Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GSSP-.NET - GIAC GIAC Secure Software Programmer - C#.NET

Page: 8 / 15
Total 491 questions

You work as a Software Developer for Hi-Tech Inc. You develop an application using Visual Studio .NET 2005. You create an unregistered COM DLL file named Com1.dll. You want to use this Com1.dll file in your application code. However, Com1.dll needs to be registered in the Windows Registry before it is used by the application. Which of the following tools will you use to accomplish the task?

A.

Wsdl.exe

B.

Regsvr32.exe

C.

Tlbimp.exe

D.

Disco.exe

You work as a Software Developer for ABC Inc. You develop a .NET application form for

registered users. You want to ensure that the form is able to validate data and provide feedback to a user whenever an invalid data is entered by him. According to you, which of the following user feedback mechanisms will be most appropriate?

A.

ErrorProvider component

B.

Tool tip

C.

Status bar

D.

Color scheme

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You create an ASP.NET Web application using the .NET Framework 3.5. The application uses Session objects. You are changing the application to run on a Web farm. You want to make sure that the application can access the Session objects from all the servers in the Web farm. You also make sure that when any server in the Web farm restarts or stops responding, the Session objects are not lost. What will you do?

A.

Use InProc Session Management mode to store session data in the ASP.NET worker process

B.

Use StateServer Session Management mode to store session data in a common State Server process on a Web server in the Web farm

C.

Use SQLServer Session Management mode to store session data in an individual database for each Web server in the Web farm

D.

Use SQLServer Session Management mode to store session data in a common Microsoft SQL Server 2005 database

You are working on an ASP.NET application that will handle shopping cart for online users. You wish to generate images of all your company's products dynamically on one of the application's Web pages. You need to modify your configuration settings file for this purpose. Which of the following sections of the configuration file will you use to accomplish the task?

A.

B.

C.

D.

John works as a Web Developer for Bitsoft Inc. He creates an ASP.NET application, named MyApp1, by using Visual Studio .Net for a University Web site. Students will use MyApp1 to view their term end result. MyApp1 contains an ASP.NET page named, named Page1. Page1 contains a TextBox control, named txtEnrolmentNo, and two Button controls, named btnSubmit and btnCancel respectively.

John wants that if a user tries to submit the page by clicking the Submit button without entering his enrolment the word "Required" appears next to txtEnrolmentNo. However, when a user clicks the Cancel button he is redirected to a new page, named PageCancel.aspx. To accomplish this he adds a RequiredFieldValidator control to the page and sets its ControlToValidate and ErrorMessage properties to txtEnrolmentNo and "Required" respectively. However, when he executes the application he finds that the validation check is also performed on clicking the Cancel button. What is the most likely cause of the issue?

A.

The CauseValidation property of btnSubmit is not set to True.

B.

The CauseValidation property of btnCancel is not set to True.

C.

The CauseValidation property of btnSubmit is not set to False.

D.

The CauseValidation property of btnCancel is not set to False.

Which of the following techniques is used to transmit passwords during authentication?

A.

Asymmetric encryption

B.

Hashing

C.

Salted Hash

D.

Symmetric encryption

Allen works as a Software Developer for ABC Inc. He creates an application using Visual Studio .NET 2005. He wants to ensure that the application must manage state effectively. State is how data is moved and persisted throughout the layers of the application. There are number of factors to validate state management. Which of the following factors will he consider to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

A.

State persistence

B.

Saving state

C.

Caching

D.

Shared state

E.

View state

Patrick works as a Software Developer for GenTech Inc. He develops an application, named App1, using Visual C# .NET. He implements security using the security classes of the .NET Framework. He defines the following statements in the application:

PrincipalPermission Principal_Perm1 = new PrincipalPermission("Nick", "General

Manager");

PrincipalPermission Principal_Perm2 = new PrincipalPermission("Jack", "Accountant");

Patrick wants to check whether all demands that succeed for Principal_Perm1 also succeed for Principal_Perm2. Which of the following methods of the PrincipalPermission class will he use to accomplish this?

A.

Intersect

B.

IsSubSetOf

C.

IsUnrestricted

D.

Union

You work as a Software Developer for InfoTech Inc. You create a Windows form in a Windows-based application named MyWinApp1. You use graphics in the form. You write the following code in your form:

private void MyMouseEvent1(object sender1, MouseEventArgs event)

{

// Code to handle mouse events

}

You want to implement a property of the MouseEventArgs object. This property will return a Point structure that contains the x-coordinate and y-coordinate of the mouse. Which of the following properties of the MouseEventArgs object will you use to accomplish this?

A.

Y

B.

Delta

C.

Location

D.

Button

E.

Clicks

F.

X

ECMAScript is supported in many applications and is commonly known as __________.

A.

VBScript

B.

AJAX

C.

JavaScript

D.

Script