Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GSSP-.NET - GIAC GIAC Secure Software Programmer - C#.NET

Page: 10 / 15
Total 491 questions

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You are creating an ASP.NET Web application using the .NET Framework 3.5. The application stores sensitive profile data in a MS SQL Server 2008 database. You are required to make sure that the profile data never stored in clear text. What will you do?

A.

Create a strongly typed custom ProfileProvider class. In the ProfileProvider class, encrypt the provided information before storing it in the database.

B.

Use the ASP.NET IIS Registration Tool to encrypt the connection string to connect to the SQL Server database.

C.

Create a custom profile provider. In the custom provider, encrypt the provided information before storing it in the database.

D.

Enable the SSL encryption for the SQL Server connections.

Bill works as a Software Developer for SunInfo Inc. He develops an application named SunApplication using C# .NET. The employees of the company use SunApplication for viewing and editing inventory data. SunApplication receives data from a file named MyFile.xml, which currently does not provide any information. Bill decides to write code to get information from the MyFile.xml file. Which of the following code segments will he use to resolve the issue?

Each correct answer represents a complete solution. Choose all that apply.

A.

FileInfo FI = new FileInfo(@"c:\temp\MyFile.xml");

Console.WriteLine("Filename " + FI.FullName );

Console.WriteLine(" Created at " + FI.CreationTime );

Console.WriteLine(" Accessed at " + FI.LastAccessTime );

B.

FileInfo FI = new FileInfo ("@c:\program files\temp\MyFile.xml");

Console.WriteLine ("Filename " + FI.FullName );

Console.WriteLine(" Created at " + FI.CreationTime );

Console.WriteLine(" Accessed at " + FI.LastAccessTime );

C.

FileInfo FI = new FileInfo("MyFile.xml");

Console.WriteLine("Filename " + FI.FullName );

Console.WriteLine(" Created at " + FI.CreationTime );

Console.WriteLine(" Accessed at " + FI.LastAccessTime );

D.

string str=@"c:\windows\MyFile.xml";

FileInfo FI = new FileInfo (str);

FI.Open (FileMode.Open, FileAccess.Read);

Console.WriteLine("Filename " + FI.FullName );

Console.WriteLine(" Created at " + FI.CreationTime );

Console.WriteLine(" Accessed at " + FI.LastAccessTime );

John works as a Web Developer for ProLabs Inc. He develops an ASP.NET application, named

MyWebApp1, using Visual Studio .NET. One of the pages in the application is named as Page1.aspx, which does not need to maintain session state. To improve the performance of the application, John wants to disable session state for Page1. Which of the following actions will he take to accomplish the task?

A.

Set the EnableViewState attribute in the @ Page directive to false.

B.

Set the DisableSessionState attribute in the @ Page directive to true.

C.

In the sessionState configuration section of the application's Web.config file, set the mode attribute to off.

D.

Set the EnableSessionState attribute in the @ Page directive to false.

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an ASP.NET Web application using .NET Framework 3.5. The application will be deployed on an intranet server of the company. You require that the application meets the following requirements:

l Users can log on to the application by using their Active Directory credentials.

l Each Web page in the application must display user name and password controls for an unauthenticated user.

What will you do to accomplish this?

A.

Use Forms authentication and use the SqlMembershipProvider class.

B.

Use Forms authentication and use the ActiveDirectoryMembershipProvider class.

C.

Use Windows authentication and enable impersonation.

D.

Use Windows authentication and disable impersonation.

Which of the following can be used as an alternative of S/MIME standard?

A.

MIME

B.

SMTP

C.

MIME/PGP

D.

NNTP

In which of the following objects are session variables stored?

A.

SessionStateStoreData

B.

SessionStateModule

C.

SessionStateItemCollection

D.

SessionStateStoreProviderBase

You work as a Software Developer for ManSoft Inc. You use C# .NET to create an assembly named TestAssembly that will be used by other applications, including a standard COM client application. You must deploy the assembly on the COM application to a client computer. You must ensure that the COM applications can instantiate components within the assembly as COM components. Which of the following options will you use to accomplish this task?

A.

Generate a registry file for the assembly by using the Assembly Registration Tool (Regasm.exe) and register the file on the client computer.

B.

Deploy the assembly to the global assembly cache on the client computer.

Add a reference to the assembly in the COM client application.

C.

Create a strong name of the assembly by using the Strong Name tool(Sn.exe).

D.

Generate a type library for the assembly by using the Type Library Importer (Tlbimp.exe) and register the file on the client computer.

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished development of Web services using the .NET Framework. The access control to Web services is part of your accountability. You are currently revealing an existing class as a XML Web service. You are required to ensure that the XML Web service is exclusively accessible to Web service clients within the ABC Inc. domain. To fulfill this requirement you want to change the access modifiers on methods that must be represented as Web methods. What will you do to accomplish this task?

A.

Use the Public access modifier for each Web method.

B.

Use the Private access modifier for each Web method.

C.

Use the Internal or Friend access modifier for each Web method.

D.

Use the Protected access modifier for each Web method.

Which of the following is required to be implemented by marshal-by-value objects to implement custom serialization rules?

A.

ISerializable

B.

SerializableAttribute

C.

ISerializableAttribute

D.

ISerialize

In .NET Framework 3.5, you can create and access values that persist from one application session to another. What are these values called?

A.

Objects

B.

Settings

C.

Properties

D.

Attributes