单选题You plan to host a Windows Communication Foundation (WCF) service in a Windows Azure worker role. Custom code is necessary to initialize and configure the service endpoint. You need to recommend the point at which the application should initialize the WCF service. What should you recommend?()A When Windows Azure initializes the worker role instance.B When the worker role instance receives its first request.C When the worker role instance instantiates the WCF service.D When the worker role instance enters the main execution thread.
单选题
You plan to host a Windows Communication Foundation (WCF) service in a Windows Azure worker role. Custom code is necessary to initialize and configure the service endpoint. You need to recommend the point at which the application should initialize the WCF service. What should you recommend?()
A
When Windows Azure initializes the worker role instance.
B
When the worker role instance receives its first request.
C
When the worker role instance instantiates the WCF service.
D
When the worker role instance enters the main execution thread.
参考解析
解析:
暂无解析
相关考题:
You are developing a Windows Service. The Windows Service will host a Windows Communication Foundation (WCF) service.The Windows Service class will inherit from ServiceBase.You need to ensure that the WCF service starts when the Windows Service is restarted.What should you do in the Windows Service class?()A.B.C.D.
You are developing an application that performs file backups in the background. The background application will host a Windows Communication Foundation (WCF) service and must be active as soon as the machine is running. The background application will not have a user interface. A front-end application will consume the WCF service and will provide the user interface.You need to choose a host environment for the WCF service.Which hosting environment should you choose? ()A. Microsoft Internet Information Services (IIS) 6.0B. Windows Process Activation Services (WAS)C. A Windows Forms applicationD. A Windows Service
You are creating an application that consumes a Windows Communication Foundation (WCF) service. The service implements the IService contract. The client application contains the CallbackHandler class, which implements IServiceCallback.You need to ensure that a client proxy is created that can communicate with the service over a duplex channel.Which code segment should you use?()A.B.C.D.
A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()A. service Authentication ManagerB. service AuthorizationC. service CredentialsD. service Security Audit
Windows Communication Foundation (WCF) service is self-hosted in a console application. The service implements the lTimeService service interface in the TimeService class.You need to configure the service endpoint for HTTP communication. How should you define the service and endpoint tags?()A.B.C.D.
You are designing a Windows Azure application. The application includes processes that communicate by using Windows Communications Foundation (WCF) services. The WCF services must support streaming. You need to recommend a host for the processes and a WCF binding. Which two actions should you recommend?()A、 Host the processes in web roles.B、 Host the processes in worker roles.C、 Use NetTcpBinding for the WCF services.D、 Use WSHttpBinding for the WCF services.
You are designing a Windows Azure application. The application will include services hosted in different geographic locations. The service locations may change. You must minimize the cost of communication between services. You need to recommend an approach for calling the services. What should you recommend?()A、 Use the Service Management API.B、 Use Windows Azure Table storage.C、 Use Windows Azure Queue storage.D、 Use the Windows Azure AppFabric Service Bus.
You are designing a Windows Azure web application that does not use ASP.NET. The application requires a standalone Win32 interpreter. You need to recommend an approach for allowing access to the interpreter. What should you recommend?()A、 Use a web role. Configure the interpreter as an ISAPI filter.B、 Use a web role. Configure a FastCGI handler for the interpreter and set the path to the interpreter.C、 Use a worker role with an internal endpoint. Enable native code execution.D、 Use a worker role with an external endpoint. Configure a FastCGI handler for the interpreter and set the path to the root.
You are planning to migrate an existing web application to Windows Azure. The application consists of an ASP.NET web application and a set of native Win32 Windows Services that provide data to the application by using named pipes. The Windows Services cannot be modified. You need to recommend a strategy for migrating the application to Windows Azure. What should you recommend?()A、 Define a Windows CommunicationFoundation (WCF) contract for the services.B、 Deploy each Windows Service to a separate worker role. Deploy the ASP.NET application to a web role.C、 Deploy the application and Windows Services in a Windows Azure VM role.D、 Upload service binaries to a web role by using the Windows Azure Service Management API.
You are building a client for a Windows Communication Foundation (WCF) service. You need to create a proxy to consume this service. Which class should you use?()A、ChannelFactoryB、 ServiceHostC、ClientRuntimeD、CommunicationObject
Your company hosts web services in the company intranet. The intranet is secured by a firewall. Devices outside the firewall must be able to access the web services. Company policies prohibit changes to firewall rules. You need to recommend an approach for enabling inbound communication. What should you recommend?()A、 Use Windows Server AppFabric.B、 Use the Windows Azure AppFabric Service Bus.C、 Use the Windows Azure AppFabric Access Control Service.D、 Use a Windows Communication Foundation (WCF) service in a Windows Azure role that relays to the internal web service
A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()A、service Authentication ManagerB、service AuthorizationC、service CredentialsD、service Security Audit
You plan to host a Windows Communication Foundation (WCF) service in a Windows Azure worker role. Custom code is necessary to initialize and configure the service endpoint. You need to recommend the point at which the application should initialize the WCF service. What should you recommend?()A、 When Windows Azure initializes the worker role instance.B、 When the worker role instance receives its first request.C、 When the worker role instance instantiates the WCF service.D、 When the worker role instance enters the main execution thread.
A Windows Communication Foundation (WCF) service interacts with the database of a workflow engine. Data access authorization is managed by the database, which raises security exceptions if a user is unauthorized to access it.You need to ensure that the application transmits the exceptions raised by the database to the client that is calling the service.Which behavior should you configure and apply to the service?()A、routingB、service DebugC、service Security AuditD、workflow Unhandled Exception
A Windows Azure application includes a single-threaded worker role that has multiple instances. The worker role hosts a Windows Communication Foundation (WCF) service. Each request to the WCF service takes several seconds to complete. You need to recommend an approach for ensuring that worker role instances do not receive requests while processing. What should you recommend?()A、 Close the WCF endpoint.B、 Throw an exception to cancel the request.C、 Redirect incoming requests to a different worker role instance.D、 Remove the worker role instance from the load balancer rotation.
单选题A Windows Communication Foundation (WCF) service interacts with the database of a workflow engine. Data access authorization is managed by the database, which raises security exceptions if a user is unauthorized to access it.You need to ensure that the application transmits the exceptions raised by the database to the client that is calling the service.Which behavior should you configure and apply to the service?()AroutingBservice DebugCservice Security AuditDworkflow Unhandled Exception
单选题You are designing a Windows Azure application. The application will include services hosted in different geographic locations. The service locations may change. You must minimize the cost of communication between services. You need to recommend an approach for calling the services. What should you recommend?()A Use the Service Management API.B Use Windows Azure Table storage.C Use Windows Azure Queue storage.D Use the Windows Azure AppFabric Service Bus.
单选题You are building a client for a Windows Communication Foundation (WCF) service. You need to create a proxy to consume this service. Which class should you use?()AChannelFactorytchannelBServiceHostCClientRuntimeDCommunicationObject
单选题You plan to host a Windows Communication Foundation (WCF) service in a Windows Azure worker role. Custom code is necessary to initialize and configure the service endpoint. You need to recommend the point at which the application should initialize the WCF service. What should you recommend?()A When Windows Azure initializes the worker role instance.B When the worker role instance receives its first request.C When the worker role instance instantiates the WCF service.D When the worker role instance enters the main execution thread.
单选题You are building a client for a Windows Communication Foundation (WCF) service. You need to create a proxy to consume this service. Which class should you use?()AChannelFactoryB ServiceHostCClientRuntimeDCommunicationObject
单选题You are designing a Windows Azure web application that does not use ASP.NET. The application requires a standalone Win32 interpreter. You need to recommend an approach for allowing access to the interpreter. What should you recommend?()A Use a web role. Configure the interpreter as an ISAPI filter.B Use a web role. Configure a FastCGI handler for the interpreter and set the path to the interpreter.C Use a worker role with an internal endpoint. Enable native code execution.D Use a worker role with an external endpoint. Configure a FastCGI handler for the interpreter and set the path to the root.
多选题You are designing a Windows Azure application. The application includes processes that communicate by using Windows Communications Foundation (WCF) services. The WCF services must support streaming. You need to recommend a host for the processes and a WCF binding. Which two actions should you recommend?()AHost the processes in web roles.BHost the processes in worker roles.CUse NetTcpBinding for the WCF services.DUse WSHttpBinding for the WCF services.
单选题A Windows Azure application includes a single-threaded worker role that has multiple instances. The worker role hosts a Windows Communication Foundation (WCF) service. Each request to the WCF service takes several seconds to complete. You need to recommend an approach for ensuring that worker role instances do not receive requests while processing. What should you recommend?()A Close the WCF endpoint.B Throw an exception to cancel the request.C Redirect incoming requests to a different worker role instance.D Remove the worker role instance from the load balancer rotation.
单选题You are developing a Windows Communication Foundation (WCF) service. Client applications require reliable sessions to access the service.Users report that they receive ServerTooBusyException errors when their client application tries to establish a session. You need to ensure that the service can handle a minimum of 30 client connection requests. Which ReliableSessionBindingElement property should you configure?()AMaxRetryCountBMaxTransferWindowSizeCMaxPendingChannelsDInactivityTimeout
单选题You are developing an application that performs file backups in the background. The background application will host a Windows Communication Foundation (WCF) service and must be active as soon as the machine is running. The background application will not have a user interface. A front-end application will consume the WCF service and will provide the user interface.You need to choose a host environment for the WCF service. Which hosting environment should you choose? ()AMicrosoft Internet Information Services (IIS) 6.0BWindows Process Activation Services (WAS)CA Windows Forms applicationDA Windows Service
单选题Your company hosts web services in the company intranet. The intranet is secured by a firewall. Devices outside the firewall must be able to access the web services. Company policies prohibit changes to firewall rules. You need to recommend an approach for enabling inbound communication. What should you recommend?()A Use Windows Server AppFabric.B Use the Windows Azure AppFabric Service Bus.C Use the Windows Azure AppFabric Access Control Service.D Use a Windows Communication Foundation (WCF) service in a Windows Azure role that relays to the internal web service
单选题You are planning to migrate an existing web application to Windows Azure. The application consists of an ASP.NET web application and a set of native Win32 Windows Services that provide data to the application by using named pipes. The Windows Services cannot be modified. You need to recommend a strategy for migrating the application to Windows Azure. What should you recommend?()A Define a Windows CommunicationFoundation (WCF) contract for the services.B Deploy each Windows Service to a separate worker role. Deploy the ASP.NET application to a web role.C Deploy the application and Windows Services in a Windows Azure VM role.D Upload service binaries to a web role by using the Windows Azure Service Management API.
单选题A Windows Communication Foundation (WCF) service is required to log all authorization attempts to the Windows Event Log. You need to configure a behavior and apply it to the service to support this requirement. Which behavior should you configure and apply?()Aservice Authentication ManagerBservice AuthorizationCservice CredentialsDservice Security Audit