccountOverdraftException instance to the Show method of the MessageBox class. This would display a lot of technical information and is in no way user friendly for the Abc .com employee to know that an error has occurred.

|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||


QUESTION 4:
You work as the Enterprise application developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003. Your responsibilities at Abc .com include the design and development of applications. Abc .com has a Microsoft Windows Forms application that makes use of a printing component. This component is configured to accept XmlDocument instances that may contain graphics information. It makes use of data in these instances and GDI+ to print the graphics. You have been instructed to analyze profiling results on this application and make a decision after you have run tests on the application. To this end you then profiled the component and obtained the following information regarding performance after running it on a test computer:
1. When the method is called one, 16 MB of memory is used.
2. When the method is called twice, 32 MB of memory is used.
3. When the method is called ten times, 160 MB of memory is used.
You now need to make a decision as to what the next step of action should be. What should you do?
A. Keep on profiling the component.
B. The component should be redesigned.
C. More memory should be added to the computer.
D. A larger page file should be specified on the computer.
Answer: B
Explanation:
The result clearly indicates that there is a memory leak. It is likely that the component does not dispose GDI+ objects that it creates which results in the memory leaks. The solution and logical next step would be to redesign the component.
Incorrect answers:
A: There is no need to keep on profiling the component as it is already evident that a memory leak exists.
C: Adding more memory to the computer will only alleviate the problem of the memory leak, but will not solve it.
D : There is a memory leak that exists and specifying a larger page file size will not completely solve the problem.

|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||


QUESTION 5:
You work as the Enterprise application developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003. Your responsibilities at Abc .com include the design and development of Application Frameworks. You are currently developing a Microsoft Windows Forms application. You are required to make use of a stock control in the application. To this end you examine a third party component that implements stock control. This specific component was implemented by using the Microsoft .NET Framework 1.1. You disassemble the code and discovered the following code:
Friend MustInherit Class Stock
Inherits Control
Public Sub New()
MyBase.New
End Sub
Protected Overrides Sub OnPaint(ByVal e As PaintEventArgs)
'Paint the control
MyBase.OnPaint(e)
End Sub
End Class
You must change the way the Stock control paints itself. Thus you need to take a decision as to whether you can reuse the component to meet this requirement. What conclusion can you draw?
A. The component is reusable.
B. The component is not reusable. The OnPaint method must specify the abstract inheritance modifier.
C. The component is not reusable. The OnPaint method must specify the virtual inheritance modifier.
D. The component is not reusable. The Stock class must specify the public access modifier.
Answer: D
Explanation:
The component is not reusable as the Stock class is declared with the internal access modifier; it cannot be accessed from outside the assembly in which it exists. It needs to specify the public access modifier. The .NET Framework 2.0 does have the InternalsVisible To attribute, but not the .NET Framework 1.1 version with which this component was created.
Incorrect answers:
A: The component is not reusable since you will require the Stock class to specify the public access modifier.
B: The abstract modifier indicates that a class member must be implemented by a derived class. In this case you cannot override the Stock class because it is declared with the internal access modifier.
C: The virtual inheritance modifier allows derived classes to override a class member, but the override inheritance modifier also allows derived classes to override a class member if the sealed inheritance modifier is not applied to the member. Thus you cannot conclude that the OnPaint method must specify the virtual inheritance modifier.

|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||


QUESTION 6:
You work as the Enterprise application developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003. Your responsibilities at Abc .com include the design and development of Application Frameworks. You are developing Microsoft Windows Forms applications. You are required to display an opaque stock on a form in a Windows application. To this end you examine a third-party component that implements solid Stock control. This control has all of the functionality that you require, except for the fact that it does not display as an opaque stock. The following exhibit illustrates the class definition:
Exhibit:
Public Class Stock
Inherits Control
Protected Overrides Sub OnPaint(ByVal e As PaintEventArgs)
'Paint a solid stock
'Do not call the base OnPaint method
End Sub
End Class
You need to reuse the Stock control. You must ensure that your solution allows for changes made to the Stock control to be reflected automatically in the application. What should you do? (Choose the appropriate code segment.)
A. Public Class SolidStock
Inherits Stock
Private _stock As Stock = New Stock()
Protected Overrides Sub OnPaint(ByVal e As PaintEventArgs)
'Paint a solid stock
AddHandler _stock.Paint,AddressOf StockPaint
End Sub
Private Sub StockPaint(ByVal sender As Object, ByVal e As PaintEventArgs)
OnPaint(e)
End Sub
End Class
B. Public Class SolidStock
Private _stock As Stock = New Stock()
Protected Sub OnPaint(ByVal e As PaintEventArgs)
'Paint a solid stock
AddHandler _stock.Paint,AddressOf StockPaint
End Sub
Private Sub StockPaint(ByVal sender As Object, ByVal e As PaintEventArgs)
OnPaint(e)
End Sub
End Class
C. Public class SolidStock
Inherits Control
Protected Overrides Sub OnPaint(ByVal e As PaintEventArgs)
'Paint a solid stock
End Sub
End Class
D. Public Class SolidStock
Inherits Stock
Protected Overrides (Sub OnPaint(ByVal e As PaintEventArgs)
'Paint a solid stock
End Sub
End Class
Answer: D
Explanation:
The SolidStock class must be derived from the Stock class and override the OnPaint method. This will allow you to inherit all the functionality of the Stock control except for painting functionality. In the overridden OnPaint method, you should implement the painting logic for displaying a solid stock.
Incorrect answers:
A: You should not declare the SolidStock class without specifying a Control-derived base class. Only classes that derive directly or indirectly from Control can be visually displayed on forms.
B: There is no need to attach an event handler to the Paint event of the Stock class. The OnPaint method of the Stock class does not call the OnPaint method of the Control class; however, the OnPaint method of the control class is responsible for raising the Paint event. And in this scenario the Paint event never gets raised.
C: You should not derive the SolidStock class from control as it will not allow you to reuse the functionality that is exposed by the Stock control.

|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||


QUESTION 7:
You work as the Enterprise application developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003 and all client computers run Microsoft Windows XP Professional. Your responsibilities at Abc .com include the testing and stabilization of Applications. One of the Abc .com Windows Forms applications contains the following production environment specifications:
1. The application is deployed to production desktop computers.
2. A Web service that is used by the application is deployed to a production Web server.
3. The production desktop computers run Microsoft Windows XP Professional.
Following is the test environment specification for performance testing that the development team created:
1. The application is deployed to production desktop computers.
2. The Web service is deployed to a staging Web server.
3. The staging Web server's hardware configuration is identical to the production Web server.
4. The Web servers have 1 gigabyte (GB) of memory.
You need to make a decision as to whether the test environment specification is appropriate.
What conclusion can you draw?
A. The test environment is appropriate.
B. The test environment is inappropriate. The Web service should be deployed to the production Web server.
C. The test environment is inappropriate. The staging Web server's hardware configuration should be changed.
D. The test environment is inappropriate. The application should be deployed to test desktop computers.
Answer: D
Explanation:
When testing an application for performance, one should perform testing in an isolated environment that is similar to the production environment and not to the production desktop computers as suggested in the question. The test environment is thus inappropriate. You should also be making use of test desktop computers.
Incorrect answers:
A: This is incorrect since you should not make use of production desktop computers when doing performance testing.
B: You should not be deploying the Web service to the production server; it should be deployed to a staging server so as to facilitate the isolation aspect of performance testing.
C: There is no need to change the hardware configuration of the staging server because the test environment should mimic the production environment which also includes hardware configuration.

|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||


QUESTION 8:
You work as the Enterprise application developer at Abc .com. The Abc .com network consists of a single Active Directory domain named Abc .com. All servers in the domain run Windows Server 2003 and all client computers run Microsoft Windows XP Professional. Your responsibilities at Abc .com include the testing and stabilization of Applications. You are currently evaluating an existing performance testing strategy for one of the Microsoft Windows Forms applications for Abc .com. This application was developed to allow the Abc .com customers to scan checks and submit the images to financial institutions electronically. The performance testing strategy that is under scrutiny now specifies that the actual rate at which checks are imaged and stored into a database will be compared against a preferred rate. You need to make a decision as to whether the performance strategy is appropriate. What conclusion can you draw?
A. The performance testing strategy is appropriate.
B. The performance testing strategy is inappropriate. The number of checks that are imaged correctly should be identified.
C. The performance testing strategy is inappropriate. The number of checks that are imaged incorrectly should be identified.
D. The performance testing strategy is inappropriate. The number of checks that cannot be imaged due to physical defects should be identified.
Answer: A
Explanation:
The test identifies the rate at which the checks are imaged and stored in a database. This will allow you to determine whether the check imaging process is performing as expected. Thus this strategy is an appropriate one.
Incorrect answers:
B: When one test application performance one does not identify the number of checks that are imaged correctly; one test the application according to predefined thresholds.
C: When one test application performance one does not identify the number of checks that are imaged incorrectly; one test the application according to predefined thresholds.
D: You should not be identifying the number of checks that cannot be imaged due to physical defects when testing application performance. This will not allow you to control the validity of the checks with the application.

|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||

 

70-548


 

 

Braindumps Real exam questions and verified answers - 100% passing guarantee - cheap prices.

 

Free brain dumps Braindumps, notes, books for free

 

Braindumps and Exams - Instant download real exam questions - Passing guarantee.

Follow us on FaceBook
Braindumps on Facebook
 
 
 
 
 

CheckPoint

Linux

Novell

DB/2

Network Appliance

EC-Council

Nortel

McAfee

Juniper

ISACA

PMI

Sybase

EMC

HDI

SNIA

ISC

Sair

IBM

Lotus

Exam Express

3COM

BICSI

DeLL

Enterasys

Extreme Networks

Guidance Software

Computer Associates

Network General

SAS Institute

Alcatel Lucent

SeeBeyond

TruSecure

Polycom

Hyperion

Hitachi

Nokia

Fortinet

Vmware

Fujitsu

Tibco

Intel

PostgreSQLCE

BusinessObjects

RESSoftware

BlackBerry

AccessData

ICDL

Isilon

SAP

The Open Group

ACSM

Altiris

Avaya

Cognos

F5

Genesys

SDI

ACI

ASQ

Google

H3C

HIPAA

HRCI

SOA

IIBA

Zend