网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are developing a Windows Communication Foundation (WCF) service that reads messages from a public non-transactional MSMQ queue.You need to configure the service to read messages from the failed-delivery queue.Which URI should you specify in the endpoint configuration settings of the service?()

  • A、net.msmq://localhost/msmq$FailedMessages
  • B、net.msmq://localhost/msmq$DeadLetter
  • C、net.msmq://localhost/system$DeadXact
  • D、net.msmq://localhost/system$DeadLetter

参考答案

更多 “You are developing a Windows Communication Foundation (WCF) service that reads messages from a public non-transactional MSMQ queue.You need to configure the service to read messages from the failed-delivery queue.Which URI should you specify in the endpoint configuration settings of the service?()A、net.msmq://localhost/msmq$FailedMessagesB、net.msmq://localhost/msmq$DeadLetterC、net.msmq://localhost/system$DeadXactD、net.msmq://localhost/system$DeadLetter” 相关考题
考题 You are developing a Windows Communication Foundation (WCF) service. You enable logging in the configuration file.The opening tag is defined as follows.messagelogging br= logentiremessage=true logMalformedMessages=truelogMessagesAtServiceLevel=truelogMessagesAtTransportLevel=truemaxMessagesToLog=20You need to ensure that logging is implemented so that only messages with SOAP headers are logged.What should you add to the filters element of the application configuration file?()A.B.C.D.

考题 You develop a Windows Communication Foundation (WCF) service. You name the service MovieService in the Movie namespace. The service is hosted in Microsoft Internet Information Services (IIS). You copy the assembly containing the service to the bin folder in the virtual directory path.You need to set up the URI that is mapped to the service.What should you do?()A.B.C.D.

考题 You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration.What should you do next?()A. Use the transport security mode and specify None for transport client credential type.B. Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.C. Use the message security mode and specify Basic for the transport client credential type.D. Use the transportWithMessageCredential security mode and specify None for the transport client credential type.

考题 You are developing a Windows Service. The Windows Service will host a Windows Communication Foundation (WCF) service.The Windows Service class will inherit from ServiceBase.You need to ensure that the WCF service starts when the Windows Service is restarted.What should you do in the Windows Service class?()A.B.C.D.

考题 You are developing a Windows Communication Foundation (WCF) service. You establish that the largest size of valid messages is 8,000 bytes. You notice that many malformed messages are being transmitted.Detailed information about whether each message is malformed must be logged.You need to ensure that this information is saved in XML format so that it can be easily analyzed.What should you add to the service configuration file?()A.B.C.D.

考题 You are developing a Windows Communication Foundation (WCF) service.You must record all available information for the first 1,000 messages processed, even if they are malformed.You need to configure the message logging section of the configuration file.Which configuration segment should you use? ()A.B.C.D.

考题 You are developing a Windows Communication Foundation (WCF) service. The service operation takes a customer number as the only argument and returns information about the customer. The service requires a security token in the header of the message. You need to create a message contract for the service.Which code segment should you use?()A.B.C.D.

考题 You develop a Windows Communication Foundation (WCF) service that interacts with Microsoft Message Queuing (MSMQ). The service requires sessions. You need to create a custom binding that enables messages sent to the queue to be viewed when you are using a listener tool.Which binding elements should you use?()A. textMessageEncoding and msmqTransport in this order.B. textMessageEncoding and msmqIntegrationTransport in this order.C. msmqTransport and textMessageEncoding in this order.D. msmqIntegrationTransport and textMessageEncoding in this order.

考题 A Windows Communication Foundation (WCF) service only accepts messages that are signed and encrypted. A client application is not receiving expected responses from the service. You need to enable logging to verify that the messages from the client are signed and encrypted. You also need to see what each message looks like before the message body is deserialized into a NET object. What should you do?()A.B.C.D.

考题 A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()A. service Authentication ManagerB. service AuthorizationC. service CredentialsD. service Security Audit

考题 Windows Communication Foundation (WCF) service is self-hosted in a console application. The service implements the lTimeService service interface in the TimeService class.You need to configure the service endpoint for HTTP communication. How should you define the service and endpoint tags?()A.B.C.D.

考题 You are developing a Windows Communication Foundation (WCF) service that reads messages from a public non-transactional MSMQ queue.You need to configure the service to read messages from the failed-delivery queue.Which URI should you specify in the endpoint configuration settings of the service?()A. net.msmq://localhost/msmq$FailedMessagesB. net.msmq://localhost/msmq$DeadLetterC. net.msmq://localhost/system$DeadXactD. net.msmq://localhost/system$DeadLetter

考题 You have an existing Windows Communication Foundation (WCF) service. You need to ensure that other services are notified when the service is started.What should you do?() A.B.C.D.

考题 Your Windows Communication Foundation (WCF) client application uses HTTP to communicate with the service.You need to enable message logging and include all security information such as tokens and nonces in logged messages.What should you do?()A.B.C.D.

考题 You develop a Windows Communication Foundation (WCF) service that uses basic authentication for client credentials. This service is currently configured to use message security. The service is hosted on a server in workgroup mode.Users report that their passwords are stolen when they use public computers.You need to ensure that messages are secure and users are authenticated.You prevent the service from being called over HTTP through Microsoft Internet Information Services (IIS) configuration. What should you do next?()A、Use the transport security mode and specify None for transport client credential type.B、Use the transportWithMessageCredential security mode and specify Basic for the transport client credential type.C、Use the message security mode and specify Basic for the transport client credential type.D、Use the transportWithMessageCredential security mode and specify None for the transport client credential type.

考题 A Windows Communication Foundation (WCF) application exposes a service as a SOAP endpoint for consumption by cross-platform clients.During integration testing, you find that one of the clients is not generating the correct messages to the WCF application.In order to debug the issue and fix the communication, you need to configure the service to log messages received from the client.What should you do?()A、Set an etwTracking behavior on the service and configure a listener for the System.ServiceModel trace source.B、Set an etwTracking behavior on the service and configure a listener for the System.ServiceModel.MessageLogging trace source.C、Enable messageLogging in the System.ServiceModel diagnostics element configuration and configure a listener for the System.ServiceModel.MessageLogging trace source.D、Enable messageLogging in the System.ServiceModel diagnostics element configuration and configure a listener for the System.ServiceModel trace source.

考题 You are developing a Windows Communication Foundation (WCF) service. Client applications require reliable sessions to access the service.Users report that they receive ServerTooBusyException errors when their client application tries to establish a session. You need to ensure that the service can handle a minimum of 30 client connection requests. Which ReliableSessionBindingElement property should you configure?()A、MaxRetryCountB、MaxTransferWindowSizeC、MaxPendingChannelsD、InactivityTimeout

考题 You are debugging a Windows Communication Foundation (WCF) service. The service uses signed and encrypted messages.You need to configure logging so that you can read the contents of the messages. What should you do?()A、Set maxSizeMessagesToLog to 10B、Set logMessageAtServiceLevel to true.C、Set maxMessagesToLog to 10.D、Set logMessageAtTransportLevel to true.

考题 You are building a client for a Windows Communication Foundation (WCF) service. You need to create a proxy to consume this service. Which class should you use?()A、ChannelFactoryB、 ServiceHostC、ClientRuntimeD、CommunicationObject

考题 You are developing a Windows Communication Foundation (WCF) service. You write a method named Submit that accepts messages of the type System.ServiceModel.Channels.Message. You need to process the body of the incoming messages multiple times in the method. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)()A、Use the GetBody method of the Message class to read the content of the messages.B、Use the CreateBufferedCopy method of the Message class to load the messages into memory.C、Use the WriteBodyContents method of the BodyWriter class to make a copy of the messages.D、Use the CreateMessage method of the MessageBuffer class to make a copy of the messages.

考题 A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()A、service Authentication ManagerB、service AuthorizationC、service CredentialsD、service Security Audit

考题 You are creating a client application and configuring it to call a Windows Communication Foundation (WCF) service.When the application is deployed, it will be configured to send all messages to a WCF routing service. You need to ensure that the application can consume the target service after the application is deployed. What should you do?()A、In the client application, add a service reference to the router service. In the client binding configuration, specify the address of the router service.B、In the client application, add a service reference to the target service. In the client binding configuration, specify the address of the target service.C、In the client application, add a service reference to the router service. In the client binding configuration, specify the address of the target service.D、In the client application, add a service reference to the target service. In the client binding configuration, specify the address of the router service.

考题 You create a Windows Communication Foundation (WCF) service and deploy it with wsHttpBinding and message security enabled.You create an intermediate WCF service for logging messages sent to the primary service.The intermediate service is called via endpoint behaviour. The primary service is receiving malformed data from a client application.You need to enable inspection of the malformed data and prevent message tampering. What do you do?()A、Specify a protection level of None in the contract for the intermediate service. Disable message and transport security from the client application configuration file.B、Specify a protection level of Sign in the contract for the intermediate service. Disable transport security from the client application configuration file.C、Modify the binding on the intermediate service to use netNamedPipeBinding.D、Modify the binding on the intermediate service to use webHttpBinding.

考题 You have an existing Windows Communication Foundation (WCF) Web service. The Web service is not responding to messages larger than 64 KB. You need to ensure that the Web service can accept messages larger than 64 KB without generating errors. What should you do?()A、Increase the value of maxReceivedMessageSize on the endpoint binding.B、Increase the value of maxRequestLength on the httpRuntime element.C、Increase the value of maxBufferSize on the endpoint binding.D、Increase the value of maxBufferPoolSize on the endpoint binding.

考题 A Windows Communication Foundation (WCF) service has a callback contract. You are developing a client application that will call this service.You must ensure that the client application can interact with the WCF service. What should you do?()A、On the OperationContractAttribute, set the AsyncPattern property value to true.B、On the OperationContractAttribute, set the ReplyAction property value to the endpoint address of the client.C、On the client, create a proxy derived from DuplexClientBaseTChannel .D、On the client, use GetCallbackChannelT .

考题 单选题You are building a client for a Windows Communication Foundation (WCF) service. You need to create a proxy to consume this service. Which class should you use?()A ChannelFactoryB ServiceHostC ClientRuntimeD CommunicationObject

考题 单选题A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()A service Authentication ManagerB service AuthorizationC service CredentialsD service Security Audit