单项选择题
A. Replace line 05 with the following code. [TransactionFlow(TransactionFlowOption.NotAllowed)]
B. Replace line 13 with the following code. [OperationBehavior(TransactionScopeRequired=false, TransactionAutoComplete=true)]
C. Replace line 05 with the following code. [TransactionFlow(TransactionFlowOption.Allowed)]
D. Replace line 13 with the following code. [OperationBehavior(TransactionScopeRequired=false, TransactionAutoComplete=false)]
单项选择题 You are developing a Windows Communication Foundation (WCF) service. The service configuration file has a element defined. You need to ensure that all security audit information, trace logging, and message logging failures are recorded. Which configuration segment should you add to the element?()
单项选择题 You are developing a Windows Communication Foundation (WCF) service. You must record all available information for the first 1,000 messages processed, even if they are malformed. You need to configure the message logging section of the configuration file. Which configuration segment should you use? ()
多项选择题 You are developing a Windows Communication Foundation (WCF) service that returns location information for authorized law enforcement agencies. The service contract is as follows: [ServiceContract] public interface IMappingService { [OperationContract] long[] GetLocationCoordinates(String cityName); [OperationContract] long[] GetLocationOfCitizen(String ssn); } Users are authenticated and impersonated. The system uses ASP.NET roles. The members of law enforcement are members of the LawEnforcement role. You need to ensure that only members of the LawEnforcement role can call these methods. What are two possible ways to achieve this goal?() (Each correct answer presents a complete solution. Choose two.)