New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GSSP-NET-CSHARP - GIAC GIAC Secure Software Programmer - C#.NET

Page: 8 / 15
Total 491 questions

Andrew works as a Software Developer for Mansoft Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to enhance the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?

Each correct answer represents a complete solution. Choose two.

A.

Symmetric

B.

Secret

C.

IPSec

D.

Asymmetric

Allen works as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. Allen creates an application that will be used to handle security information related to the company. He wants to secure the application by using the most secure authentication method. The method should have a strong key for encryption and send the encrypted password across the network. Which of the following authentication methods will Allen use to accomplish the task?

A.

Integrated Windows authentication

B.

Basic authentication

C.

Certificate-based authentication

D.

Digest authentication

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5.

The application rarely experiences errors that cannot be reproduced on a test environment. You are required to ensure that the application meets the following requirements:

l All unanticipated errors are logged.

l Logging is configured with a least amount of alteration to the application code.

What will you do?

A.

Override the base class for all forms in the application to add the Try/Catch blocks to all the major functionalities.

B.

Enable the element in the Web.config file and set the mode attribute to On .

C.

Enable the element in the Web.config file and set the mode attribute to

RemoteOnly.

D.

Add an event handler for the Application.Error event to the Global.asax file of the applicatio n.

All of the following are benefits for query expressions allowed by Language-integrated query except for which one?

A.

Rich metadata

B.

Compile-time syntax checking

C.

Static typing and IntelliSense

D.

Imperative code

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an ASP.NET Web application using .NET Framework 3.5. You need to implement a system to monitor Service Level Agreement (SLA) compliance in the application. You are required to make a method to enable precise calculation of the time taken by all requests to process. What will you do to accomplish this?

A.

Implement a Timer component in the application. Calculate the elapsed time between the Start and Stop methods.

B.

Implement a base Web form for all the Web forms in the application. Calculate the elapsed time between the Load and Unload events.

C.

Create and register a custom HttpHandler.

D.

Create and register a custom HttpModule.

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. The application uses the health monitoring events to raise application audit events in the following situations:

l When users login

l When users modify their password

l When users perform other security-related actions

You must ensure that the application logs all audit events for all applications on the Web server.

What will you do?

A.

Configure the eventMappings Element in the Web.config file to allow an entry for success a udits.

B.

Configure the eventMappings Element in the Web.config file to allow a single entry for auditing events that is present for all audits.

C.

Configure the eventMappings Element in the Machine.config file to allow an entry for success audits.

D.

Configure the eventMappings Element in the Machine.config file to allow a single entry for auditing events that is present for all audits.

Allen works as a Software Developer for Mansoft Inc. He develops an application using Visual Studio .NET 2005. The application connects to a SQL Server database using a SqlConnection object named NewConnection. Allen creates a few stored procedures in the database. Sometimes an error occurs, when a user executes stored procedures. Allen wants to add an error-handling code to the application to handle errors that occur on executing stored procedures. Which of the following code segments will he use to accomplish this task?

A.

try

{

NewConnection.Open();

}

catch(DBConcurrencyException exep)

{

//Error-handling code

}

B.

try

{

NewConnection.Open();

}

catch(SqlException exep)

{

//Error-handling code

}

C.

try

{

NewConnection.Open();

}

catch(DataException exep)

{

//Error-handling code

}

D.

try

{

NewConnection.Open();

}

catch(InvalidCastException exep)

{

//Error-handling code

}

You work as a Software Developer for ManSoft Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You are creating a global application that will be used by all the branches of the company. You want to perform the encoding of Unicode characters with error detection capability. Which of the following classes will you use to accomplish the task?

Each correct answer represents a complete solution. Choose three.

A.

UTF8Encoding

B.

UnicodeEncoding

C.

UTF7Encoding

D.

UTF32Encoding

E.

ASCIIEncoding

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows Forms application using .NET Framework 3.5. The application needs a thread that accepts an integer parameter. You write the following code segment in the application:

Thread myThread = new Thread(new ParameterizedThreadStart(doWork));

myThread.Start(125);

You are required to declare the signature of the doWork method. Which of the following method signatures will you use?

A.

public void doWork(int nCount)

B.

public void doWork(Object oCount)

C.

public void doWork()

D.

public void doWork(Delegate oCount)

Sam works as a Software Developer for BlueWell Inc. He creates a .NET Remoting object named MyObj using Visual Studio .NET. He wants to configure MyObj to send and receive confidential information from an XML file stored in an encrypted hard drive. What will he do to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

A.

Implement a declarative security check.

B.

Implement an imperative security check.

C.

Use the SecurityAction.Demand value for the SecurityAction flag.

D.

Use the SecurityAction.RequestMinimum value for the SecurityAction flag.