What should you do?

You are an enterprise application developer. You are designing an event logging mechanism for an application. The application will be installed on all computers in your company. The company policy has the following requirements: Developers must be informed of critical events.Help-desk technicians must have access to all events on each computer. You need to design the event logging storage strategy that complies with the company policy.
What should you do?

You are an enterprise application developer. You are designing an event logging mechanism for an application. The application will be installed on all computers in your company. The company policy has the following requirements: Developers must be informed of critical events.Help-desk technicians must have access to all events on each computer. You need to design the event logging storage strategy that complies with the company policy.
What should you do?

A.
Implement a custom SMTP trace listener for critical events.Implement an EventLogTraceListener object for all events.

B.
Implement a custom database trace listener for critical events.Implement a TextWriterEventListener object for all events.

C.
Implement a TextWriterEventListener object for critical events.Implement an EventLogTraceListener object for all events.

D.
Implement a DefaultTraceListener object for critical events.Implement a TextWriterEventListener object for all events.



Leave a Reply 0

Your email address will not be published. Required fields are marked *