Summer Sale Coupon - 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sbfdisc

GSSP-NET-CSHARP PDF

$44

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

GSSP-NET-CSHARP PDF + Testing Engine

$70.4

$175.99

3 Months Free Update

  • Exam Name: GIAC GIAC Secure Software Programmer - C#.NET
  • Last Update: Apr 18, 2024
  • Questions and Answers: 491
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

GSSP-NET-CSHARP Engine

$52.8

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

GSSP-NET-CSHARP Practice Exam Questions with Answers GIAC GIAC Secure Software Programmer - C#.NET Certification

Question # 6

You work as an Enterprise Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an application using .NET Framework 3.5. The application represents a WCF service. The service will be consumed by clientside code that runs in the Web pages of an ASP.NET AJAX application. You must ensure that data serialization between the service and the application acquires least amount of latency. Which data format will you use to accomplish this?

A.

Extensible Application Markup Language

B.

JavaScript Object Notation

C.

Extensible Markup Language

D.

Really Simple Syndication

Full Access
Question # 7

Andrew works as a Software Developer for Mansoft Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to enhance the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?

Each correct answer represents a complete solution. Choose two.

A.

Symmetric

B.

Secret

C.

IPSec

D.

Asymmetric

Full Access
Question # 8

You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create an ASP.NET Web application using the .NET Framework. The application is installed in a Network Load Balancing cluster. You are evaluating a bug statement. When a failure takes place in the Web application, the client occasionally gets an error page as anticipated. At other times, the client gets an exception stack with the error message, which is not anticipated. You are required to find out the configuration setting that causes the unanticipated error.

Which of the following configuration settings causes the unanticipated error?

A.

B.

C.

D.

Full Access
Question # 9

You work as a .NET Trainer for ABC Inc. The Company uses .NET Framework as its application development platform. You are creating an application to demonstrate the use of datatypes. You create an unsigned Short datatype in the application. Which of the following values can be assigned to the unsigned Short datatype?

Each correct answer represents a complete solution. Choose three.

A.

123

B.

65,535

C.

127,625

D.

32,636

E.

-123

Full Access
Question # 10

You work as an Application Developer for ABC Inc. You are assigned with developing a Web site that will handle information related to monthly sales of the company. You wish to secure the Web site so that only employees of the Accounts department can view the Web pages. You need to create roles for the employees of this department. The user account information will be stored in a SQL Server database named Database. You decide to do all this by using the Web Site Administration Tool. Which of the following types of security will you use to accomplish the task?

A.

Forms-based authentication

B.

Integrated Microsoft Windows authentication

C.

Basic authentication

D.

Digest authentication

Full Access
Question # 11

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You are creating an ASP.NET Web application using the .NET Framework 3.5. The application stores sensitive profile data in a MS SQL Server 2008 database. You are required to make sure that the profile data never stored in clear text. What will you do?

A.

Create a strongly typed custom ProfileProvider class. In the ProfileProvider class, encrypt the provided information before storing it in the database.

B.

Use the ASP.NET IIS Registration Tool to encrypt the connection string to connect to the SQL Server database.

C.

Create a custom profile provider. In the custom provider, encrypt the provided information before storing it in the database.

D.

Enable the SSL encryption for the SQL Server connections.

Full Access
Question # 12

You work as a Software Developer for ABC Inc. You create an ASP.NET Web application named MyWebApplication. You want to provide secure access to company's customers. You want to enable users to access the site from any browser by providing their user name and password. Which of the following authentication methods will you use to accomplish this task?

A.

Windows NT

B.

Secure Socket Layer

C.

Basic

D.

Single Sign-On

E.

Certificate Server

Full Access
Question # 13

Session variables can be any valid __________.

A.

.NET Framework type

B.

Integer type

C.

SessionStateItemCollection object

D.

Object type

Full Access
Question # 14

George works as a Software Developer for GenTech Inc. He creates an application named App1 using Visual Studio .NET. App1 uses the version 2.0.0.0 of an assembly named Assembly1. However, he wants App1 to use a new version i.e. 2.1.0.0 of Assembly1. Therefore, he needs to specify Assembly1's location so that App1 can use version 2.1.0.0 of Assembly1. What will George use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

An unmanaged code.

B.

A managed code.

C.

The element.

D.

The element.

Full Access
Question # 15

Which of the following can be used as an alternative of S/MIME standard?

A.

MIME

B.

SMTP

C.

MIME/PGP

D.

NNTP

Full Access
Question # 16

You work as a Software Developer for ABC Inc. You create a Console application to create multiple satellite assemblies. Which of the following statements about satellite assemblies are true?

Each correct answer represents a complete solution. Choose all that apply.

A.

They do not contain any executable code.

B.

An application can have only one satellite assembly.

C.

The Assembly Linker tool is used to compile .resources files into satellite assemblies.

D.

They are used to deploy language-specific resources for an application.

Full Access
Question # 17

John works as a Web Developer for ProMetaworks Inc. He creates an ASP.NET application, named MyApp1, by using Visual Studio .NET. MyApp1 contains a page, named Page1. Page1 contains a RadioButtonList control that contains five items. John wants to ensure that users select one of the items from the RadioButtonList control before submitting the page. He wants to accomplish the task with least development effort. Which of the following validation controls will he use to accomplish the task?

A.

CustomValidator

B.

RangeValidator

C.

ValidationSummary

D.

RequiredFieldValidator

Full Access
Question # 18

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You create an ASP.NET Web application using the .NET Framework 3.5. The application contains a data-bound control. The user interface (UI) for modifying data from a LinqDataSource control is typically provided through the data-bound control. You are required to perform automatic data modifications. Which of the following conditions are required to enable automatic data modifications?

Each correct answer represents a part of the solution. Choose all that apply.

A.

The class that is assigned to the ContextTypeName property must derive from DataContext .

B.

The Where property cannot be assigned a value.

C.

The GroupBy property cannot be assigned a value.

D.

The Select property cannot be assigned a value.

E.

The property that is assigned to the TableName property must derive from Table(TEntity).

Full Access
Question # 19

Peter works as a Software Developer for PentaSoft Inc. He develops an application, named App1, using Visual C# .NET. The application is intended to deal with several file input and output operations. He uses the following try structure in the application code to handle errors that occur during the execution of App1.

try

{

//Statements that might cause a runtime error.

}

catch (System.IO.FileNotFoundException ex)

{

//Statements

}

catch (System.IO.PathTooLongException ex)

{

//Statements

}

catch (System.IO.IOException ex)

{

//Statements

}

catch (Exception ex)

{

//Statements

}

What will happen if an exception of type System.IO.DirectoryNotFoundException occurs in the try block?

A.

The catch block that handles an exception of type IOException will be executed.

B.

The catch block that handles an exception of type Exception will be executed.

C.

The catch block that handles an exception of type FileNotFoundException will be executed.

D.

The catch block that handles an exception of type PathTooLongException will be executed.

Full Access
Question # 20

You work as a Software Developer for ManSoft Inc. The company uses Visual Studio .NET as its application development platform. You create an application named MyRandomGen. You use the System.Security.Cryptography namespace. You want to create a code that randomly rolls the dice fifty times and displays the results on the screen. Which of the following code segments will you use to accomplish this task?

A.

for(int x = 0; x <= 50; x++)

Console.WriteLine(RollTheDice(6));

public static int RollTheDice(int sides)

{

byte[] random = new byte[1];

RNGCryptoServiceProvider Gen = new RNGCryptoServiceProvider();

Gen.GetBytes(random);

int ran = Convert.ToInt32(random[0]);

return ran % sides + 1;

}

B.

for(int x = 0; x <= 50; x++)

Console.WriteLine(RollTheDice(6));

public static int RollTheDice(int sides)

{

byte[] random = new byte[1];

RNGCryptoServiceProvider Gen = new RNGCryptoServiceProvider();

Gen.GetRandom(random);

int ran = Convert.ToInt32(random[0]);

return ran % sides + 1;

}

C.

for(int x = 0; x <= 50; x++)

Console.WriteLine(RollTheDice(6));

public static int RollTheDice(int sides)

{

byte[] random = new byte[1];

RNGCryptoServiceProvider Gen = new RNGCryptoServiceProvider();

Gen.GetBytes(Gen);

int ran = Convert.ToInt32(random[0]);

return ran % sides + 1;

}

D.

for(int x = 0; x <= 50; x++)

Console.WriteLine(RollTheDice(6));

public static int RollTheDice(int sides)

{

byte[] random = new byte[1];

RNGCryptoServiceProvider Gen = new RNGCryptoServiceProvider();

Gen.RandomNumber(random);

int ran = Convert.ToInt32(random[0]);

return ran % sides + 1;

}

Full Access
Question # 21

David works as a Software Developer for McRobert Inc. He develops a Windows-based application, named App1, using Visual C# .NET. The application contains a Form control, named Form1. He wants to write code to initialize class-level variables, named Var1, Var2, and Var3, as soon as Form1 is instantiated. Which of the following code will he use to accomplish this?

A.

private void Form1_Initialize(System.Object sender, System.EventArgs e)

{

int Var1 = 20;

int Var2 = 40;

int Var3 = 60;

}

B.

private void Form1_Load(System.Object sender, System.EventArgs e)

{

int Var1 = 20;

int Var2 = 40;

int Var3 = 60;

}

C.

private void Form1_New(System.Object sender, System.EventArgs e)

{

int Var1 = 20;

int Var2 = 40;

int Var3 = 60;

}

D.

private void Form1_Create(System.Object sender, System.EventArgs e)

{

int Var1 = 20;

int Var2 = 40;

int Var3 = 60;

}

Full Access
Question # 22

You work as a Software Developer for Mansoft Inc. The company uses Visual Studio.NET as its application development platform. You create an ASP.NET Web application using the .NET Framework. You want to authenticate the application and then deploy it on a server running

Microsoft Windows Server 2003 Standard Edition hosting Microsoft Internet Information Services 6.0. Which of the following authentication methods will you use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

A.

Integrated Windows

B.

Extensible Authentication Protocol

C.

Windows NT

D.

Anonymous

E.

Basic

Full Access
Question # 23

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. You create an application using .NET Framework. You use the application to create an assembly. Now you need to encrypt assembly data. The company has not provided encryption requirements to you. Which of the following symmetric cryptography classes will you use to accomplish this task?

A.

RSA

B.

3DES

C.

RijndaelManaged

D.

DES

E.

TDEA

Full Access
Question # 24

Sam works as a Software Developer for GenTech Inc. The company uses Visual Studio .NET as its application development platform. Sam develops an application named App1 using Visual C# .NET. App1 uses a non-COM DLL named Value1.dll, which contains unmanaged code. Sam wants to write a method named Method1 in Value1.dll. He wants to use Method1 for parsing a string into an array of string values and an array of numbers. He decides to specify three parameters for Method1. The first parameter will contain a static string value. After executing Method1, the second parameter will contain all string values found in the first parameter, and the third parameter will contain all integer values found in the first parameter. Sam wants to enable App1 to call this function. Which of the following code will he use to accomplish this?

A.

int Method1 Lib "Value1.dll"(string, out string, out int);

B.

int Method1 Lib "Value1.dll"(string, ref string, ref int);

C.

int Method1 Lib "Value1.dll"(ref string, string, int);

D.

int Method1 Lib "Value1.dll"(string, string, int);

Full Access
Question # 25

You work as an Enterprise Application Developer for ABC Inc. The company uses Visual Studio 2008 as its application development platform. You create a web application using .NET Framework 3.5. You have created a form named Form1. You have added Textbox controls for taking Name, Address, and Phone Number of user as input in Form1. You want to ensure that a user enters a value in the Name field. Which of the following validation server controls will you use to accomplish the task?

A.

RequiredFieldValidator

B.

RangeValidator

C.

CompareValidator

D.

CustomValidator

Full Access
Question # 26

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You have recently finished the development of an ASP.NET Web application using .NET Framework 3.5. The application must be deployed by using the http://www.ABC.com/ URL. The application has several Web forms.

You need to implement Really Simple Syndication (RSS) feeds functionality. The RSS feeds will be used by the http://www.ABC.com/Updates.rss URL. You must ensure that the application displays the RSS-formatted information when accessing the given URL. What will you do to accomplish this?

Each correct answer represents a part of the solution. Choose two.

A.

Create and register a custom HttpHandler class that releases the RSS feeds.

B.

Create a Web form named Updates that releases the RSS feeds.

C.

Create an ASMX Web service component named Updates.

D.

Add the HttpHandler class to the .rss extension.

E.

Create and register a custom HttpModule class.

Full Access
Question # 27

Ross works as a Software Developer for GenTech Inc. He develops a Windows-based application using Visual Studio .NET. He uses the Write method of the Debug and Trace classes to record information about the execution of the application in Windows 2000 event log. Ross performs integration testing on the application. He wants to ensure that only one entry is made to the event log, each time a call is made to the Write method of either class. Which of the following code will he use to accomplish this?

Each correct answer represents a complete solution. Choose two.

A.

EventLogTraceListener RossTraceListener = new EventLogTraceListener("RossEventLogSource");

Trace.Listeners.Add(RossTraceListener);

B.

EventLogTraceListener RossDebugListener = new EventLogTraceListener("RossEventLogSource");

Debug.Listeners.Add(RossDebugListener);

C.

EventLogTraceListener RossTraceListener = new EventLogTraceListener("RossEventLogSource");

Debug.Listeners.Add(RossTraceListener);

Trace.Listeners.Add(RossTraceListener);

D.

EventLogTraceListener RossDebugListener = new EventLogTraceListener("RossEventLogSource");

EventLogTraceListener RossTraceListener = new EventLogTraceListener("RossEventLogSource");

Debug.Listeners.Add(RossDebugListener);

Trace.Listeners.Add(RossTraceListener);

Full Access
Question # 28

Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using the .NET Framework.. He writes the following code segment in the application:

01 class gClass

02 {

03 public gClass(int k)

04 {

05 //Write code here

06 }

07 }

08 public class gSub : gClass

09 {

10 public static void Main(String[] argv)

11 {

12 gSub gs=new gSub(20);

13 }

14 gSub(int j):base(j)

15 {

16 //Write Code here

17 }

18 gSub(string st, int j):this(j)

19 {

20 gClass ss=new gClass();

21 }

22 }

When you execute the above code segment, you get an error at line 20. Which of the following code segments will he place at line 20 to execute the code successfully?

Each correct answer represents a complete solution. Choose all that apply.

A.

gClass ss=new gClass(j);

B.

base();

C.

gClass ss=new gClass(200);

D.

gSub gg=new gSub();

Full Access
Question # 29

You work as a Software Developer for ManSoft Inc. You use Microsoft Visual Studio to create a Web service named MyWebService. You create a SOAP message that is not secure in the Web service. You want to use the SoapFilter class in the Web service to filter the SOAP message. Which of the following code segments will you use to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

A.

public class MySoapFilter : SoapFilter

{

string soapmsg="This is the soap message I want to filter";

public MySoapFilter()

{ }

public override SoapFilterResult ProcessMessage(SoapEnvelope envelope)

{

this.Trace(soapmsg);

return SoapFilterResult.Continue;

}

}

B.

public class MySoapFilter : SoapFilter

{

string soapmsg="This is the soap message I want to filter";

public override SoapFilterResult ProcessMessage(SoapEnvelope envelope)

{

this.Trace(soapmsg);

return SoapFilterResult.Continue;

}

}

C.

public class MySoapFilter : SoapFilter

{

string soapmsg="This is the soap message I want to filter";

public override SoapFilterResult ProcessMessage(SoapEnvelope envelope)

{

this.Trace();

return SoapFilterResult.Continue;

}

}

D.

public class MySoapFilter : SoapFilter

{

string soapmsg="This is the soap message I want to filter";

public MySoapFilter()

{ }

public override SoapFilterResult ProcessMessage(SoapEnvelope envelope)

{

this.Trace(soapmsg);

return SoapFilterResult;

}

}

Full Access
Question # 30

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are deploying a class library using the .NET Framework. Portions of your code need to access system environment variables. You need to force a runtime security exception only when the callers that are higher in the call stack do not have necessary permissions to access the resources. Which of the following methods will you use to accomplish the task?

A.

PermitOnly()

B.

Demand()

C.

Assert()

D.

Deny()

Full Access
Question # 31

Mark works as a Web Developer for TechCom Inc. He creates an ASP.NET application named

Application1 by using Visual Studio .NET. Only registered users of the company will be able to use the application. The application contains a page named UserAcc.aspx that allows new users to register themselves to the registered users' list of the company. The UserAcc page contains several text box controls that accept users' personal details such as user name, password, home address, zip code, phone number, etc. One of the text box controls on the page is named ZipProperty in which a user enters a zip code.

Mark wants to ensure that when a user submits the UserAcc page, ZipProperty must contain five numeric digits. Which of the following validation controls will he use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

A.

RequiredFieldValidator

B.

RangeValidator

C.

CompareValidator

D.

RegularExpressionValidator

E.

RequiredValidator

Full Access
Question # 32

You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Web application using .NET Framework 2.0. You add a Web Form that contains a button named bCancel. The button allows users to exit the form. When users click the button, validation should not occur. However, during testing you find that clicking the button does not allow users to exit the form. You need to ensure that users can always exit the page. What will you do?

A.

Set the CausesValidation property of the bCancel button to false.

B.

Set the AccessibleName property of the validation controls on the Web Form to "false".

C.

Set the ControlToValidate property of the validation controls on the Web Form to the ID of the control.

D.

Set the Enabled property of the validation controls on the Web Form to false.

Full Access
Question # 33

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of a class named TestCase and you have used only reference types in the class. The class will be used in an application that will use pointers. Therefore, you are required to convert the reference types to pointers in the class. Which of the following keywords will you use to accomplish the task?

A.

base

B.

virtual

C.

override

D.

unsafe

Full Access
Question # 34

You work as a Software Developer for ABC Inc. You have created a console application that uses two threads, named thread1 and thread2. You need to modify the code to prevent the execution of thread1 until thread2 completes its execution. Which of the following steps will you take to accomplish this task?

A.

Use a WaitCallBack delegate to synchronize the threads.

B.

Call the sleep() method of thread1.

C.

Call the SpinWait() method of thread1.

D.

Configure thread1 to run at a lower priority.

E.

Configure thread2 to run at a higher priority.

Full Access
Question # 35

You work as a Software Developer for ABC Inc. You create a Web service named MyWebService using Visual Studio .NET. You implement a public Web method. You make the method accessible through a Web service application by attaching the WebMethod attribute to the public method. The public method is stored in the class file of the Web service file. When you create a Web service project using the Web service project template, by default, one public method named HelloWorld is created. The HelloWorld public method does not become available through the Web service until you attach the WebMethod attribute. The method must be applied to each method declaration. Now, you want to configure a Web service method. You want to ensure that the Web method performs updates on more than one databases or if the sequence of updates is critical to the overall success of the Web method. Which of the following properties will you use to accomplish this task?

A.

TransactionOption

B.

Description

C.

BufferResponse

D.

EnableSession

Full Access
Question # 36

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. The application uses serialization to allow users to take an instance of an object and convert it into a format that can be easily transmittable over the network or even stored in a database. You want to provide the base functionality for the common language runtime serialization formatters. Which of the following classes will you use to accomplish the task?

A.

SoapFormatter

B.

FormatterConverter

C.

Formatter

D.

BinaryFormatter

Full Access
Question # 37

You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

A.

Cryptographic toolkit

B.

Cryptosystem

C.

Cryptographer

D.

Cryptanalyst

Full Access
Question # 38

The element does not apply to errors that occur in __________.

A.

XML Web services

B.

Windows services

C.

Web services directory

D.

Web services

Full Access
Question # 39

You work as a Software Developer for ABC Inc. You are defining a component for an application. In some deployments, the component will be deployed on the same computer as the application. In other deployments the component will be deployed on a separate computer. The component has implicit dependencies and needs to access and use server-side resources that cannot cross system boundaries.

You must ensure that your component design supports both deployment scenarios. What will you do to accomplish the task?

A.

Create a SingleCall object.

B.

Create a marshal-by-value object.

C.

Create a marshal-by-reference object.

D.

Create a Singleton object.

Full Access
Question # 40

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You create an ASP.NET Web application using the .NET Framework 3.5. The application contains two HTML pages named Error.htm and

PageNotFound.htm. You want to make sure that the following requirements are met:

l When any user requests a page that does not exist, the PageNotFound.htm page is displayed.

l When any other error occurs, the Error.htm page is displayed.

Which of the following code segments will you add to the Web.config file to accomplish this task?

A.

B.

C.

D.

Full Access
Question # 41

Mark works as a Web Developer for ABC Inc. He develops an ASP.NET application, named MyApp1, using Visual Studio .NET. MyApp1 allows users to view and purchase company products.

It includes several pages. The start-up page of the application is Page1.aspx. He configures the application's Web.config file to use form-based authentication.

Mark wants users to log on to Page1.aspx by providing their user names and passwords. To accomplish this, he creates an ASP.NET page named UsersLogIn.aspx that allows each user to specify a user name and password. He then writes the following syntax in the Web.config filE.

loginUrl="/UsersLogIn.aspx"

protection="All"

timeout="60"

slidingExpiration="true">

What will be the result?

Each correct answer represents a part of the solution. Choose two.

A.

The session will expire after 60 seconds.

B.

The session will expire after 60 minutes.

C.

The session will expire after 60 hours.

D.

The session lifetime will be reset periodically.

E.

The session will never expire.

F.

Once the session lifetime is set, it will not change.

Full Access
Question # 42

John works as a Web Developer for TechCom Inc. He creates an ASP.NET application, named MyApp1, by using Visual Studio .NET for a University Web site. Students will use MyApp1 to view their term end results. MyApp1 contains an ASP.NET page, named Page1. Page1 contains a TextBox control, named txtEnrolmentNo, and two Button controls, named btnSubmit and btnCancel.

John wants to display the text "Enter Enrolment Number" within txtEnrolmentNo. He wants to ensure that if a user tries to submit the page without entering an enrolment number, the word "Error" appears next to txtEnrolmentNo. Which of the following actions will he take to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

A.

Add a RequiredFieldValidator control to the page. Set its ControlToValidate property to txtEnrolmentNo, InitialValue property to "Enter Enrolment Number", and ErrorMessage property to "Error".

B.

Add a RequiredFieldValidator control to the page. Set its ControlToValidate property to txtEnrolmentNo, ErrorMessage property to "Enter Enrolment Number", and InitialValue property to "Error".

C.

Set the InitialValue property of txtEnrolmentNo to "Enter Enrolment number".

D.

Set the Text property of txtEnrolmentNo to "Enter Enrolment number".

E.

Add a RegularExpressionValidator control to the page. Set its ControlToValidate property to txtEnrolmentNo, ErrorMessage property to "Enter Enrolment Number", and InitialValue property to "Error".

Full Access
Question # 43

You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application for the branch in China. You are also implementing encoding in the application for Chinese language. Which of the following encoding types will you use to support Chinese language?

Each correct answer represents a complete solution. Choose all that apply.

A.

UTF-16

B.

UTF-8

C.

UTF-32

D.

ASCII

Full Access
Question # 44

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a message queue named SecureQ using .NET Framework. The message queue requires each incoming message to be encrypted. You want to ensure that a message can be sent to SecureQ without an exception being thrown. What will you do to accomplish this task?

A.

Use the CryptoStream class to encrypt the Body property on the message.

B.

Set the HashAlgorithm property to a value from the HashAlgorithm enumeration on the me ssage.

C.

Set the EncryptionAlgorithm property to a value from the EncryptionAlgorithm enumeration on the message.

D.

Set the UseEncryption property to true on the message.

Full Access
Question # 45

You work as an Enterprise Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Windows client application that communicates with a business layer component using the .NET Framework. The business layer component includes a class named MyUtility as follows:

public class MyUtility

{

public MyUtility() { }

public void ChangeData() { }

}

The application must fulfill the following criteriA.

l Create instances of the MyUtility class only within the business component.

l The application should invoke the functions within the MyUtility class.

You evaluate the code of the MyUtility class and decide it requires modification. Which of the following modifications for the code will you recommend?

A.

Change the scope of the MyUtility class to private.

B.

Change the scope of the constructor to private.

C.

Change the scope of the constructor to internal.

D.

Change the scope of the MyUtility class to internal.

Full Access
Question # 46

You work as a Software Developer for InfoTech Inc. You create a Windows form in a Windows-based application named MyWinApp1. You use graphics in the form. You write the following code in your form:

private void MyMouseEvent1(object sender1, MouseEventArgs event)

{

// Code to handle mouse events

}

You want to implement a property of the MouseEventArgs object. This property will return a Point structure that contains the x-coordinate and y-coordinate of the mouse. Which of the following properties of the MouseEventArgs object will you use to accomplish this?

A.

Y

B.

Location

C.

Button

D.

X

E.

Delta

F.

Clicks

Full Access
Question # 47

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows Forms application using .NET Framework 3.5. The application contains a data-bound control. The user interface (UI) for modifying data from a LinqDataSource control is typically provided through the data-bound control. You are required to perform automatic data modifications. Which of the following conditions are required to enable automatic data modifications?

Each correct answer represents a part of the solution. Choose all that apply.

A.

The class that is assigned to the ContextTypeName property must derive from DataContext .

B.

The GroupBy property cannot be assigned a value.

C.

The property that is assigned to the TableName property must derive from Table(TEntity).

D.

The Where property cannot be assigned a value.

E.

The Select property cannot be assigned a value.

Full Access
Question # 48

Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. Allen develops an application using .NET Framework 3.5. The application connects to a SQL Server database using a SqlConnection object named Connection1. He creates some stored procedures in the database, which are used to update the data. Allen finds that sometimes, the update operation does not affect any row. He wants to add an error handling code to the application. Which of the following code segments will he use to accomplish the task?

A.

try

{

Connection1.open();

}

catch(DataException Myexcept)

{

//Error-handling code

}

B.

try

{

Connection1.open();

}

catch(SqlException Myexcept)

{

//Error-handling code

}

C.

try

{

Connection1.open();

}

catch(DBConcurrencyException Myexcept)

{

//Error-handling code

}

D.

try

{

Connection1.open();

}

catch(InvalidCastException Myexcept)

{

//Error-handling code

}

Full Access
Question # 49

Allen works as a Software Developer for Mansoft Inc. He develops an application using Visual Studio .NET 2005. The application connects to a SQL Server database using a SqlConnection object named NewConnection. Allen creates a few stored procedures in the database. Sometimes an error occurs, when a user executes stored procedures. Allen wants to add an error-handling code to the application to handle errors that occur on executing stored procedures. Which of the following code segments will he use to accomplish this task?

A.

try

{

NewConnection.Open();

}

catch(DBConcurrencyException exep)

{

//Error-handling code

}

B.

try

{

NewConnection.Open();

}

catch(SqlException exep)

{

//Error-handling code

}

C.

try

{

NewConnection.Open();

}

catch(DataException exep)

{

//Error-handling code

}

D.

try

{

NewConnection.Open();

}

catch(InvalidCastException exep)

{

//Error-handling code

}

Full Access
Question # 50

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. The application uses Forms authentication. Your company uses Active Directory.

You need to modify the application to enable users to make use of their existing Active Directory account to access the application through the Internet. You are required to ensure that the application must be modified with the least amount of user interface changes, cost, and development effort. What will you do to accomplish this?

A.

Remove Forms authentication and create an ASP.NET membership.

B.

Change the membership provider to ActiveDirectoryMembershipProvider.

C.

Create a custom membership provider that has access to the corporate Active Directory.

D.

Change the application to use the Windows authentication provider instead of Forms authentication.

Full Access
Question # 51

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. You create an application using .NET Framework. The application is using an assembly. You want to ensure that the application provides the best performance. Security is not a consideration. Which of the following permission sets will you use to accomplish the task?

A.

Everything

B.

FullTrust

C.

Nothing

D.

Execution

E.

LocalIntranet

F.

Internet

Full Access
Question # 52

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating an application using the .NET Framework. The application contains a class named globalInfo. You need to serialize all public and nonpublic data of the globalInfo class to ensure that the class generates the minimum byte stream so that the minimum load is placed upon network resources. What will you do?

A.

Use the XmlSerializer class.

B.

Use the BinaryFormatter class.

C.

Use the SoapFormatter class.

D.

Use the IXmlSerializable interface.

Full Access
Question # 53

Emily works as a Programmer in an Eye Research Center. The center keeps several records such as case history records for old patients and newly admitted patients, and records for outdoor patients. The Head of the Research Center wants Emily to generate reports for each outdoor patient with minimum network traffic. Emily develops an application named OutdoorPatientReport by using Visual Studio .NET. She needs to utilize the data repository as maintained by the center.

She wants to ensure that the application is displayed to all the doctors. Which of the following actions will Emily take to accomplish this task?

A.

Use Microsoft SQL Server stored procedures for data calculations.

B.

Implement a batch processing system for data calculations.

C.

Create more than one database for data manipulations.

D.

Use SQL Server indexes to optimize data calculations.

Full Access
Question # 54

Allen works as a Software Developer for Mansoft Inc. He develops a Web application using Visual Studio .NET. He adds a Web reference to an XML Web service named MyWebService in the application. MyWebService includes a method named MyMethod, which takes user identification number as a parameter and returns a DataSet object containing user information. The System.ArgumentException is thrown if the user identification number does not lie between 1 and 500. Allen writes a try and catch block to capture the exception thrown by the Web service. Which of the following exceptions will the try and catch block catch if a user calls MyMethod passing 501 as a parameter?

A.

System.Web.Services.Protocols.SoapException

B.

System.Web.Services.Protocols.SoapHeaderException

C.

System.ApplicationException

D.

System.ArgumentNullException

Full Access
Question # 55

Maria works as a Software Developer for MarcLync Inc. She creates an XML Web service, named MyWebService, using Visual Studio .NET. Maria wants to debug MyWebService. Therefore, she attaches a debugger to the Web service process. However, Maria notices that whenever MyWebService is executed, it throws an exception System.Net.WebException after a certain time period. The exception displays the message "The current operation has timed-out." Maria wants to modify the code in MyWebService. Which of the following actions will Maria take in order to resolve this issue?

A.

Set the timeout value for the MyWebService call to zero.

B.

Set the timeout value for the MyWebService call to false.

C.

Add an exception handling block.

D.

Set the timeout value for the MyWebService call to -1.

Full Access
Question # 56

You work as a Software Developer for InfoTech Inc. You develop an application named MyApp that works as a scientific calculator. A user inputs data and retrieves the calculated results based on the input values. The application uses a SQL database that contains two tables. One table contains data related to standard calculation specifications and the other table stores input values entered by the user. You want to ensure that the user is able to retrieve appropriate data fast. Which of the following actions will you take to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Use more than one component to process input data.

B.

Write code that performs multiple tasks simultaneously.

C.

Run multiple processes on a single thread.

D.

Use a single component to process input data.

E.

Run multiple processes on separate threads.

Full Access
Question # 57

Andrew works as a Software Developer for BlueWell Inc. He develops a Windows-based application, named App1, using Visual Studio .NET. The application uses Microsoft SQL Server as a backend database. Andrew wants to perform security checks on App1. Which of the following statements regarding security checks are true?

Each correct answer represents a complete solution. Choose two.

A.

Declarative security check works by instantiating security classes.

B.

Declarative security check works by assigning attributes to assemblies.

C.

Imperative security check works by instantiating security classes.

D.

Imperative security check works by assigning attributes to assemblies.

Full Access
Question # 58

You work as a Software Developer for ABC Inc. You develop a Web application that contains several Web pages. The Web pages contain several Web server controls that implement validation controls for user input validation. Under which of the following circumstances will you perform user input validation programmatically for Web server controls?

Each correct answer represents a complete solution. Choose all that apply.

A.

When the validity of a control or a Web page is to be determined in the Page_Load event h andler.

B.

When the user input validation data values are not set until run time.

C.

When the server or validation controls are added during design time.

D.

When the validity of a control or a Web page is to be determined in the Page_Init event ha ndler.

E.

When the server or validation controls are added during run time.

Full Access
Question # 59

You work as an Enterprise Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a logging utility class using .NET Framework 3.5. The utility class writes logs to event log services. You are required to ensure that the client applications that use the utility class can create an instance of the utility class only if they have access rights to write to the event log services.

What will you do?

A.

Use role based security in the class constructor.

B.

Use declarative security check on the assembly.

C.

Use role based security on the class.

D.

Use code access security on the class.

Full Access
Question # 60

You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. The application will be used by all the branches of the company. You sometimes require a variable number of arguments to be passed to a method. For example, you may require a sum method, which calculates the total of the numbers passed to it no matter how many numbers are passed. What will you do to accomplish the task?

A.

Use the base keyword.

B.

Use the ref keyword.

C.

Use the params keyword.

D.

Use the out keyword.

E.

Use the volatile keyword.

Full Access
Question # 61

Ricky works as a Software Developer for SoftTech Inc. He creates an XML Web service, named XmlWeb, by using Visual Studio .NET. He wants to publish XmlWeb within the company's intranet. Which of the following actions will Ricky take to publish XmlWeb?

Each correct answer represents a part of the solution. Choose all that apply.

A.

Register XmlWeb in the private UDDI registry.

B.

Use XML Spy to register XmlWeb.

C.

Register XmlWeb in the public UDDI registry.

D.

Build a discovery (disco) document for XmlWeb.

Full Access
Question # 62

You work as a Software Developer for Blue Well Inc. You create a mobile Web application for mobile users. You want to ensure that a cookieless session is implemented on it. Which of the following statements are the main reasons of implementing a cookieless session on a mobile Web application?

Each correct answer represents a part of the solution. Choose two.

A.

Tests mobile Web applications

B.

Stores data in Web server memory

C.

Ensures better compatibility with mobile devices

D.

Maintains session state of each user

Full Access
Question # 63

Sam works as a Software Developer for GenTech Inc. He deploys an ASP.NET application on a server. When an error occurs, users are redirected to a custom error page that is specified in the Web.config file. Users report that a particular page repeatedly generates errors. Sam wants to gather detailed information about the error on this page. He also wants to ensure that users continue to be redirected to the custom error page, if the requested pages generate errors. What will Sam do to accomplish this?

A.

In the Web.config file, set the mode attribute of the customErrors element to RemoteOnly.

Access the page from a browser on the server.

B.

Modify the Web.config file to include the following element:

Access the application from a browser on a client computer.

C.

In the Web.config file, set the mode attribute of the customErrors element to RemoteOnly.

Access the page from a browser on a client computer.

D.

Modify the @ Page directive so that the Trace and the LocalOnly attributes are set to true.

Access the page from a browser on the server.

Full Access
Question # 64

You work as a Software Developer for Mansoft Inc. You create an application and use it to create code access security policies. Which of the following tools will you use to examine and modify code access security policies from a batch file?

A.

GacUtil.exe

B.

StoreAdm.exe

C.

Caspol.exe

D.

Tlbimp.exe

E.

Sn.exe

Full Access
Question # 65

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You are developing an application using .NET Framework 2.0. You are required to use a datatype that will store only the numbers. The numbers should be in positive form and should not be larger than 65,535. Which of the following datatypes will you use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

A.

System.UInt16

B.

ushort

C.

System.Int16

D.

int

E.

short

Full Access
Question # 66

Richard works as a Software Developer for BlueWell Inc. He is writing a component that will be shared by multiple applications. He wants to install the component in the GAC (Global Assembly Access) To install a component in the GAC, he requires to provide a strong name to the component. Which of the following tools will he use to accomplish this task?

A.

Al.exe

B.

Sn.exe

C.

Cert2spc.exe

D.

Signcode.exe

E.

Gacutil.exe

Full Access
Question # 67

You work as a Software Developer for ABC Inc. You use C# .NET to develop a windows application. The application will implement a role-based authorization scheme that is based on a Microsoft SQL Server database of user names. Users will enter their names in a text box named UserName. You must ensure that users are assigned the supervisor role and the PG role by default. Which of the following code segments will you use to accomplish this task?

A.

GenericIdentity identity =

new GenericIdentity(UserName.Text);

string[] RoleArray = {"Supervisor", "PG"};

WindowsPrincipal principal = new WindowsPrincipal(identity);

B.

WindowsIdentity identity =

new WindowsIdentity.GetAnonymous();

string[] RoleArray = {"Supervisor", "PG"};

WindowsPrincipal principal = new GenericPrincipal(identity, RoleArray);

C.

GenericIdentity identity =

new GenericIdentity(UserName.Text);

string[] RoleArray = {"Supervisor", "PG"};

GenericPrincipal principal = new GenericPrincipal(identity, RoleArray);

D.

WindowsIdentity identity =

new WindowsIdentity.GetCurrent();

string[] RoleArray ={"Supervisor", "PG"};

GenericPrincipal principal = new GenericPrincipal(identity, RoleArray);

Full Access
Question # 68

Martha works as a Software Developer for NetCom Inc. She develops an application, named App1, using Visual Studio .NET. The application contains a form, named MyForm1. MyForm1 contains several controls including a TextBox, named txtDOB. The txtDOB control is used to accept the date of birth from a user. In order to ensure that a user enters a valid date in txtDOB, Martha adds validation logic to the Validating event of txtDOB. When she tests the form by using some invalid dates in txtDOB, the validation logic does not appear to be working as expected. What is the most likely cause of the issue?

A.

Martha has set the Locked property of txtDOB to True.

B.

Martha has set the CausesValidation property of txtDOB to False.

C.

Martha has set the SuppressValidation property of txtDOB to True.

D.

Martha has set the TabIndex property of txtDOB to 0.

Full Access
Question # 69

Adam works as a Software Developer for ABC Inc. He creates an ASP.NET application, named MyApp. During beta testing of MyApp, he ensures that both developers and beta testers see the actual text of error messages. Adam performs beta testing of other applications on the same test server. All the other applications display ASP.NET error messages. After completing beta testing, Adam promotes the beta test server to a production server. He wants all the applications to display a single, userfriendly error message. Adam also wants to configure MyApp and the production server to meet these goals. What will he do to accomplish the required task with minimum administrative effort?

A.

In the Web.config file for MyApp, add the following element:

B.

In the Machine.config file, add the following element:

C.

In the MyApp.config file, add the following element:

D.

In the MyApp.config file, add the following element:

E.

In the Web.config file for MyApp, add the following element:

F.

In the Machine.config file, add the following element:

Full Access
Question # 70

You work as a Software Developer for ABC Inc. You create an ASP.NET Web application named MyWebApplication. You want to provide secure access to company's customers. You want to enable users to access the site from any browser by providing their user name and password. Which of the following authentication methods will you use to accomplish this task?

A.

Windows NT

B.

Secure Socket Layer

C.

Basic

D.

Single Sign-On

E.

Certificate Server

Full Access
Question # 71

You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Web application using .NET Framework 2.0. You configure the application at the following levels:

l Root Web

l Web application root directory

l Web site

l Web application subdirectory

In which of the following files will these levels be stored?

A.

Manhine.config

B.

Proxy auto-config

C.

ApplicationName.config

D.

Web.config

Full Access