GIAC GIAC Secure Software Programmer – C#.NET GSSP-.NET Dumps Questions

To be a GIAC GIAC Secure Software Programmer – C#.NET certified with DumpsBase GSSP-.NET Dumps Questions now. The GIAC Secure Software Programmer .NET (GSSP-NET) certification validates a practitioner’s knowledge, skills, and abilities to write secure code and recognize security shortcomings in existing code. GSSP-NET certification holders have demonstrated mastery of the security knowledge and skills needed to deal with common programming errors that lead to most security problems. DumpsBase GSSP-.NET dumps are based on the exam knowledge and skills, the professional team have written the valid exam questions and answers to ensure that you can pass GSSP-.Net exam. 

Read GIAC GIAC Secure Software Programmer – C#.NET GSSP-.Net Free Dumps

1. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. You create a Web form in the application that permits users to provide personal information. You add a DropDownList control to the Web form to retrieve the residential status of users. The default item that the DropDownList control displays is the "Select Country" option. You have to ensure that users select a country other than the default option.

Which of the following validation controls should you use to accomplish this task?

2. Sam works as a Software Developer for GenTech Inc. He develops an application named App1 using Visual Basic .NET. App1 uses a non-COM DLL named Value1.dll, which contains unmanaged code. Sam writes a method named Method1 in Value1.dll as follows:

Method1 Lib "Value1.dll"(ByVal InputVar As String, ByRef WordsVar As String, ByRef

NumbersVar As Integer) As Integer

Sam wants to use Method1 for parsing a string into an array of string values and an array of integers. Sam wants to enable App1 to call this function.

Which of the following statements about the method are true? Each correct answer represents a complete solution. Choose all that apply.

3. You work as a Software Developer for ManSoft Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You create an application that will be used by all the branches of the company. You use the Regex class in the application to validate some strings. You want to search an input string for an occurrence of a regular expression.

Which of the following methods of the Regex class will you use to accomplish the task?

4. You work as a Web Application Developer for SunInfo Inc. The company uses Visual Studio 2008 as its application development platform. You create a Web application using .NET Framework 3.5. You want to attach the Visual Studio Debugger to Internet Explorer when the application is running.

Which of the following steps will you take to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

5. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You have recently finished development of a Windows application using .NET Framework. Users report that the application is not running properly.

When the users try to complete a particular action, the following error message comes out:

Unable to find assembly 'myservices, Version=1.0.0.0, Culture=neutral,

PublicKeyToken=29b5ad26c9de9b95'.

You notice that the error occurs as soon as the application tries to call functionality in a serviced component that was registered by using the following command:

regsvcs.exe myservices.dll

You must make sure that the application can call the functionality in the serviced component with no exceptions being thrown.

What will you do to accomplish this task?

6. Patrick works as a Software Developer for GenTech Inc. He develops an application, named App1, using Visual C# .NET. He implements security using the security classes of the .NET Framework. He defines the following statements in the application:

PrincipalPermission Principal_Perm1 = new PrincipalPermission("Nick", "General

Manager");

PrincipalPermission Principal_Perm2 = new PrincipalPermission("Jack", "Accountant");

Patrick wants to check whether all demands that succeed for Principal_Perm1 also succeed for Principal_Perm2.

Which of the following methods of the PrincipalPermission class will he use to accomplish this?

7. ASP.NET version 2.0 health monitoring supports an __________.

8. You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows Forms application using .NET Framework 3.5. The application contains a data-bound control. You use the LinqDataSource control to use LINQ in the ASP.NET application by setting properties in markup text. The LinqDataSource control uses LINQ to SQL to automatically generate the data commands. You are required to perform data operations by using the LinqDataSource control.

What is the correct order in which data operations are applied?

9. You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating a Windows Forms application using .NET Framework 3.5. You need to develop a new control for the application. You must ensure that the control inherits the TreeView control by adding a custom node tag and a highlight color.

What will you do?

10. You work as a Software Developer for ABC Inc. The company has several branches Worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an applications using .NET Framework 2.0. You want to allow users to view various details of a given unmanaged code.

What will you do to accomplish the task?

11. Mark works as a Software Developer for Mansoft Inc. He develops an application using Visual

Studio .NET 2005.

He writes the following code snippet in the application:

public class MyClass

{

public static void Main(String[] args)

{

try

{

return;

}

finally

{

Console.WriteLine("Finally");

}

}

}

What will happen when Mark attempts to compile and execute the code snippet?

12. Which of the following modifiers in C# will you use if you do NOT want a custom-build component to be a base class?

13. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You have recently finished development of a Windows application using .NET Framework. Users report that the application is not running properly. When the users try to complete a particular action, the following error message comes out:

Unable to find assembly 'myservices, Version=1.0.0.0, Culture=neutral, PublicKeyToken=29b5ad26c9de9b95'.

You notice that the error occurs as soon as the application tries to call functionality in a serviced component that was registered by using the following command:

regsvcs.exe myservices.dll

You must make sure that the application can call the functionality in the serviced component with no exceptions being thrown.

What will you do to accomplish this task?

14. Smith works as a Software Developer for BlueWell Inc. He develops a Web application named WebApp by using Visual Studio .NET. He wants to deploy WebApp on a target computer. He wants to take precautionary measures in the application so that no issues may arise while deploying it.

Which of the following measures will Smith take to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

15. Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework. He wants to encrypt all his e-mails that he sends to anyone.

Which of the following will he use to accomplish the task?

16. You work as a software developer for ManSoft Inc. The company uses Visual Studio .NET 2005 as its application development platform. You use C#. NET to create an assembly that will be consumed by other Visual Studio .NET applications. No Permissions should be granted to this assembly unless the assembly makes a minimum permission request. You need to write a code for the assembly that makes a minimum permission request.

Which of the following code segments will you use to accomplish this task?

17. You work as a Web Application Developer for SunInfo Inc. The company uses Visual Studio 2008 as its application development platform. You create a Web application using .NET Framework 3.5. You want to redirect users to a default error page if an unhandled error occurs within your site.

Which of the following actions will you perform to accomplish the task?

18. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished development of an application using .NET Framework 2.0. The application has multiple threads that execute one after another. You want to modify the application and schedule the threads for execution based on their assigned priority.

What will you do to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

19. David works as a Software Developer for McRobert Inc. He develops a Web application named App1 using Visual Studio .NET. App1 contains several Web forms that display information about an online shopping process. David wants to provide a Web-based shopping catalog to users. However, he wants to ensure that the information about the shopping catalog is secure and requires no server resources.

What will David do to accomplish the task?

20. You work as a Software Developer for ABC Inc. You create a Console application to create multiple satellite assemblies.

Which of the following statements about satellite assemblies are true? Each correct answer represents a complete solution. Choose all that apply.

21. You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio .NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. The application will be used by all the branches of the company. You are using the CompareInfo class for culture-sensitive string comparisons.

You write the following code in the application:

String s1 = "C rtify";

String s2 = "c rtify";

String s3 = "c rtify";

You need to compare the s1 string with the s2 string and ensure that the string comparison must ignore case.

Which of the following code segments will you use to accomplish the task?

22. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You have recently finished development of a Windows application using .NET Framework. Users report that the application is not running properly. When the users try to complete a particular action, the following error message comes out:

Unable to find assembly 'myservices, Version=1.0.0.0, Culture=neutral,

PublicKeyToken=29b5ad26c9de9b95'.

You notice that the error occurs as soon as the application tries to call functionality in a serviced component that was registered by using the following command:

regsvcs.exe myservices.dll

You must make sure that the application can call the functionality in the serviced component with no exceptions being thrown.

What will you do to accomplish this task?

23. Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework. He wants to encrypt all his e-mails that he sends to anyone.

Which of the following will he use to accomplish the task?

24. John works as a Software Developer for DawnStar Inc. He creates a class, named MyClass1. He wants to generate a key pair that he will use to give the compiled assembly a strong name.

Which of the following tools will he use to accomplish the task?

25. You work as a Software Developer for HiTech Inc. You develop a Web application named

MyWebApp. The application contains several Web pages that display a registration form for a user. You want to perform user input data validation at the server-side, so that you can disable the client-side data input validation.

Which of the following actions will you take to accomplish the task?

26. Which of the following is the best encryption algorithm to encrypt and decrypt messages?

27. You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating a Windows Forms application using .NET Framework 3.5. You need to develop a new control for the application. You must ensure that the control inherits the TreeView control by adding a custom node tag and a highlight color.

What will you do?

28. Which of the following is an exception of background threads as compared to foreground threads?

29. You work as an Application Developer for ABC Inc. You are assigned with developing a Web site that will handle information related to monthly sales of the company. You wish to secure the Web site so that only employees of the Accounts department can view the Web pages. You need to create roles for the employees of this department. The user account information will be stored in a SQL Server database named Database. You decide to do all this by using the Web Site Administration Tool.

Which of the following types of security will you use to accomplish the task?

30. Which of the following providers is a block cipher that encrypts and decrypts data in blocks of 8 bytes?

31. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You create a Web service using the .NET Framework 2.0. You call a method in the Web service. The following exception is thrown in the Web service: client.System.Web.Services.Protocols.SoapException: Server was unable to process request. System.NullReferenceException: Object reference not set to an instance of an object. You find out that it is the following line of code that throws the exception: if (Session ["StoredValue"] == null)

You must ensure that the method runs without throwing any exception.

What will you do to accomplish this task?

32. You work as a Software Developer for ManSoft Inc. You create an assembly. You place the assembly in a specific folder.

Which of the following classes can you use to determine whether the assembly was located in a specific folder? Each correct answer represents a complete solution. Choose two.

33. You work as a Web Application Developer for SunInfo Inc. The company uses Visual Studio 2008 as its application development platform. You create a Web application using .NET Framework 3.5. You want to ensure that when an unhandled exception occurs on the site, a custom error page errorpage.aspx is displayed. Also, you want to ensure that when the HTTP 500 error occurs, the servererror.aspx page is displayed.

Which of the following settings will you add inside the system.web section of the Web.config file to accomplish the task?

34. John works as a Software Developer for InfoTech Inc. He develops an application named SerializeObj. He creates a custom class and wants to serialize its object. He also wants the object to be stored into an XML file named File1.xml.

He writes the following code:

public class Employees

{

public string EmpID;

public string EmpName;

public decimal Salary;

}

Which of the following code statements will John add in the application?

35. Which of the following techniques is used to transmit passwords during authentication?

36. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished development of Web services using the .NET Framework. The access control to Web services is part of your accountability. You are currently revealing an existing class as a XML Web service. You are required to ensure that the XML Web service is exclusively accessible to Web service clients within the ABC Inc. domain. To fulfill this requirement you want to change the access modifiers on methods that must be represented as Web methods.

What will you do to accomplish this task?

37. Georgina works as a Software Developer for BlueChip Inc. She develops an application named App1 using Visual Studio .NET. The company wants her to deploy App1 to a customer's laptop. Georgina creates an assembly named Assembly1 to be stored in the Global Assembly Cache so that the Common Language Runtime (CLR) can locate and bind Assembly1.

As the application executes, the CLR locates the path of Assembly1 through the codebase setting. But, it finds no <codebase> element in the app.config file, and fails to bind Assembly1. Now, the CLR tries to locate Assembly1 through probing.

Which of the following will the CLR check to locate Assembly1? Each correct answer represents a part of the solution. Choose all that apply.

38. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You create an ASP.NET Web application using the .NET Framework 3.5. You want to use a HTTP module called on each and every request made by the application. It is called as part of the ASP.NET request pipeline. It has right to access life-cycle events throughout the request. You also want to ensure that the HTTP module allows a user to inspect incoming and outgoing requests and take appropriate action based on the request.

What will be the correct order to create the HTTP module?

39. You work as a Web Administrator for BlueWell Inc. The company's sales employees access the Web server from remote locations via the Internet using Netscape Navigator or Internet Explorer. You want to secure the Web server. To secure the Web server, you want to use cookieless forms authentication.

Which of the following properties will you use to accomplish the task?

40. Which of the following security methods is used when the code requires a specific set of permissions, which are not known until runtime?

41. You work as a Software Developer for ABC Inc. You develop a multi-threaded application named MyMultThreadApp using Visual Studio .NET. The application logs all warning and informational messages in an event log that keeps track of significant events when the application is running. The event log records information that might be useful for troubleshooting or performance analysis.

Which of the following are the considerations that you must keep in mind when logging events with multithreaded components? Each correct answer represents a complete solution. Choose three.

42. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating an application using the .NET Framework.

You write the following code snippet to call a method from the Win32 API by using PInvoke:

int rst = MessageBox(hWd, Mytext, Mycaption, Mytype);

You are required define a method prototype.

Which of the following code segments will you use to accomplish this task?

43. John works as a Web developer for HiTech Inc. He develops an application named MyApp by using Visual C# .NET. John uses a SQL Server database.

He writes the following code:

OleDbCommand cmd = new OleDbCommand();

cmd.CommandText = "UPDATE Employees SET Rank = 'Senior' WHERE Basic > 10000";

cmd.ExecuteNonQuery();

Now he wants to improve the performance of the program code.

Which of the following actions will he perform to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

44. You work as a Software Developer for Webtech Inc. You plan to migrate the existing Active Server Pages (ASP) pages to ASP.NET Web pages in order to implement rich functionalities of a Web browser in your Web pages. Therefore, you want to add controls to Web pages of your existing application named WebApp1.

Which of the following controls will be most suitable to implement?

45. Which of the following session and instancing modes will you set if you require a sessionfull binding and want to create a new instance object for each client request?

46. You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create an ASP.NET Web application using the .NET Framework. The application is installed in a Network Load Balancing cluster. You are evaluating a bug statement. When a failure takes place in the Web application, the client occasionally gets an error page as anticipated. At other times, the client gets an exception stack with the error message, which is not anticipated. You are required to find out the configuration setting that causes the unanticipated error.

Which of the following configuration settings causes the unanticipated error?

47. In which of the following objects are session variables stored?

48. Bill works as a Software Developer for SunInfo Inc. He develops an application named SunApplication using C# .NET. The employees of the company use SunApplication for viewing and editing inventory data. SunApplication receives data from a file named MyFile.xml, which currently does not provide any information. Bill decides to write code to get information from the MyFile.xml file.

Which of the following code segments will he use to resolve the issue? Each correct answer represents a complete solution. Choose all that apply.

49. You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer.

What will you call the computer that implemented cryptography?

50. Tony works as a Software Developer for TechNet Inc. He creates a satellite assembly named

SatAssembly1. He wants to install SatAssembly1 in the global assembly cache. Therefore, he compiles the assembly by using the Al.exe tool and signs SatAssembly1.

Which of the following possible tools will Tony use to sign SatAssembly1? Each correct answer represents a complete solution. Choose two.

51. What is the main purpose of a try-catch block?

52. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a Web service using .NET Framework 2.0. You want the Web service to utilize a two step process to map XML

generated by Web methods to .NET objects.

What will you do to accomplish the task? Each correct answer represents a part of the solution. Choose two.

53. Which of the following data structures is used for storing reference data types?

54. ECMAScript is supported in many applications and is commonly known as __________.

55. David works as a Software Developer for GenTech Inc. He creates an XML Web service, named MyWebService, using Visual Studio .NET. MyWebService uses Microsoft Windows authentication. Users of MyWebService are in the GenTech domain.

David wants to configure MyWebService to use the following URL-based authorization rules:

l Anonymous users must not be allowed to access MyWebService.

l All the users except User1 and User2 must be allowed to access MyWebService.

David configures Internet Information Services (IIS) to meet these requirements.

Which of the following code will David use to configure the authorization section of the Web.config file for MyWebService?

56. Which of the following provide simplified access to ASP.NET AJAX login, roles, and profile services from Windows Forms and WPF applications?

57. You work as a Software Developer for InfoTech Inc. You create a Windows form in a Windows-based application named MyWinApp1. You use graphics in the form.

You write the following code in your form:

private void MyMouseEvent1(object sender1, MouseEventArgs event)

{

// Code to handle mouse events

}

You want to implement a property of the MouseEventArgs object. This property will return a Point structure that contains the x-coordinate and y-coordinate of the mouse.

Which of the following properties of the MouseEventArgs object will you use to accomplish this?

58. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a class library using the .NET Framework. The library will be used to open the NSCs of computers. Later, you will set up the class library to the GAC and provide it Full Trust permission.

You write down the following code segments for the socket connections:

SocketPermission permission = new SocketPermission(PermissionState.Unrestricted);

permission.Assert();

A number of the applications that use the class library may not have the necessary permissions to open the network socket connections. Therefore, you are required to withdraw the assertion.

Which of the following code segments will you use to accomplish the task?

59. Which of the following classes will you use to specify that a string must be centered when drawn?

60. All of the following are benefits for query expressions allowed by Language-integrated query except for which one?

61. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. The application will be used by school children to read a sequential chain of characters.

What will you do to accomplish this task?

62. Which of the following is required to be implemented by marshal-by-value objects to implement custom serialization rules?

63. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5.

The application rarely experiences errors that cannot be reproduced on a test environment.

You are required to ensure that the application meets the following requirements:

l All unanticipated errors are logged.

l Logging is configured with a least amount of alteration to the application code.

What will you do?

64. You can use LINQ in an ASP.NET application through the LinqDataSource control, the __________ control, or by creating LINQ queries.

65. Allen works as a Software Developer for ManSoft Inc. He develops an application using Visual Studio .NET 2005. Only the employees of the company use the application. Allen wants to ensure that when a request on a page is made by a user the application asks for his authentication.

Which of the following actions will Allen take to accomplish the task? Each correct answer represents a part of the solution. Choose two.

66. Sam works as a Software Developer for GenTech Inc. He creates an ASP.NET page, named Page1, for a college Web site. Page1 is used to enroll new applicants to a certification course offered by the college. In order to get admission to the course, an applicant's age must be between eighteen and twenty-five. The page contains several TextBox controls that are used by applicants to feed their personal details. The data entered by each applicant is then used to check the eligibility of the applicant.

One of the TextBox controls on the page is named txtDateofBirth. Sam wants to verify that the applicants meet the age requirement. He wants to perform validation both on the server-side and on the client-side. In order to validate the age, he adds a CustomValidator control, named CValidator, to the page and sets its ControlToValidate property to txtDateofBirth.

Which of the following will Sam use to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

67. Which of the following utilities is used to encrypt credentials and session state connection strings?

68. You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Web application using .NET Framework 2.0. You add a Web Form that contains a button named bCancel. The button allows users to exit the form. When users click the button, validation should not occur. However, during testing you find that clicking the button does not allow users to exit the form. You need to ensure that users can always exit the page.

What will you do?

69. You work as a Software Developer for ManSoft Inc. You use C# .NET to create an assembly named TestAssembly that will be used by other applications, including a standard COM client application. You must deploy the assembly on the COM application to a client computer. You must ensure that the COM applications can instantiate components within the assembly as COM components.

Which of the following options will you use to accomplish this task?

70. John works as a Software Developer for Blue Well Inc. He wants to create a class named

Class1 and implements the generic IComparable interface.

He writes the following code:

public class Class1 : System.IComparable<Class1>

{

}

However, John needs to compare one object of Class1 with another object.

Which of the following code statement will John include in his application?

71. Allen works as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. Allen creates an application that will be used to handle security information related to the company. He wants to secure the application by using the most secure authentication method. The method should have a strong key for encryption and send the encrypted password across the network.

Which of the following authentication methods will Allen use to accomplish the task?

72. Which of the following is a restriction operator in LINQ?

73. Which of the following options is not a primary objective of the WS-Security 1.1 specification?

74. Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework. He wants to encrypt all his e-mails that he sends to anyone.

Which of the following will he use to accomplish the task?

75. Andrew works as a Software Developer for Mansoft Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to enhance the security of the Web site by implementing Secure Sockets Layer (SSL).

Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two.

76. Which class allows checks against the active principal using the language constructs defined for the declarative and imperative security actions?

77. Which of the following APIs is used to collect information about any running state and any errors that occur within an ASP.NET application?

78. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a class library using the .NET Framework. The library will be used to open the NSCs of computers. Later, you will set up the class library to the GAC and provide it Full Trust permission.

You write down the following code segments for the socket connections:

SocketPermission permission = new SocketPermission(PermissionState.Unrestricted);

permission.Assert();

A number of the applications that use the class library may not have the necessary permissions to open the network socket connections. Therefore, you are required to withdraw the assertion.

Which of the following code segments will you use to accomplish the task?

79. You work as a Software Developer for Hi-Tech Inc. You develop an application using Visual Studio .NET 2005. You create an unregistered COM DLL file named Com1.dll. You want to use this Com1.dll file in your application code. However, Com1.dll needs to be registered in the Windows Registry before it is used by the application.

Which of the following tools will you use to accomplish the task?

80. Allen works as a Software Developer for ABC Inc. He creates an application using Visual Studio .NET 2005. He wants to ensure that the application must manage state effectively. State is how data is moved and persisted throughout the layers of the application. There are number of factors to validate state management.

Which of the following factors will he consider to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

81. Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework. He wants to encrypt all his e-mails that he sends to anyone.

Which of the following will he use to accomplish the task?

82. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You have recently finished the development of an ASP.NET Web application using .NET Framework 3.5. The application must be deployed by using the http://www.ABC.com/ URL. The application has several Web forms.

You need to implement Really Simple Syndication (RSS) feeds functionality. The RSS feeds will be used by the http://www.ABC.com/Updates.rss URL. You must ensure that the application displays the RSS-formatted information when accessing the given URL.

What will you do to accomplish this? Each correct answer represents a part of the solution. Choose two.

83. You work as a Software Developer for ManSoft Inc. You use Microsoft Visual Studio to create a Web service named MyWebService. You create a SOAP message that is not secure in the Web service. You want to use the SendSecurityFilter class in the Web service to handle the transmission and securing of SOAP messages.

Which of the following code segments will you use to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

84. Which of the following is a reference type in Visual C#?

85. You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer.

What will you call the computer that implemented cryptography?

86. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating a custom control library using .NET Framework 3.5. Developers will use this custom control on Web pages in multiple applications. Each and every ASP.NET application will be configured by using different state management approaches. You have to ensure consistent state management for all instances of the custom control.

Which of the following states will you use to accomplish this task?

87. The <customErrors> element does not apply to errors that occur in __________.

88. Which of the following is not a method of controlling traffic through a firewall?

89. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. The application uses serialization to allow users to take an instance of an object and convert it into a format that can be easily transmittable over the network or even stored in a database. You want to provide the base functionality for the common language runtime serialization formatters.

Which of the following classes will you use to accomplish the task?

90. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an ASP.NET Web application using .NET Framework 3.5. The application will be used to share any type of photos on Internet. All the photos should be accessible in various sizes and formats. You need to add a download feature that can be easily maintained. You also need to make sure that only a single version of all photos is stored on a SQL server database.

What will you do?

91. In .NET Framework 3.5, you can create and access values that persist from one application session to another.

What are these values called?

92. Which of the following modes can be used to configure the Remote Debugging Monitor for remote debugging?

93. Peter works as a Software Developer for NessCom Inc. He creates a Web application named WebApp using Visual Studio .NET. WebApp contains an .aspx page named DataValidatePage.aspx, which has several Web server controls. Two TextBox controls, txtProdID and txtProdName, are used. The txtProdID control is used to enter the identification number of the products used by the company. The txtProdName control is used to enter valid product names. Peter wants to ensure that only valid data is entered in these two TextBox controls. Therefore, he implements a RequiredFieldValidator class in the DataValidatePage.aspx page. Choose the appropriate actions Peter will perform to accomplish the task.

94. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You have recently finished development of an ASP.NET Web application using the .NET Framework 3.5. You host the application on a Web farm that consists of three Web servers.

You should configure the ASP.NET application for session state to meet the following requirements:

l Session state data should not be lost if a server fails.

l Session state must be maintained across browser requests by the same user.

You are required to configure the Web.config file to meet these requirements.

Which of the following configurations will you use?

95. You work as a Software Developer for ABC Inc. You develop an application using Visual Studio .NET 2005. You want to print the contents of a document named MyFile1.doc located on the local computer. Therefore, you use the printing controls in the application.

Which of the following events will you use in the application code to accomplish the task?

96. Maria works as a Software Developer for BlueWell Inc. She develops an application, named App1, using Visual C# .NET. The application displays employee details from a SQL Server database. Maria wants to use a string array , named MyArray, in the application code to store employee names.

Which of the following statements will she use to declare MyArray?

97. John works as a Software Developer for CyberTech Inc. He creates an ASP .NET page named BookItemList.aspx, which displays a price list of computer books. Registered users have to first log on to the company's Web site in order to view the current price list of different computer books available on the Web site. Users want to maintain the page requests as long as they are accessing the Web page.

John wants to ensure that whenever the Web page BookItemList.aspx is posted back to the server, the price list should not be changed on the registered user's computer. He also wants to validate the page sent back to the server.

Which of the following actions will John take to accomplish the task? Each correct answer represents a part of the solution. Choose two.

98. Mark works as a Software Developer for GenTech Inc. He develops an application, named App1, using Visual Studio .NET. The application contains a Form control, named Form1, which enables users to edit information in a SQL Server database. Mark wants to save all the changes made by users in the database. He defines a boolean variable, named DataIsSaved, in the application code. DataIsSaved indicates whether or not all data are saved in the database. Mark wants to prevent Form1 from closing until all the changes are saved in the database.

Which of the following code will he use to accomplish this?

99. John works as a Web Developer for ABC Inc. He develops an ASP.NET application, named MyApp1, using Visual Studio .NET. The application will be used in the Sales department to generate monthly reports. John wants to deploy the application on the company's intranet. The company uses Microsoft Windows authentication. John wants to deny access to all the members of the Guest1 role.

Which of the following attributes will he use in the < authorization > element of the application's Web.config file to accomplish the task?

100. You work as an Enterprise Application Developer for SunInfo Inc. The company uses Visual Studio 2008 as its application development platform. You create a Windows Forms

application using .NET Framework 3.5. You want to notify the users when a print job has finished.

Which of the following events will you use to accomplish the task?


 

GIAC Critical Controls Certification (GCCC) GCCC Dumps
GIAC Advanced Smartphone Forensics GASF Dumps Questions Online

Add a Comment

Your email address will not be published. Required fields are marked *