Which element of a web application deployment descriptor element is required?()
Which of the following protocols is used to encrypt data between web servers and web browsers?()
Your Web site processes book orders. One of the application methods contains the following code segment.Dim doc As New XmlDocument( )doc.LoadXml("10" &_"Dictionary")You need to remove the discount element from XmlDocument. Which two code segments can you use to achieve this goal? ()
You are creating a Web application that will run on an intranet. The Web application reads comma-delimited text files. The text files reside in a subdirectory below the Web application's root directory. Users must not be able to navigate directly to these files in a Web browser unless they are members of the Accounting role. You need to write an ASP.NET HTTP handler that will use the FileAuthorizationModule class. Which form of authentication should you use?()
You are creating a Web-based application to manage data aggregation for reports. The application connects to a SQL Server 2005 database named DataManager. One page in the application has controls that execute stored procedures in a database named ReportingDatabase. There is an existing Service Broker connection between the DataManager database and ReportingDatabase.You want to add two new message types to the existing service. In each database, you create message types named ProcessReport and SendResult. You need to add the two new message types to the existing service. What should you do first?()
You create a Web Form. The Web Form allows users to calculate values and display the results in a label named lblResults. You need to capture all unhandled exceptions on the Web Form through the Error event. The Error event must capture each unhandled exception and display it on the Web Form. Which code segment should you use? ()
You work as a Web Developer at Certkiller.com. You make use of Microsoft ASP.NET 3.5 tocreate a Web application. The Certkiller.com network contains a test server named CERTKILLER-SR01. You deploy theapplication to CERTKILLER-SR01 and enable debugging. The application is hosted in MicrosoftInternet Information Services (IIS) 6.0. The application pool makes use of Network Serviceidentity. You need to determine a way to configure the environment in order to permit you to debug theapplication from your development computer. What should you do?()
A web application uses the HttpSession mechanism to determine if a user is "logged in." When a usersupplies a valid user name and password, an HttpSession is created for that user. The user has access tothe application for only 15 minutes after logging in. The code must determine how long the user has beenlogged in, and if this time is greater than 15 minutes, must destroy the HttpSession. Which method in HttpSession is used to accomplish this?()
Which command is used to enable access to J-Web using HTTPS?()
You deploy a Hyper-V host and you convert the Web servers to VMs. You discover that when users transfer large data files from the Web servers, the CPU utilization of the host exceeds acceptable limits. You need to recommend a solution to reduce the CPU utilization associated to network traffic. The solution must meet the company’s business requirements. What should you recommend implementing?()