70-486 Real Exam Dumps Questions and answers 81-90

Get Full Version of the Exam
http://www.EnsurePass.com/70-486.html

Question No.81

You are developing an Azure worker role. You enable crash dump collection for the role. When the role starts, an external application stops responding.

You need to download the crash dump to determine why the application stops responding.

From which two locations can you download the crash dump? Each correct answer presents a complete solution.

A.

Azure Blob storage

B.

the temp folder on the virtual machine that is running the role instance

C.

Azure file storage

D.

the DiagnosticStore local resource folder on the virtual machine that is running the role instance

Answer: AD

Explanation/Reference: Explanation/Reference: Explanation:

When you enable collection of crash dumps, the resulting data is written to the CrashDumps directory in the DiagnosticStore local resource that is automatically configured for your role. When crash dump data is transferred to persistent storage, it is stored to the wad-crash- dumps Blob container.

Reference:

CrashDumps.EnableCollection Method https://msdn.microsoft.com/library/microsoft.windowsazure.diagnostics.crashdumps.enable collection.aspx

Question No.82

You are developing an application that uses many small images. When the images load, the application runs slowly.

You need to improve the performance of the application. What should you do?

A.

Preload all the images when the application starts to ensure that the images are cached.

B.

Convert the images to ICO file format and stream all images on a single connection.

C.

Host all images on a Microsoft Azure web role with multiple instances.

D.

Combine all the images into a single image and use CSS to create sprites.

Answer: D

Explanation/Reference: Explanation/Reference: Explanation:

Because browsers limit how many concurrent HTTP requests they make to a website, a web page with many small icon images can result in a longer load time. You can combine many small images into a single larger image – a CSS sprite – using the free ASP.NET Sprite and Image Optimization Library available from Microsoft.

Reference:

CSS Sprites and the ASP.NET Sprite and Image Optimization Library http://dotnetslackers.com/articles/aspnet/CSS-Sprites-and-the-ASP-NET-Sprite-and-Image- Optimization-Library.aspx

Question No.83

You are developing a new ASP.NET MVC application that will be hosted on Microsoft Azure. You need to implement caching.

The caching solution must support the following:

The cache must be able to store out-of-process ASP.NET session state.

image

The cache must be able to store a variety of data types.

image

The cache must offer a large amount of space for cached content.

image

You must be able to share output cache content across web server instances.

image

You need to select a cache solution.

Which caching solution should you choose?

A.

ASP.NET Caching

B.

Azure In-Role Cache

C.

Azure Redis Cache

D.

Azure Managed Cache Service

Answer: C

Explanation/Reference: Explanation/Reference: Explanation:

Reference:

How to Use Azure Redis Cache

https://azure.microsoft.com/sv-se/documentation/articles/cache-dotnet-how-to-use-azure- redis- cache/

Question No.84

You are developing an ASP.NET MVC application that uses forms authentication. The application uses SQL queries that display customer order data.

You need to prevent all SQL injection attacks against the application. How should you secure the queries?

A.

Implement parameterization.

B.

Pattern check the input.

C.

Filter out prohibited words in the input.

D.

Escape single quotes on string-based input parameters.

Answer: A

Explanation/Reference: Explanation/Reference: Explanation:

With most development platforms, parameterized statements that work with parameters can be used (sometimes called placeholders or bind variables) instead of embedding user input in the statement. A placeholder can only store a value of the given type and not an arbitrary SQL fragment. Hence the SQL injection would simply be treated as a strange (and probably invalid) parameter value.

Reference:

https://en.wikipedia.org/wiki/SQL_injection#Parameterized_statements Topic 5, Scenario 5

Background

You are making use of Visual Studio 2012 to create an ASP.NET MVC application to log training information for a cycling club.

Business Requirements

The application needs to host data regarding training dates, distances, and duration. Application users must be able to view and modify data. The application itself should be highly accessible. The application should also allow for times to be presented in the user#39;s native time.

Technical Requirements

A public class, named CyclistLog.DataAccess.CyclistLogDb, deals with database access. HTTP GET should be used for all data retrieval. HTTP POST should be used for all data updates.

A master layout file, named \Views\Shared\_Layout.cshtml, is used by all pages in the application.

The application makes use of the \Models\LogModel.cs model.

The Razor view engine is used for all views in the application. The \Views\CyclingLog includes the _CalculateSpeed.cshtml, EditLog.cshtml, GetLog.cshtml, and InsertLog.cshtml views. The application, however, includes a \Views\Home\Index.cshtml view.

The controller included in the application is \Controllers\CyclingLogController.cs. You have also included a timer.png image in the \Images folder.

When a user examines a cycling log, the user#39;s trail map is accessible. This map is configured as a video and an Adobe Flash application. The browser should using H264, Ogg, or WebM formats (in this order) to present the video natively. The Flash application should be used In the event that the video cannot be presented.

Security

The application should make use of forms authentication, and requires user logon for entering information. The editing or deleting of cyclist information requires a user to be a member of the Admin role.

Users must be members of the Admin role to.

You need to the application should be defended against cross-site request forgery. The SHA1 algorithm should be used to hash passwords.

A custom role provider must be included in CyclistLog.Providers.CyclingLogRoleProvider.es.

Question No.85

You have received instructions to make sure that the Views\CyclingLog\_CalculateSpeed.cshtml partial view, from the Views\Cyclelog \GetLog.cshtml, is configured to show the cyclist#39;s average speed per kilometer. You need to write the necessary code to apply the view. Which of the following is a method that should be included in your code?

A.

The DisplayFor method.

B.

The ExhibitFor method.

C.

The PresentFor method.

D.

The ConcealFor method.

Answer: A

Question No.86

You have been instructed to meet the business requirements with regards to security. You are required to make changes to the CyclingLogController. Which of the following actions should you take?

A.

You should consider adding code to assign users the Administrator role.

B.

You should consider adding code to assign users the Advanced Operator role.

C.

You should consider adding code to assign users the Author role.

D.

You should consider adding code to assign users the Report Security Administrator role.

Answer: A

Question No.87

You have been instructed to insert a line of code into your existing code that allows for the quot;Distancequot; header of the table to be displayed in bold in the Views/CyclingLog/GetLog.cshtml view. Which of the following should be included in the line of code?

A.

You should consider including the :first-child pseudo-class.

B.

You should consider including the :last-child pseudo-class.

C.

You should consider including the :nth-child pseudo-class.

D.

You should consider including the :nth-last-child(n) pseudo-class.

Answer: C

Question No.88

You have been asked to make sure that the edit action of RunLogController is extended. You start by writing the following lines of code:

[HttpPost]

[ActionName (quot;Editlogquot;)]

You are required to make use of a specific attribute next. Which of the following is the attribute in question?

A.

The [ValueProviderCollection] attribute.

B.

The [ValidateInput] attribute.

C.

The [ValidateAntiForgeryToken] attribute.

D.

The [ValidatableObjectAdapter] attribute.

Answer: C

Question No.89

You have been tasked with making sure that the application is configured to make use of a custom role provider, named CyclingLogRoleProvider. Which of the following actions should you take?

A.

You should consider making changes to the machine.config file.

B.

You should consider making changes to the app.config file.

C.

You should consider making changes to the web.config file.

D.

You should consider making changes to the client.config file.

Answer: C

Question No.90

You are preparing to write code that prevents invalid parameters from being distributed to the EditLog action. To achieve this, you are required to build the route in a certain way. Which of the following is a method that should be included in the code?

A.

You should consider including the MapRoute method.

B.

You should consider including the IgnoreRoute method.

C.

You should consider including the GetVirtualPathForArea method.

D.

You should consider including the ReRoute method.

Answer: A

Get Full Version of 70-486 Dumps

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.