basicHttpBinding and HTTP
basicHttpBinding and Kerberos
wsHttpBinding and Kerberos
wsHttpBinding and HTTPS
第1题:
You develop a Windows Communication Foundation (WCF) service. You name the service MovieService in the Movie namespace. The service is hosted in Microsoft Internet Information Services (IIS). You copy the assembly containing the service to the bin folder in the virtual directory path.You need to set up the URI that is mapped to the service.What should you do?()
A.
B.
C.
D.
第2题:
You are developing an application that performs file backups in the background. The background application will host a Windows Communication Foundation (WCF) service and must be active as soon as the machine is running. The background application will not have a user interface. A front-end application will consume the WCF service and will provide the user interface.You need to choose a host environment for the WCF service.Which hosting environment should you choose? ()
A. Microsoft Internet Information Services (IIS) 6.0
B. Windows Process Activation Services (WAS)
C. A Windows Forms application
D. A Windows Service
第3题:
You are developing a Windows Communication Foundation (WCF) service that will be hosted in Microsoft Internet Services (IIS) 7.0.The service must be hosted in an IIS application named Info. You need to enable this service to be hosted in IIS by changing the web.config file.Witch XML segment should you add to the web.config file?()
A.
B.
C.
D.
第4题:
You develop a Windows Communication Foundation (WCF) service. You enable all performance counters and run multiple calls to the service.The service must isolate session data to each user. You need to monitor the instancing behaviour used in the service.Which performance counter should you monitor?()
A. ServiceModeService 4.0.0.0\Calls
B. ServiceModeService 4.0.0.0\Instances
C. ASP.Net StateService \ Server Sessions Active
D. ASP.Net StateService \ Server Sessions Total
第5题:
You are developing a Windows Communication Foundation (WCF) service. The service configuration file has a element defined. You need to ensure that all security audit information, trace logging, and message logging failures are recorded.Which configuration segment should you add to the element?()
A.
B.
C.
D.
第6题:
You are developing a Windows Service. The Windows Service will host a Windows Communication Foundation (WCF) service.The Windows Service class will inherit from ServiceBase.You need to ensure that the WCF service starts when the Windows Service is restarted.What should you do in the Windows Service class?()
A.
B.
C.
D.
第7题:
You are creating an application that consumes a Windows Communication Foundation (WCF) service. The service implements the IService contract. The client application contains the CallbackHandler class, which implements IServiceCallback.You need to ensure that a client proxy is created that can communicate with the service over a duplex channel.Which code segment should you use?()
A.
B.
C.
D.
第8题:
You develop a Windows Communication Foundation (WCF) service. It is used exclusively as an intranet application and is currently unsecured. You need to ensure that the service meets the following requirements: The service now must be exposed as an Internet application. The service must be secured at the transport level. Impersonation and delegation cannot be enabled.What should you use? ()
A. basicHttpBinding and HTTP
B. basicHttpBinding and Kerberos
C. wsHttpBinding and Kerberos
D. wsHttpBinding and HTTPS
第9题:
You are developing a Windows Communication Foundation (WCF) service. The service operation takes a customer number as the only argument and returns information about the customer. The service requires a security token in the header of the message. You need to create a message contract for the service.Which code segment should you use?()
A.
B.
C.
D.
第10题:
A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()
A. service Authentication Manager
B. service Authorization
C. service Credentials
D. service Security Audit