MCSD.NET - 70-300 Exam Interview Questions And Answers

Download MCSD.NET - 70-300 Interview Questions and Answers PDF

Strengthen your MCSD.NET - 70-300 interview skills with our collection of 43 important questions. Each question is crafted to challenge your understanding and proficiency in MCSD.NET - 70-300. Suitable for all skill levels, these questions are essential for effective preparation. Download the free PDF to have all 43 questions at your fingertips. This resource is designed to boost your confidence and ensure you're interview-ready.

43 MCSD.NET - 70-300 Questions and Answers:

MCSD.NET - 70-300 Job Interview Questions Table of Contents:

MCSD.NET - 70-300 Job Interview Questions and Answers
MCSD.NET - 70-300 Job Interview Questions and Answers

1 :: Suppose You need to ensure that transportation brokers are authenticated when they access the broker
Web site. Which action or actions should you take? (Choose all that apply)
A. Create a distribution list of authenticated users
B. Provide a facility for online registration
C. Provide a facility to view passwords
D. Provide secure storage of user names and passwords
E. Secure the exchange of user names and passwords between the client computer and the
server
F. Enable e-mail access for transportation brokers
Answer: B, D, E

B. Provide a facility for online registration
D. Provide secure storage of user names and passwords
E. Secure the exchange of user names and passwords between the client computer and the
server
Read More

2 :: Suppose You are completing the technical specification for the new reservation application.
Which technique should you recommend for state management?
A. ASP.NET ViewState
B. Server-side database
C. Client-side cookies
D. Application cache

B: Server-side database
Read More

3 :: Explain Which new business process or processes should be supported by the new solution?
(Choose all that apply)
A. Brokers can order transportation services
B. Vehicle scheduling capability is provided
C. Bar code readers are supported
D. Use of space on vehicles can be tracked
E. Brokers can track shipments
F. Customers can track parcels
Answer: A, D, E

A. Brokers can order transportation services
D. Use of space on vehicles can be tracked
E. Brokers can track shipments
Read More

4 :: Suppose You are writing a list of integration requirements for your solution. Which requirement or
requirements should you include? (Choose all that apply)
A. Order data must be read from the accounting application
B. Shipment tracking must be read from an XML Web service
C. Customers must be redirected to another Web site to track shipments
D. Customers must be able to place orders by using an XML Web service
E. Order data must be written to the accounting application
F. Order data must be e-mailed to the salespeople
Answer: A, B, E

A. Order data must be read from the accounting application
B. Shipment tracking must be read from an XML Web service
E. Order data must be written to the accounting application
F. Order dat
Read More

5 :: Suppose You are creating the logical design for a use case named Customer updates customer profiles?.
Which object or objects should you include in the design? (Choose all that apply)
A. Data access object
B. Customer object
C. Flight object
D. Logging object
E. Airline object

A. Data access object
B. Customer object
D. Logging object
Read More

6 :: Suppose You need to enable brokers to track their own shipment. To meet this requirement, you need to
consider various specifications. Which four specifications should you consider? (Each correct
answer presents part of the solution)
A. Provide a Web-accessible form to authenticate brokers against a table of registered users
B. Provide a Web-accessible form to enable brokers to request vehicle routes for their shipments
C. Provide a Web-accessible form to query the database for broker shipments
D. Provide a Web-accessible form to generate waybill numbers
E. Identify a parcel in the database as part of a broker shipment
F. Relate a parcel to a specific broker
G. Track the weight of a parcel in the database

A. Provide a Web-accessible form to authenticate brokers against a table of registered users
C. Provide a Web-accessible form to query the database for broker shipments
E. Identify a parcel in the database as part of a broker shipment
F. Relate a parcel to a specific broker
Read More

7 :: Explain The invoice creation process must be dynamically monitored to track the following information:
Average number of seconds to create an invoice
Number of invoices created per second
Total number of successfully created invoices
Total number of failed attempts to create an invoice
Monitoring should occur with a minimum of development effort. What should you do?
A. Write statistics to the database and use SQL Query Analyzer to dynamically monitor the
statistics
B. Create a removable Microsoft .NET class to contain statistics. Configure the class as singleton
class. Write a utility that retrieves statistical information from this class
C. Write statistics to the application event log
D. Use custom performance counters

D. Use custom performance counter
Read More

8 :: Suppose You are writing the technical specification for your solution. You need to select a technology for
the new timesheet application. Which technology should you use?
A. an XML Web service
B. a Web application
C. a console application
D. a Windows Forms application

B. a Web application
Read More

9 :: Suppose You are preparing the functional specification for the new reservation application. Which two
functionalities should you specify? (Each correct answer presents part of the solution. Choose
two)
A. Localization
B. Monitoring of application performance
C. Secure storage of customer profile information
D. Availability of application for mobile phones and personal digital assistants
E. Integration with Active Directory

B: onitoring of application performance
C: Secure storage of customer profile information
Read More

10 :: Suppose You are writing the primary scenario of a use case named Customer retrieves a saved itinerary.
Which action or actions should be included?(Choose all that apply)
A. Application informs customers that no itineraries exist
B. Application informs customers that a saved flight is no longer available
C. Customer asks for saved itineraries
D. Application offers alternate flights
E. Application queries the database for saved itineraries
F. Application displays retrieved itineraries

C. Customer asks for saved itineraries
E. Application queries the database for saved itineraries
F. Application displays retrieved itineraries
Read More

11 :: Explain Which business constraint poses the greatest potential risk to completing your project for Blue
Yonder Airlines?
A. The current IT staff must support the solution in the future
B. All testing scenarios and all necessary rework must be completed during the one-month testing
period.
C. The scheduling vendor will begin providing access by XML Web service in three months
D. The application must be completed within a five-month development period before it is tested

C. The scheduling vendor will begin providing access by XML Web service in three months
Read More

12 :: Suppose Web application used by Team Leads and Business Planners requires an authentication
mechanism. Which pair of authentication technologies should you recommend?
A. IIS Anonymous authentication with ASP.NET Passport authentication
B. IIS Anonymous authentication with ASP.NET Forms authentication
C. IIS Basic authentication with SSL and ASP.NET Windows authentication
D. IIS Integrated Windows authentication with ASP.NET Windows authentication
E. IIS Basic authentication with SSL and ASP.NET Forms authentication

C. IIS Basic authentication with SSL and ASP.NET Windows authentication
Read More

13 :: Suppose You are writing a conceptual diagram of the modules that must be developed for your solution.
Which module or modules should be included?(Choose all that apply)
A. a Web application for Team Leads and Business Planners
B. a timesheet entry database
C. a billing database
D. a notification engine that sends timesheet entry reminders
E. a timesheet entry application
F. a Windows CE application
G. a utility that uploads information to the billing application

A. a Web application for Team Leads and Business Planners
B. a timesheet entry database
E. a timesheet entry application
F. a Windows CE application
G. a utility that uploads information to the billing application
Read More

14 :: Explain When the new solution is in place, parcel information and parcel history information must be
stored. You need to estimate the amount of data that will be generated by the new solution during
its first year of use. What is the approximate amount?
A. 824MB
B. 5GB
C. 8GB
D. 50GB

C. 8GB
Read More

15 :: Suppose You need to decide whether your conceptual design represents a complete solution.
Which four design artifacts are relevant to your decision? (Each correct answer presents part of
the solution. Choose four)
A. Unit test for authenticating brokers
B. Component prototypes for tracking shipments
C. Functional requirements for tracking shipments
D. Unit test cases for tracking shipments
E. Use cases for authenticating brokers
F. Functional requirements authenticating brokers
G. Component prototypes for authenticating brokers
H. Use cases for tracking shipments

C. Functional requirements for tracking shipments
E. Use cases for authenticating brokers
F. Functional requirements authenticating brokers
H. Use cases for tracking shipment
Read More

16 :: Suppose You are listing the operational requirements for the new reservation application.
Which requirement should you include?
A. Extensibility
B. Localization
C. Mantainability
D. Availability
E. Deployability

D. Availability
Read More

17 :: Suppose You are writing the operational requirements document for your solution. Which should you
include?
A. The application must encrypt all time entry data on client computers and in the database, and
data must be encrypted when transmitted over the internet
B. The IT staff will be responsible for fixing bugs in the code
C. The IT staff must be alerted to application problems
D. The application can have no single point of failure

C. The IT staff must be alerted to application problems
Read More

18 :: Suppose You are writing the technical specification for your solution. Your new timesheet application must
be able to access timesheet entry data. You need to specify the technology that will be used for
accessing this data. Your solution must require the minimum development effort. Which
technology should you use?
A. a SQLConnection class
B. a .NET Remoting object that uses TCP channel and binary formatting
C. an XML Web service proxy class
D. an interop assembly

C. an XML Web service proxy class
Read More

19 :: Suppose You are establishing a policy to measure the effectiveness of your deployment process.
You decide to track one or more phases of development to identify defects. Which phase or
phases should you track?(Choose all that apply)
A. Design and analysis
B. Development
C. Stabilization
D. Requirements

C. Stabilization
Read More

20 :: You are validating the physical design for your solution. Which element or elements should be
included in the design?(Choose all that apply)
A. algorithms for scheduling vehicles
B. scalability to meet increased usage
C. authentication of transportation brokers
D. online registration facility for transportation brokers
E. interface to the bar code readers

B. scalability to meet increased usage
C. authentication of transportation brokers
D. online registration facility for
Read More

21 :: If you are writing the functional specification for your solution. You must include the customer
pricing requirements. Which requirement or requirements should you include? (Choose all that
apply)
A. Pricing data must be encrypted
B. Each user must be uniquely identified
C. Content must be personalized by user
D. Order data must be read from the accounting application

B. Each user must be uniquely identified
C. Content must be personalized by user
Read More

22 :: Suppose You are designing a strategy to migrate data from the existing timesheet application to the new
application. Which tool or technology should you use?
A. XML Schema Definition tool (xsd.exe)
B. COM interoperability
C. Microsoft SQL Server Data Transformation Services (DTS)
D. Microsoft SQL Server replication

C. Microsoft SQL Server Data Transformation Services (DTS)
Read More

23 :: Explain Which new module or modules should you develop for Trey Research? (Choose all that apply.)
A. An application to export laboratory results
B. A data store
C. A Web application for trucking supervisors
D. An automated report generator
E. An application to import laboratory reports
F. An OCR interface
G. An IVR application

E. An application to import laboratory reports
F. An OCR interface
Read More

24 :: Before you release the solution, you need to develop a process to validate and enforce an
appropriate level of quality. Which three statistics should you use?
(Each correct answer presents part of the solution)
A. Number of defects per component
B. Number of defects per thousand lines of source code
C. Number of defects by developer
D. Percentage of successful builds
E. Percentage of requirements tested
F. Number of defects detected to date
G. Number of defects corrected to date.

E. Percentage of requirements tested
F. Number of defects detected to date
G. Number of defects corrected to date.
Read More

25 :: Suppose You are validating the physical design of a data a data layer class that will return a set of time
entries from the timesheet database. This class will be used by the Web application for Team
Leads and Business Planners and, indirectly, by the new timesheet application.
The class must use connection pooling, and it must be as secure and as flexible as possible. You
need to specify a Microsoft SQL Server authentication strategy that meets these requirements.
Which strategy should you use?
A. The data class uses SQL Server authentication with an application specific SQL Server
account. The account name and password are embedded in a connection string
B. The data class uses Windows authentication when connecting to the database and
impersonates a specific account created for operations on the database
C. The data class uses Windows authentication when connecting to the database and
impersonates the application user
D. The data class uses SQL Server authentication with the SQL Server sa account

B. The data class uses Windows authentication when connecting to the database and impersonates a specific account created for operations on the database
Read More