A developer is designing a multi-tier application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, the application needs to find, in a transparent manner, the heterogeneous business components used to service the client’s requests. Which design patterns, working together, address these issues?()
第1题:
A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()
第2题:
A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()
第3题:
A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()
第4题:
You work as an ASP.NET Web Application Developer for SomeCompany. The company uses Visual Studio .NET 2010 as its application development platform. You have recently finished the development of an ASP.NET Web application using .NET Framework 4.0. Now, you are deploying the ASP.NET Web application to a remote server. You are required to select a deployment method that will make sure that all Internet Information Services (IIS) settings, in addition to the Web content, are deployed to the remote server. Which of the following deployment methods will you select to accomplish this?()
第5题:
You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()
第6题:
You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment. The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application. You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort. What should you do? ()
第7题:
A developer is designing a multi-tier web application and discovers a need to hide the details of establishingand maintaining remote communications from the client. In addition, the application needs to find,in a transparent manner,the heterogeneous business components used to service the client’s requests. Which design patterns, working together, address these issues?()
第8题:
Flyweight
Transfer Object
Service Locator
Dispatcher View
Business Delegate
Model-View-Controller
第9题:
Transfer Object
Service Locator
Front Controller
Intercepting Filter
Business Delegate
第10题:
Business Delegate and Transfer Object
Business Delegate and Service Locator
Front Controller and Business Delegate
Intercepting Filter and Transfer Object
Model-View-Controller and Intercepting Filter
第11题:
Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.
Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.
Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.
Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.
第12题:
Front Controller and Transfer Object
Front Controller and Service Locator
Business Delegate and Transfer Object
Business delegate and Intercepting Filter
Model-View-Controller and Intercepting Filter
第13题:
A developer is designing a multi-tier web application and discovers a need to log each incoming clientrequest. Which two patterns, taken independently, provide a solution for this problem?()
第14题:
A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()
第15题:
You are a database administrator for your company. The company uses a vendor company’s application that is based on a proprietary database. You query data from the application database and import the data into a SQL Server 2005 database. The application vendor provides you with a new OLE DB driver to be used when querying the application database. Company policy prohibits connections between the SQL Server database and the application database, except when querying this data. You need to provide a way to query data from the application database. What should you?()
第16题:
You use Microsoft .NET Framework 4 to create a Windows Presentation Foundation (WPF) application. The application requires frequent updates. You want to use the ClickOnce technology to distribute the application to Internet users. You need to ensure that the application is automatically updated without requiring user intervention. You also need to ensure that the users execute the most recent version of the application. What should you do when you publish the application? ()
第17题:
Your network contains an Active Directory domain. You have a server that runs Windows Server 2008 R2 and has the Remote Desktop Services server role enabled. All client computers run Windows 7. You need to plan the deployment of a new line-of-business application to all client computers. The deployment must meet the following requirements: èUsers must access the application from an icon on their desktops. èUsers must have access to the application when they are not connected to the network. What should you do?()
第18题:
You are designing a Windows Azure application that will store data in two SQL Azure databases. The application will insert data in both databases as part of a single logical operation. You need to recommend an approach for maintaining data consistency across the databases. What should you recommend?()
第19题:
You are designing an automated deployment process for a Windows Azure application. The process must deploy the application to Windows Azure without any user interaction. You need to recommend a deployment strategy. What should you recommend?()
第20题:
Attach the remote debugger to the application.
Use the Microsoft Visual Studio 2010 Test Manager tool.
Use IntelliTrace to collect only eventsfrom the application.
Use IntelliTrace to collect events and call information from the application.
第21题:
Use the Service Management API to deploy the application package.
Use the cspack and csrun command-line utilities and pass the cloud project as an argument.
Publish the cloud project to a local directory and upload the application package to Windows Azure Blob storage.
Publish the cloud project to a localdirectory and use the Windows Azure Developer Portal to upload the application.
第22题:
Transfer Object
Service Locator
Front Controller
Intercepting Filter
Business Delegate
Model-View-Controller
第23题:
Flyweight
Transfer Object
Service Locator
Dispatcher View
Business Delegate
Model-View-Controller