PdfPrep.com

2021 GIAC GSSP-.NET Free Practice Test

These GSSP-.NET prep questions claim 100% success guarantee to its users. The GSSP-.NET exam questions contain the extraordinary quality material that is comprised of GSSP-.NET exam questions and answers those can be asked in real GSSP-.NET exam. The GIAC GSSP-.NET questions contain the exam material and content gathered by HP professional experts.

Page 1 of 20

Loading... Loading...
1. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. You are using the StringBuilder class to string values. You want to create a StringBuilder object that can store 75 characters and should be initialized with "ABC". You also want to append a formatted string to the end of the StringBuilder object.

Which of the following code segments will you use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

Loading... Loading...
2. John works as a Web Developer for TechCom Inc. He creates an ASP.NET application, named MyApp1, using Visual Studio .NET. Only registered users of the company will be able to use the application. The application contains a page, named NewAccount.aspx that allows new users to register themselves to the registered user list of the company. The NewAccount page contains several TextBox controls that accept users' personal details such as username, password, confirm password, first name, last name, home address, zip code, phone number, etc. One of the TextBox controls on the page is named txtZipCode in which a user enters a Zip code. John wants to ensure that when a user submits the NewAccount page, txtZipCode must contain five numeric digits. He wants least development effort.

Which of the following validation controls will he use to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

Loading... Loading...
3. Allen works as a Software Developer for ManSoft Inc. He develops an application using Visual Studio .NET 2005. Only the employees of the company use the application. Allen wants to ensure that when a request on a page is made by a user the application asks for his authentication.

Which of the following actions will Allen take to accomplish the task? Each correct answer represents a part of the solution. Choose two.

Loading... Loading...
4. Julia works as a Software Developer for Mansoft Inc. She develops an application using Visual Studio .NET. The application uses a method named MyMethod, which is located in an unmanaged DLL. Julia wants MyMethod to require the application to allocate unmanaged memory, fill the data, and pass the memory address to the application. She also wants to ensure that on returning from MyMethod, the application de-allocates the unmanaged memory.

What will Julia do to accomplish the task?

Loading... Loading...
5. You work as a Software Developer for ABC Inc. You develop an application using Visual Studio .NET 2005. You want to print the contents of a document named MyFile1.doc located on the local computer. Therefore, you use the printing controls in the application.

Which of the following events will you use in the application code to accomplish the task?

Loading... Loading...
6. You work as an Application Developer for ABC Inc. You are assigned with developing a Web site that will handle information related to monthly sales of the company. You wish to secure the Web site so that only employees of the Accounts department can view the Web pages. You need to create roles for the employees of this department. The user account information will be stored in a SQL Server database named Database. You decide to do all this by using the Web Site Administration Tool.

Which of the following types of security will you use to accomplish the task?

Loading... Loading...
7. Sam works as a Software Developer for GenTech Inc. He develops an ASP.NET application, named App1, using Visual Studio .NET. App1 is used within the company's intranet. Employees use Internet Explorer on the intranet. Sam creates a page named Page1.aspx. Sam wants the page to be redirected to the home page if an error occurs.

Which of the following attributes of the @ Page directive will he use to accomplish the task?

Loading... Loading...
8. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You create an application named StringRW

using .NET Framework. You store some characters into an array of Unicode characters. You need to write all or some of these characters into a String object.

Which of the following code segments will you choose to accomplish this task? Each correct answer represents a complete solution. Choose all that apply.

Loading... Loading...
9. You work as an Enterprise Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Windows client application that communicates with a business layer component using the .NET Framework.

The business layer component includes a class named MyUtility as follows:

public class MyUtility

{

public MyUtility() { }

public void ChangeData() { }

}

The application must fulfill the following criteriA.

l Create instances of the MyUtility class only within the business component.

l The application should invoke the functions within the MyUtility class.

You evaluate the code of the MyUtility class and decide it requires modification.

Which of the following modifications for the code will you recommend?

Loading... Loading...
10. Charles works as a Web Developer for TechNet Inc. He develops an application named AdAgentsApp for advertising agents by using Visual Studio .NET. AdAgentsApp uses several Web services provided by the company. The employees in the IT department use only the existing port numbers 80 (HTTP protocol) and 443 (HTTPS protocol) for firewall security. However, they are forbidden to open any other new ports. These ports have been used to ensure the highest security level of authentication.

Which of the following actions should Charles take to maintain the highest security? Each correct answer represents a part of the solution. Choose two.

Page 2 of 20

Loading... Loading...
11. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5.

The application uses the health monitoring events to raise application audit events in the following situations:

l When users login

l When users modify their password

l When users perform other security-related actions

You must ensure that the application logs all audit events for all applications on the Web server.

What will you do?

Loading... Loading...
12. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are creating a .NET remoting application using .NET Framework 2.0.

The object of the application will be shared by multiple applications. You want to use simple, modular, extensible, and XML-based protocol to exchange messages between remoting applications.

What will you do to accomplish the task?

Loading... Loading...
13. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. You are using regular expression in the application to validate email, phone number, etc. You are required to match the preceding character or sub expression zero or more times.

Which of the following wildcard characters will you use to accomplish the task?

Loading... Loading...
14. Sophia works as a Software Developer for BlueWell Inc. She creates a component, named MyComp, using Visual Studio .NET. MyComp includes a method named MyMethod1, which is used to process user requests. MyMethod1 calls a private method, named MyMethod2. Sophia wants to ensure that if an error occurs during the execution, the exceptions encountered by MyMethod2 are caught and passed on to MyMethod1 for exception handling.

Which of the following combinations of the exception handler should she use to accomplish the task?

Loading... Loading...
15. Allen works as a Software Developer for Mansoft Inc. He creates an ASP.NET Web application named MyApplication. He wants to use the Health Monitor to monitor MyApplication to record details about events rather than just the values of specific data counters.

Which of the following health monitoring child elements will he use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

Loading... Loading...
16. Andrew works as a Software Developer for BlueWell Inc. He develops a Windows-based application, named App1, using Visual Studio .NET. The application uses Microsoft SQL Server as a backend database. Andrew wants to perform security checks on App1.

Which of the following statements regarding security checks are true? Each correct answer represents a complete solution. Choose two.

Loading... Loading...
17. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET

2008 as its application development platform. You create an ASP.NET Web application using the .NET Framework 3.5. The application contains two HTML pages named Error.htm and

PageNotFound.htm. You want to make sure that the following requirements are met:

l When any user requests a page that does not exist, the PageNotFound.htm page is displayed.

l When any other error occurs, the Error.htm page is displayed.

Which of the following code segments will you add to the Web.config file to accomplish this task?

Loading... Loading...
18. Maria works as a Software Developer for BlueWell Inc. She develops an application named App1 using Visual Studio .NET 2005. App1 contains several pages. Maria wants to use components that provide services and resources. She also wants to release the resources explicitly by the components.

Which of the following methods will she use to accomplish this task?

Loading... Loading...
19. Sam works as a Software Developer for SamTech Inc. He develops a Windows-based application, named App1, using Visual Studio .NET. He wants to set a security policy for the application. To accomplish the task he uses the PolicyLevel class. He wants to set the current policy level to the default state.

Which of the following methods will he use to accomplish the task?

Loading... Loading...
20. You work as a Web Application Developer for SunInfo Inc. The company uses Visual Studio 2008 as its application development platform. You create a Web application using .NET Framework 3.5.

You want to ensure that the data input by a user falls within a predetermined range.

Which of the following validation controls will you use to accomplish the task?

Page 3 of 20

Loading... Loading...
21. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. You create an application using .NET Framework. The application is using an assembly. You want to ensure that the application provides the best performance. Security is not a consideration.

Which of the following permission sets will you use to accomplish the task?

Loading... Loading...
22. Henry works as a Software Developer for InfoTech Inc. He develops a Web application for registered employees of the company. The application requires accessing several XML data stored in a database named Database1. However, Henry wants to ensure that the XML data is validated before being accessed.

Which of the following classes will Henry use to validate the XML data?

Loading... Loading...
23. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. You have recently finished development of an application using .NET Framework. The application used two threads named threadOne and threadTwo. You are required to modify the code of the application to prevent the execution of threadOne until threadTwo completes execution.

What will you do to accomplish this task?

Loading... Loading...
24. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating an application using the .NET Framework. The application contains a class named globalInfo. You need to serialize all public and nonpublic data of the globalInfo class to ensure that the class generates the minimum byte stream so that the minimum load is placed upon network resources.

What will you do?

Loading... Loading...
25. You work as a Web Application Developer for SunInfo Inc. The company uses Visual Studio 2008 as its application development platform. You create a Windows Forms application using .NET Framework 3.5. You add a button control to a form named form1. You want to retrieve more information about the mouse event. You use the MouseClick event in your application.

Which of the following parameters will you pass to the event handler of the MouseClick event?

Loading... Loading...
26. Emily works as a Programmer in an Eye Research Center. The center keeps several records such as case history records for old patients and newly admitted patients, and records for outdoor patients. The Head of the Research Center wants Emily to generate reports for each outdoor patient with minimum network traffic. Emily develops an application named OutdoorPatientReport by using Visual Studio .NET. She needs to utilize the data repository as maintained by the center.

She wants to ensure that the application is displayed to all the doctors.

Which of the following actions will Emily take to accomplish this task?

Loading... Loading...
27. You work as a Software Developer for InfoTech Inc. You create a Windows form in a Windows-based application named MyWinApp1. You use graphics in the form.

You write the following code in your form:

private void MyMouseEvent1(object sender1, MouseEventArgs event)

{

// Code to handle mouse events

}

You want to implement a property of the MouseEventArgs object. This property will return a Point structure that contains the x-coordinate and y-coordinate of the mouse.

Which of the following properties of the MouseEventArgs object will you use to accomplish this?

Loading... Loading...
28. Mark works as a Software Developer for McRobert Inc. He develops an ASP.NET application using Visual Studio .NET. The application loads department name and employee data only once in each user's session. Mark creates two DataTable objects, named Employees and Departments. The

Departments object remains static, but the Employees object is modified whenever new employees join the company.

Mark wants to minimize the time it takes for the application to reload an ASP.NET page after each change.

Which of the following statements will he use to accomplish this?

Loading... Loading...
29. You work as a Software Developer for ABC Inc. The company has several branches worldwide.

The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer.

What will you call the computer that implemented cryptography?

Loading... Loading...
30. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0.

The application is used to exchange structured and type information on the Web using Soap. You want to use the BinaryFormatter and SoapFormatter classes to support RPCs and serialization of a graph of objects.

Which of the following interfaces will the BinaryFormatter and SoapFormatter classes implement to accomplish the task? Each correct answer represents a part of the solution. Choose two.

Page 4 of 20

Loading... Loading...
31. Martha works as a Software Developer for HiTech Inc. She develops a Web application named

SalesApp that contains a Web page named MyWebForm1.aspx. The Web page contains validation controls for the Web server controls on the page. Martha wants the custom validation error message to display if the validation fails to call the validation control on the Web page.

Which of the following actions will Martha take to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

Loading... Loading...
32. You work as a Software Developer for ManSoft Inc. You create an application using Visual Studio .NET 2005. You are using the Custom authentication provider in the application. In order to enable the Custom authentication provider, you have to make an entry in the Web.config file for the application.

Which of the following entries will you use to accomplish the task?

Loading... Loading...
33. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. The application uses Forms authentication. Your company uses Active Directory.

You need to modify the application to enable users to make use of their existing Active Directory account to access the application through the Internet. You are required to ensure that the application must be modified with the least amount of user interface changes, cost, and development effort.

What will you do to accomplish this?

Loading... Loading...
34. You work as a Software Developer for ManSoft Inc. You use Microsoft Visual Studio to create a Web service named MyWebService. You create a SOAP message that is not

secure in the Web service. You want to use the ReceiveSecurityFilter class in the Web service to handle the receiving and securing of SOAP messages.

Which of the following code segments will you use to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

Loading... Loading...
35. 0. You want to use a remote object whose lifetime is controlled by a server and the remote object is created for each client request.

Which of the following objects will you use to accomplish the task?

Loading... Loading...
36. You work as a Web Application Developer for SunInfo Inc. The company uses Visual Studio 2008 as its application development platform. You create a Web application using .NET Framework 3.5.

You want to attach the Visual Studio Debugger to Internet Explorer when the application is running.

Which of the following steps will you take to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

Loading... Loading...
37. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. You create a Web form in the application that permits users to provide personal information. You add a DropDownList control to the Web form to retrieve the residential status of users. The default item that the DropDownList control displays is the "Select Country" option. You have to ensure that users select a country other than the default option.

Which of the following validation controls should you use to accomplish this task?

Loading... Loading...
38. You work as a Software Developer for ManSoft Inc. You create an application using Visual Studio .NET 2005.

You write the following code snippet in the application:

int amt = 50;

String s = "John gave me " + amt + " dollars";

Console.WriteLine(s);

What will be the output of the above code?

Loading... Loading...
39. Rick works as a Software Developer for GenTech Inc. He develops an application named App1 by using C# .NET. App1 uses a Microsoft SQL Server database named Database1. Database1 contains a table named Table1. Table1 stores data entered through App1. Rick wants App1 to notify every fifteen minutes about the new data entered. He wants to develop another application named App2, which reads Table1 every fifteen minutes and sends new data to the concerned department of the company.

App2 will run on a computer that is used by several users who continuously log on and log off from the network to perform miscellaneous tasks.

Which of the following .NET application types will Rick use to accomplish the task?

Loading... Loading...
40. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You create an application named MyApplication. MyApplication uses the System.IO namespace. You want to ensure that you are able to use a class that specifies read and write operations either in synchronous or asynchronous manner.

Which of the following classes will you use to accomplish the task?

Page 5 of 20

Loading... Loading...
41. Dennis works as a Software Developer for BlueWell Inc. He develops an application, named App1, using Visual C# .NET. App1 contains a class, named Class1, which is stored in a namespace, named BlueWell.Namespace1. Dennis wants to create another class, named Class2, and use Class1 from Class2. For this, he wants to define an alias, named Alias1, and use it in Class2.

Which of the following statements will Dennis use to define Alias1?

Loading... Loading...
42. You work as a Software Developer for ManSoft Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You are creating a global application that will be used by all the branches of the company. You want to perform the encoding of Unicode characters with error detection capability.

Which of the following classes will you use to accomplish the task? Each correct answer represents a complete solution. Choose three.

Loading... Loading...
43. John works as a Web Developer for TechCom Inc. He creates an ASP.NET application, named MyApp1, by using Visual Studio .NET for a University Web site. Students will use MyApp1 to view their term end results. MyApp1 contains an ASP.NET page, named Page1. Page1 contains a TextBox control, named txtEnrolmentNo, and two Button controls, named btnSubmit and btnCancel.

John wants to display the text "Enter Enrolment Number" within txtEnrolmentNo. He wants to ensure that if a user tries to submit the page without entering an enrolment number, the

word "Error" appears next to txtEnrolmentNo.

Which of the following actions will he take to accomplish the task? Each correct answer represents a part of the solution. Choose two.

Loading... Loading...
44. You work as a Software Developer for ABC Inc. You are defining a component for an application. In some deployments, the component will be deployed on the same computer as the application. In other deployments the component will be deployed on a separate computer. The component has implicit dependencies and needs to access and use server-side resources that cannot cross system boundaries.

You must ensure that your component design supports both deployment scenarios.

What will you do to accomplish the task?

Loading... Loading...
45. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET

2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. The application is a library application that catalogs Classes and books. The application contains a DataContext object named Classes and a related line of business object named Books. The Classes DataContext object is queried by using the following LINQ query: var query = from class in Classes where class.Books.All(b => b.Price <= 50) select class;

You have to find out the result that will be returned from the query.

What will be the result of the query?

Loading... Loading...
46. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You have recently finished development of a Windows application using .NET Framework. Users report that the application is not running properly.

When the users try to complete a particular action, the following error message comes out:

Unable to find assembly 'myservices, Version=1.0.0.0, Culture=neutral,

PublicKeyToken=29b5ad26c9de9b95'.

You notice that the error occurs as soon as the application tries to call functionality in a serviced component that was registered by using the following commanD.

regsvcs.exe myservices.dll

You must make sure that the application can call the functionality in the serviced component with no exceptions being thrown.

What will you do to accomplish this task?

Loading... Loading...
47. Which of the following is used, if a reference to an object is required to be made when it is passed from one application to another?

Loading... Loading...
48. Allen works as a Software Developer for ABC Inc. He develops an application using Visual Studio .NET 2005. The application will be used for the registration of employees by filling a form provided in the application.

The form contains the following fields:

l First Name

l Last Name

l Date of Birth

l E-mail

He provides a TextBox control for each field. He wants an employee to be able to receive a user-defined error message when he makes a wrong entry.

Which of the following properties is mandatory if a CustomValidator control is used to validate an entry?

Loading... Loading...
49. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. You create an application using .NET Framework. You need to establish a Secure Sockets Layer (SSL) session with a remote server. The security policy of the company requires that both the client and server to provide a valid certificate for authentication before communications begins.

Which of the following properties of the SslStream class will you use to accomplish this task?

Loading... Loading...
50. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. The application stores sensitive profile data in a SQL Server 2008 database. You are required to make sure that no profile data is stored in clear text.

What will you do to accomplish the task?

Page 6 of 20

Loading... Loading...
51. You work as an Enterprise Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET application using .NET Framework 3.5. You have already created a data contract for a WCF service and the ASP.NET Web application, which consumes the WCF service. The application has the following requirements:

l On low network bandwidth the serialized format of the data contract type should be minimum.

l The application uses AJAX to retrieve the data from the WCF service.

l Use the least amount of development effort.

What will you do?

Loading... Loading...
52. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You have recently finished development of an ASP.NET Web application using .NET Framework 3.5. You deploy the application on a test server and enable the debugging. The application is hosted in IIS 6.0 and uses the default authentication. Integrated

Windows authentication is enabled and anonymous access is disabled. You have not got the administrative rights on the test server.

The following configuration is present in the Web.config filE.

<authentication mode="Windows"/>

<identity impersonate="false"/>

<customErrors mode="On"defaultRedirect="GenericError.aspx"/>

<authorization>

<deny users="?"/>

</authorization>

You are required to configure the Web.config file to debug the application from your development computer.

Which of the following configurations will you use in the Web.config file?

Loading... Loading...
53. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform.

You create the definition for a Car class by using the following code segment:

public class Car {

[XmlAttribute(AttributeName = "category")]

public string CarType;

public string model;

[XmlIgnore]

public int year;

[XmlElement(ElementName = "mileage")]

public int miles;

public ConditionType condition;

public Car() {

}

public enum ConditionType {

[XmlEnum("Poor")] BelowAverage,

[XmlEnum("Good")] Average,

[XmlEnum("Excellent")] AboveAverage

}}

You create an instance of the Car class. You fill the public fields of the Car class as shown in the table below:

You are required to recognize the XML block that is produced by the Car class after serialization.

Which of the following XML blocks represents the output of serializing the Car class?

Loading... Loading...
54. You work as a Software Developer for ABC Inc. The Company uses .NET Framework 2.0 as its application development platform. You are creating an application that will perform different types of comparison operations. Therefore, you decide to use only those methods that are available in all the classes of .NET Framework 2.0.

Which of the following methods will you use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

Loading... Loading...
55. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are developing an application that will manage rental properties for a property management agency. When a property is rented, a lease agreement is created. At that time a new lease is entered into the application, the starting date of the lease may not yet be known.

You need to write code that stores the lease start date entered by a user in a variable. The variable that stores the lease start date should contain no value, by default. If no lease start date is entered, the variable should have no value assigned to it.

Which code segment should you choose?

Loading... Loading...
56. Sam works as a Software Developer for BlueWell Inc. He creates a .NET Remoting object named MyObj using Visual Studio .NET. He wants to configure MyObj to send and receive confidential information from an XML file stored in an encrypted hard drive.

What will he do to accomplish the task? Each correct answer represents a part of the solution. Choose two.

Loading... Loading...
57. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are in process of creating an application using the .NET Framework 2.0.

The application must collect data from different streams by performing the following operations:

l Reading data from the byte stream

l Reading data from the memory stream

l Reading data from the file stream

Which of the following stream classes will you use to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

Loading... Loading...
58. Sandra works as a Software Developer for ABC Inc. She develops a Web site on a client computer. She creates a custom control named CustControl1 on a Web page named

MicrosoftCert1. She wants to retain the custom control property information during several round trips to a server. She wants to ensure that the control property is retained even if the view state of the Web page is disabled at the page level.

Which of the following client-based techniques for storing state management information will Sandra use to accomplish the task?

Loading... Loading...
59. Samantha works as a Software Developer for InfoWorld Inc. She develops a Web page named SalesReport.aspx for the employees of the company. However, she wants to ensure that all the requests for a particular employee are not stored on the server's memory. She also wants to ensure that no data is lost even after each user session has expired.

Which of the following actions will Samantha take to accomplish the task?

Loading... Loading...
60. You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows Forms application using .NET Framework 3.5. The application contains a data-bound control. The user interface (UI) for modifying data from a LinqDataSource control is typically provided through the data-bound control. You are required to perform automatic data modifications.

Which of the following conditions are required to enable automatic data modifications? Each correct answer represents a part of the solution. Choose all that apply.

Page 7 of 20

Loading... Loading...
61. You work as a Software Developer for Mansoft Inc. You create an application and use it to create users as members of the local Users group.

Which of the following code snippets imperatively demands that the current user is a member of the local Users group? Each correct answer represents a complete solution. Choose all that apply.

Loading... Loading...
62. Robert works as a Software Developer for InfoTech Inc. He develops an application named MyApp that uses SQL Server database and three database components. He wants to ensure that other developed applications cannot use these database components. Users should be authorized before they can access these components. Robert configures the database component assemblies to accomplish this task. Choose the correct actions that Robert should take after the configuration.

Loading... Loading...
63. You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application for the branch in China. You are also implementing encoding in the application for Chinese language.

Which of the following encoding types will you use to support Chinese language? Each correct answer represents a complete solution. Choose all that apply.

Loading... Loading...
64. You work as a Software Developer for ABC Inc. The Company uses .NET Framework as its application development platform. You are creating an application that will use multiple collections. Therefore, you decide to use only those collections that are available under both the System.Collections and System.Collections.Generic namespaces.

Which of the following collections will you use to accomplish the task? Each correct answer represents a complete solution. Choose three.

Loading... Loading...
65. Mark works as a Web Developer for ABC Inc. He develops an ASP.NET application, named MyApp1, using Visual Studio .NET. MyApp1 allows users to view and purchase company products.

It includes several pages. The start-up page of the application is Page1.aspx. He configures the application's Web.config file to use form-based authentication.

Mark wants users to log on to Page1.aspx by providing their user names and passwords. To accomplish this, he creates an ASP.NET page named UsersLogIn.aspx that allows each user to specify a user name and password. He then writes the following syntax in the Web.config filE.

<authentication mode="Forms">

<forms name="MyName"

loginUrl="/UsersLogIn.aspx"

protection="All"

timeout="60"

slidingExpiration="true">

</forms>

</authentication>

What will be the result? Each correct answer represents a part of the solution. Choose two.

Loading... Loading...
66. Peter works as a Software Developer for PaulTech Inc. He develops an application for office management, using Visual C# .NET. He creates an OleDbConnection object, named Pcon. He wants to create an OleDbCommand object to retrieve employee details.

Which of the following statements will Peter use to set the CommandText and Connection properties to accomplish the required task? Each correct answer represents a part of the solution. Choose three.

Loading... Loading...
67. Kathy works as a Software Developer for BlueWell Inc. She creates a serviced component named

Com1. She wants to ensure that all the employees of the company are able to use Com1. Therefore, she wants to install Com1 in the Global Assembly Cache (GAC). Before the installation, she wants to register the serviced component manually with COM+.

Which of the following tools will Kathy use to register Com1?

Loading... Loading...
68. Allen works as a Software Developer for Mansoft Inc. He develops a Web application using Visual Studio .NET. He adds a Web reference to an XML Web service named MyWebService in the application. MyWebService includes a method named MyMethod, which takes user identification number as a parameter and returns a DataSet object containing user information. The System.ArgumentException is thrown if the user identification number does not lie between 1 and 500. Allen writes a try and catch block to capture the exception thrown by the Web service.

Which of the following exceptions will the try and catch block catch if a user calls MyMethod passing 501 as a parameter?

Loading... Loading...
69. You work as a software developer for ManSoft Inc. The company uses Visual Studio .NET 2005 as its application development platform. You use C#. NET to create an assembly that will be consumed by other Visual Studio .NET applications. No Permissions should be granted to this assembly unless the assembly makes a minimum permission request. You need to write a code for the assembly that makes a minimum permission request.

Which of the following code segments will you use to accomplish this task?

Loading... Loading...
70. George works as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. George creates an application using the .NET Framework.

He writes the following code snippet in the application:

public class FirstClass

{

public static int test=500;

}

public class SecondClass : FirstClass

{

public static void Main(String[] args)

{

SecondClass mb=new SecondClass();

mb.MyMethod();

}

public void MyMethod()

{

//Appropriate statement

}

}

George wants to modify the value of the test variable in MyMethod to 1000.

Which of the following code segments will he place in MyMethod to accomplish this task? Each correct answer represents a complete solution. Choose all that apply.

Page 8 of 20

Loading... Loading...
71. Sam works as a Software Developer for SamTech Inc. He creates an XML Web service, named

WebService1, using Visual Studio .NET. WebService1 uses the .NET Framework security class libraries to implement security. It implements role-based authorization based on a SQL Server database containing user names. Sam adds the following statements to the Web service code. using System.Security.Principal; using System.Threading;

Sam wants to ensure that only validated users are permitted to access WebService1 by entering their user names and passwords in TextBox controls, named Text1 and Text2. He wants to implement imperative security check on WebService1. He also wants to ensure that users are assigned the Manager role and the Subordinate role by default.

Which of the following classes will Sam use to accomplish the task? Each correct answer represents a part of the solution. Choose two.

Loading... Loading...
72. Maria works as a Software Developer for MarcLync Inc. She creates an XML Web service, named MyWebService, using Visual Studio .NET. Maria wants to debug MyWebService. Therefore, she attaches a debugger to the Web service process. However, Maria notices that whenever MyWebService is executed, it throws an exception System.Net.WebException after a certain time period. The exception displays the message "The current operation has timed-out." Maria wants to modify the code in MyWebService.

Which of the following actions will Maria take in order to resolve this issue?

Loading... Loading...
73. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating a Windows service application using the .NET Framework. The service is used to execute several tasks that require background processing. You do not want to actively manage threads in the service application, but you must make sure that security checks are performed during the execution of the task.

What will you do to accomplish the task?

Loading... Loading...
74. Mark works as a Software Developer for BlueWell Inc. The company uses Visual Studio .NET as its application development platform. He develops four applications using the .NET Framework.. All the four applications use an assembly named MyAssembly. He deploys the applications on the company's intranet. Later, Mark modifies MyAssembly and wants to ensure that all applications use the latest version of MyAssembly.

What will he do to accomplish this?

Loading... Loading...
75. John works as a Web Developer for ProLabs Inc. He develops an ASP.NET application, named

MyWebApp1, using Visual Studio .NET. One of the pages in the application is named as Page1.aspx, which does not need to maintain session state. To improve the performance of the application, John wants to disable session state for Page1.

Which of the following actions will he take to accomplish the task?

Loading... Loading...
76. You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Web application using the .NET Framework.

The application uses a MS SQL server database. The application creates and manages online advertising campaigns. You need the Web application to track the effectiveness of the forthcoming campaigns by evaluating advertising results with operation parameters.

This necessitates adding a Web form that executes the following tasks:

l It uses a target URL for all online advertising.

l It logs the referrer URLs.

l It offers live reporting of referral data.

You are required to find out the most effective storage mechanism to log the referral data.

What will you do?

Loading... Loading...
77. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create an application using the .NET Framework. You create a class named Master that contains numerous child objects. The Master class contains a method named ProcessChild that executes actions on the child objects. The Master class objects will be serializable. You must ensure that the ProcessChild method is executed subsequent to the Master class object and all its child objects are reformed.

Which of the following actions will you take to accomplish the task? Each correct answer represents a part of the solution. Choose two.

Loading... Loading...
78. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You have recently finished development of an ASP.NET Web application using .NET Framework 3.5. The company's sales employees access the application, which is deployed on a Web server. You want to secure the Web server. To secure the Web server, you want to use cookieless forms authentication.

Which of the following properties will you use to accomplish the task?

Loading... Loading...
79. Maria works as a Software Developer for BlueWell Inc. She develops an application, named App1, using Visual C# .NET. App1 contains a Form control, named Form1, for collecting users' contact information. Form1 contains a TextBox control, named TextBox1. App1 requires users to enter data in TextBox1. Maria writes a method, named Method1, to validate the entered data. She adds an ErrorProvider control, named Control1, to Form1. Maria wants to ensure that App1 notifies the users if they enter invalid data in TextBox1.

Which of the following code will she use to accomplish this?

Loading... Loading...
80. You work as a Software Developer for InfoTech Inc. You develop an application named MyApp that works as a scientific calculator. A user inputs data and retrieves the calculated results based on the input values. The application uses a SQL database that contains two tables. One table contains data related to standard calculation specifications and the other table stores input values entered by the user. You want to ensure that the user is able to retrieve appropriate data fast.

Which of the following actions will you take to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

Page 9 of 20

Loading... Loading...
81. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an ASP.NET Web application using .NET Framework 3.5. You need to implement a system to monitor Service Level Agreement (SLA) compliance in the application. You are required to make a method to enable precise calculation of the time taken by all requests to process.

What will you do to accomplish this?

Loading... Loading...
82. You work as a Software Developer for Mansoft Inc. The company uses Visual Studio.NET 2005 as its application development platform. You need to write a code segment that can change the file extension of a file named Test.txt.

Which of the following code segments will you choose to change the file extension? Each correct answer represents a complete solution. Choose two.

Loading... Loading...
83. You work as a Software Developer for Mansoft Inc. The company uses Visual Studio.NET as its application development platform. You create an application, which will be used for e-commerce.

You want to ensure that the transactions are highly secured. For this purpose, you have to create a system to verify the identity of a potential customer.

Which of the following security techniques will you use to accomplish this task?

Loading... Loading...
84. You work as an Enterprise Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an Enterprise application using .NET Framework 3.5.

The application must meet the following requirements:

l The application loads XML from streams.

l The application creates XML from scratch by using functional construction.

l The application queries XML using XPath-like axes.

l The application validates XML trees using XSD.

What will you do to meet these requirements with least development efforts?

Loading... Loading...
85. Georgina works as a Software Developer for BlueChip Inc. She develops an application named App1 using Visual Studio .NET. The company wants her to deploy App1 to a customer's laptop. Georgina creates an assembly named Assembly1 to be stored in the Global Assembly Cache so that the Common Language Runtime (CLR) can locate and bind Assembly1.

As the application executes, the CLR locates the path of Assembly1 through the codebase setting. But, it finds no <codebase> element in the app.config file, and fails to bind Assembly1. Now, the CLR tries to locate Assembly1 through probing.

Which of the following will the CLR check to locate Assembly1? Each correct answer represents a part of the solution. Choose all that apply.

Loading... Loading...
86. Daniel works as a Software Developer for GenTech Inc. He develops an ASP.NET application, named

App1, using Visual Studio .NET. He creates an interface in App1, named Employees. The Employees interface contains declaration for a method, named Method1. Daniel creates another interface, named HeadOfDept. HeadOfDept inherits from the Employees interface and contains the declaration for a method, named Method2.

He then creates a class named Manager as follows:

public class Manager: HeadOfDept

Which of the following statements about the application are true? Each correct answer represents a complete solution. Choose all that apply.

Loading... Loading...
87. You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Windows application using the .NET Framework.

You create a database to maintain the record of the students. You create a table named Student. You want to retrieve names and roll number of those students whose age is less than ten years. An instance of the SqlCommand class named StudentCommand is already created.

Which of the following code segments should you use to execute the query?

Loading... Loading...
88. Mark works as a Software Developer for TechBook Inc. He develops an ASP.NET application, named MyApp1, using Visual Studio .NET. MyApp1 contains an ASP.NET page that is used to register new participants to a quiz contest, which is to be held recently in the city of New York. In order to take part in the quiz contest, an applicant must be between the age of fifteen and twenty-five. Mark adds a TextBox control, named txtDateOfBirth, to the page. He wants to ensure that each prospective participant enters his date of birth in txtDateOfBirth. He also wants to verify that prospective participants meet the age requirement. For this, Mark wants to use a custom client script function. He also wants to minimize the number of trips made to the server.

Which of the following actions will Mark perform to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

Loading... Loading...
89. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You have recently finished development of an ASP.NET Web application using the .NET Framework 3.5. You host the application on a Web farm that consists of three Web servers.

You should configure the ASP.NET application for session state to meet the following requirements:

l Session state data should not be lost if a server fails.

l Session state must be maintained across browser requests by the same user.

You are required to configure the Web.config file to meet these requirements.

Which of the following configurations will you use?

Loading... Loading...
90. You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows Forms application using .NET Framework 3.5. The application needs a thread that accepts an integer parameter.

You write the following code segment in the application:

Thread myThread = new Thread(new ParameterizedThreadStart(doWork));

myThread.Start(125);

You are required to declare the signature of the doWork method.

Which of the following method signatures will you use?

Page 10 of 20

Loading... Loading...
91. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You create an application for the company. You need to validate the phone number passed to a class as a parameter in the application.

Which of the following is the most effective way to verify that the format of the data matches a phone number?

Loading... Loading...
92. You work as a Software Developer for ABC Inc. You use Visual Studio .NET to develop a Windows application named MyWindowApp. You implement the security classes of the .NET Framework. When users interact with the application, the role-based validation should perform frequently. You must ensure that only validated Windows NT or Windows 2000 domain users are permitted to access the application. You add the appropriate Imports statements for the System.Security.Principal namespace and the System.Threading namespace.

Which of the following code segments will you use to accomplish this task?

Loading... Loading...
93. Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. Allen develops an application using .NET

Framework 3.5. The application connects to a SQL Server database using a SqlConnection object named Connection1. He creates some stored procedures in the database, which are used to update the data. Allen finds that sometimes, the update operation does not affect any row. He wants to add an error handling code to the application.

Which of the following code segments will he use to accomplish the task?

Loading... Loading...
94. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are developing an application using the .NET Framework 2.0.

You are required to use a datatype that will store only numbers ranging from -32,768 to 32,767.

Which of the following datatypes will you use to accomplish the task? Each correct answer represents a complete solution. Choose two.

Loading... Loading...
95. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a message queue named SecureQ using .NET Framework. The message queue requires each incoming message to be encrypted. You want to ensure that a message can be sent to SecureQ without an exception being thrown.

What will you do to accomplish this task?

Loading... Loading...
96. You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are developing an application for the customer support using the .NET Framework. The customer support application accepts phone numbers. While running a report, you notice that the phone numbers displayed do not pursue similar format. Furthermore, there are cases of missing digits and missing area codes.

You are required to ensure that the phone numbers are entered in the following format:

(###) ###- ####

You need to accomplish this task with the least amount of code.

What will you do?

Loading... Loading...
97. Allen works as a Software Developer for Mansoft Inc. He develops an application using Visual Studio .NET 2005. The application connects to a SQL Server database using a SqlConnection object named NewConnection. Allen creates a few stored procedures in the database. Sometimes an error occurs, when a user executes stored procedures. Allen wants to add an error-handling code to the application to handle errors that occur on executing stored procedures.

Which of the following code segments will he use to accomplish this task?

Loading... Loading...
98. You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows application using .NET Framework 3.5. The application uses a SQL Server 2008 database on the network.

You use ADO.NET Data Services that exposes data as resources that are addressable by URIs. You need to access and change data, specifically the standard HTTP verbs of GET, PUT, POST, and DELETE.

What will you do to accomplish this?

Loading... Loading...
99. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. You create a Web form in the application that permits users to provide personal information. You add a DropDownList control to the Web form to retrieve the residential status of users. The default item that the DropDownList control displays is the "Select Country" option. You have to ensure that users select a country other than the default option.

Which of the following validation controls should you use to accomplish this task?

Loading... Loading...
100. Sam works as a Software Developer for GenTech Inc. He develops an application named App1 using Visual Basic .NET. App1 uses a non-COM DLL named Value1.dll, which contains unmanaged code. Sam writes a method named Method1 in Value1.dll as follows:

Method1 Lib "Value1.dll"(ByVal InputVar As String, ByRef WordsVar As String, ByRef

NumbersVar As Integer) As Integer

Sam wants to use Method1 for parsing a string into an array of string values and an array of integers. Sam wants to enable App1 to call this function.

Which of the following statements about the method are true? Each correct answer represents a complete solution. Choose all that apply.

Page 11 of 20

Loading... Loading...
101. You work as a Software Developer for ManSoft Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You create an application that will be used by all the branches of the company. You use the Regex class in the application to validate some strings. You want to search an input string for an occurrence of a regular expression.

Which of the following methods of the Regex class will you use to accomplish the task?

Loading... Loading...
102. You work as a Web Application Developer for SunInfo Inc. The company uses Visual Studio 2008 as its application development platform. You create a Web application using .NET Framework 3.5. You want to attach the Visual Studio Debugger to Internet Explorer when the application is running.

Which of the following steps will you take to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

Loading... Loading...
103. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You have recently finished development of a Windows application using .NET Framework. Users report that the application is not running properly.

When the users try to complete a particular action, the following error message comes out:

Unable to find assembly 'myservices, Version=1.0.0.0, Culture=neutral,

PublicKeyToken=29b5ad26c9de9b95'.

You notice that the error occurs as soon as the application tries to call functionality in a serviced component that was registered by using the following command:

regsvcs.exe myservices.dll

You must make sure that the application can call the functionality in the serviced component with no exceptions being thrown.

What will you do to accomplish this task?

Loading... Loading...
104. Patrick works as a Software Developer for GenTech Inc. He develops an application, named App1, using Visual C# .NET. He implements security using the security classes of the .NET Framework. He defines the following statements in the application:

PrincipalPermission Principal_Perm1 = new PrincipalPermission("Nick", "General

Manager");

PrincipalPermission Principal_Perm2 = new PrincipalPermission("Jack", "Accountant");

Patrick wants to check whether all demands that succeed for Principal_Perm1 also succeed for Principal_Perm2.

Which of the following methods of the PrincipalPermission class will he use to accomplish this?

Loading... Loading...
105. ASP.NET version 2.0 health monitoring supports an __________.

Loading... Loading...
106. You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows Forms application using .NET Framework 3.5. The application contains a data-bound control. You use the LinqDataSource control to use LINQ in the ASP.NET application by setting properties in markup text. The LinqDataSource control uses LINQ to SQL to automatically generate the data commands. You are required to perform data operations by using the LinqDataSource control.

What is the correct order in which data operations are applied?

Loading... Loading...
107. You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating a Windows Forms application using .NET Framework 3.5. You need to develop a new control for the application. You must ensure that the control inherits the TreeView control by adding a custom node tag and a highlight color.

What will you do?

Loading... Loading...
108. You work as a Software Developer for ABC Inc. The company has several branches Worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an applications using .NET Framework 2.0. You want to allow users to view various details of a given unmanaged code.

What will you do to accomplish the task?

Loading... Loading...
109. Mark works as a Software Developer for Mansoft Inc. He develops an application using Visual

Studio .NET 2005.

He writes the following code snippet in the application:

public class MyClass

{

public static void Main(String[] args)

{

try

{

return;

}

finally

{

Console.WriteLine("Finally");

}

}

}

What will happen when Mark attempts to compile and execute the code snippet?

Loading... Loading...
110. Which of the following modifiers in C# will you use if you do NOT want a custom-build component to be a base class?

Page 12 of 20

Loading... Loading...
111. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You have recently finished development of a Windows application using .NET Framework. Users report that the application is not running properly. When the users try to complete a particular action, the following error message comes out:

Unable to find assembly 'myservices, Version=1.0.0.0, Culture=neutral, PublicKeyToken=29b5ad26c9de9b95'.

You notice that the error occurs as soon as the application tries to call functionality in a serviced component that was registered by using the following command:

regsvcs.exe myservices.dll

You must make sure that the application can call the functionality in the serviced component with no exceptions being thrown.

What will you do to accomplish this task?

Loading... Loading...
112. Smith works as a Software Developer for BlueWell Inc. He develops a Web application named WebApp by using Visual Studio .NET. He wants to deploy WebApp on a target computer. He wants to take precautionary measures in the application so that no issues may arise while deploying it.

Which of the following measures will Smith take to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

Loading... Loading...
113. Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework. He wants to encrypt all his e-mails that he sends to anyone.

Which of the following will he use to accomplish the task?

Loading... Loading...
114. You work as a software developer for ManSoft Inc. The company uses Visual Studio .NET 2005 as its application development platform. You use C#. NET to create an assembly that will be consumed by other Visual Studio .NET applications. No Permissions should be granted to this assembly unless the assembly makes a minimum permission request. You need to write a code for the assembly that makes a minimum permission request.

Which of the following code segments will you use to accomplish this task?

Loading... Loading...
115. You work as a Web Application Developer for SunInfo Inc. The company uses Visual Studio 2008 as its application development platform. You create a Web application using .NET Framework 3.5. You want to redirect users to a default error page if an unhandled error occurs within your site.

Which of the following actions will you perform to accomplish the task?

Loading... Loading...
116. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished development of an application using .NET Framework 2.0. The application has multiple threads that execute one after another. You want to modify the application and schedule the threads for execution based on their assigned priority.

What will you do to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

Loading... Loading...
117. David works as a Software Developer for McRobert Inc. He develops a Web application named App1 using Visual Studio .NET. App1 contains several Web forms that display information about an online shopping process. David wants to provide a Web-based shopping catalog to users. However, he wants to ensure that the information about the shopping catalog is secure and requires no server resources.

What will David do to accomplish the task?

Loading... Loading...
118. You work as a Software Developer for ABC Inc. You create a Console application to create multiple satellite assemblies.

Which of the following statements about satellite assemblies are true? Each correct answer represents a complete solution. Choose all that apply.

Loading... Loading...
119. You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio .NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. The application will be used by all the branches of the company. You are using the CompareInfo class for culture-sensitive string comparisons.

You write the following code in the application:

String s1 = "C rtify";

String s2 = "c rtify";

String s3 = "c rtify";

You need to compare the s1 string with the s2 string and ensure that the string comparison must ignore case.

Which of the following code segments will you use to accomplish the task?

Loading... Loading...
120. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You have recently finished development of a Windows application using .NET Framework. Users report that the application is not running properly. When the users try to complete a particular action, the following error message comes out:

Unable to find assembly 'myservices, Version=1.0.0.0, Culture=neutral,

PublicKeyToken=29b5ad26c9de9b95'.

You notice that the error occurs as soon as the application tries to call functionality in a serviced component that was registered by using the following command:

regsvcs.exe myservices.dll

You must make sure that the application can call the functionality in the serviced component with no exceptions being thrown.

What will you do to accomplish this task?

Page 13 of 20

Loading... Loading...
121. Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework. He wants to encrypt all his e-mails that he sends to anyone.

Which of the following will he use to accomplish the task?

Loading... Loading...
122. John works as a Software Developer for DawnStar Inc. He creates a class, named MyClass1. He wants to generate a key pair that he will use to give the compiled assembly a strong name.

Which of the following tools will he use to accomplish the task?

Loading... Loading...
123. You work as a Software Developer for HiTech Inc. You develop a Web application named

MyWebApp. The application contains several Web pages that display a registration form for a user. You want to perform user input data validation at the server-side, so that you can disable the client-side data input validation.

Which of the following actions will you take to accomplish the task?

Loading... Loading...
124. Which of the following is the best encryption algorithm to encrypt and decrypt messages?

Loading... Loading...
125. You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating a Windows Forms application using .NET Framework 3.5. You need to develop a new control for the application. You must ensure that the control inherits the TreeView control by adding a custom node tag and a highlight color.

What will you do?

Loading... Loading...
126. Which of the following is an exception of background threads as compared to foreground threads?

Loading... Loading...
127. You work as an Application Developer for ABC Inc. You are assigned with developing a Web site that will handle information related to monthly sales of the company. You wish to secure the Web site so that only employees of the Accounts department can view the Web pages. You need to create roles for the employees of this department. The user account information will be stored in a SQL Server database named Database. You decide to do all this by using the Web Site Administration Tool.

Which of the following types of security will you use to accomplish the task?

Loading... Loading...
128. Which of the following providers is a block cipher that encrypts and decrypts data in blocks of 8 bytes?

Loading... Loading...
129. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You create a Web service using the .NET Framework 2.0. You call a method in the Web service. The following exception is thrown in the Web service: client.System.Web.Services.Protocols.SoapException: Server was unable to process request. System.NullReferenceException: Object reference not set to an instance of an object. You find out that it is the following line of code that throws the exception: if (Session ["StoredValue"] == null)

You must ensure that the method runs without throwing any exception.

What will you do to accomplish this task?

Loading... Loading...
130. You work as a Software Developer for ManSoft Inc. You create an assembly. You place the assembly in a specific folder.

Which of the following classes can you use to determine whether the assembly was located in a specific folder? Each correct answer represents a complete solution. Choose two.

Page 14 of 20

Loading... Loading...
131. You work as a Web Application Developer for SunInfo Inc. The company uses Visual Studio 2008 as its application development platform. You create a Web application using .NET Framework 3.5. You want to ensure that when an unhandled exception occurs on the site, a custom error page errorpage.aspx is displayed. Also, you want to ensure that when the HTTP 500 error occurs, the servererror.aspx page is displayed.

Which of the following settings will you add inside the system.web section of the Web.config file to accomplish the task?

Loading... Loading...
132. John works as a Software Developer for InfoTech Inc. He develops an application named SerializeObj. He creates a custom class and wants to serialize its object. He also wants the object to be stored into an XML file named File1.xml.

He writes the following code:

public class Employees

{

public string EmpID;

public string EmpName;

public decimal Salary;

}

Which of the following code statements will John add in the application?

Loading... Loading...
133. Which of the following techniques is used to transmit passwords during authentication?

Loading... Loading...
134. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished development of Web services using the .NET Framework. The access control to Web services is part of your accountability. You are currently revealing an existing class as a XML Web service. You are required to ensure that the XML Web service is exclusively accessible to Web service clients within the ABC Inc. domain. To fulfill this requirement you want to change the access modifiers on methods that must be represented as Web methods.

What will you do to accomplish this task?

Loading... Loading...
135. Georgina works as a Software Developer for BlueChip Inc. She develops an application named App1 using Visual Studio .NET. The company wants her to deploy App1 to a customer's laptop. Georgina creates an assembly named Assembly1 to be stored in the Global Assembly Cache so that the Common Language Runtime (CLR) can locate and bind Assembly1.

As the application executes, the CLR locates the path of Assembly1 through the codebase setting. But, it finds no <codebase> element in the app.config file, and fails to bind Assembly1. Now, the CLR tries to locate Assembly1 through probing.

Which of the following will the CLR check to locate Assembly1? Each correct answer represents a part of the solution. Choose all that apply.

Loading... Loading...
136. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You create an ASP.NET Web application using the .NET Framework 3.5. You want to use a HTTP module called on each and every request made by the application. It is called as part of the ASP.NET request pipeline. It has right to access life-cycle events throughout the request. You also want to ensure that the HTTP module allows a user to inspect incoming and outgoing requests and take appropriate action based on the request.

What will be the correct order to create the HTTP module?

Loading... Loading...
137. You work as a Web Administrator for BlueWell Inc. The company's sales employees access the Web server from remote locations via the Internet using Netscape Navigator or Internet Explorer. You want to secure the Web server. To secure the Web server, you want to use cookieless forms authentication.

Which of the following properties will you use to accomplish the task?

Loading... Loading...
138. Which of the following security methods is used when the code requires a specific set of permissions, which are not known until runtime?

Loading... Loading...
139. You work as a Software Developer for ABC Inc. You develop a multi-threaded application named MyMultThreadApp using Visual Studio .NET. The application logs all warning and informational messages in an event log that keeps track of significant events when the application is running. The event log records information that might be useful for troubleshooting or performance analysis.

Which of the following are the considerations that you must keep in mind when logging events with multithreaded components? Each correct answer represents a complete solution. Choose three.

Loading... Loading...
140. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating an application using the .NET Framework.

You write the following code snippet to call a method from the Win32 API by using PInvoke:

int rst = MessageBox(hWd, Mytext, Mycaption, Mytype);

You are required define a method prototype.

Which of the following code segments will you use to accomplish this task?

Page 15 of 20

Loading... Loading...
141. John works as a Web developer for HiTech Inc. He develops an application named MyApp by using Visual C# .NET. John uses a SQL Server database.

He writes the following code:

OleDbCommand cmd = new OleDbCommand();

cmd.CommandText = "UPDATE Employees SET Rank = 'Senior' WHERE Basic > 10000";

cmd.ExecuteNonQuery();

Now he wants to improve the performance of the program code.

Which of the following actions will he perform to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.

Loading... Loading...
142. You work as a Software Developer for Webtech Inc. You plan to migrate the existing Active Server Pages (ASP) pages to ASP.NET Web pages in order to implement rich functionalities of a Web browser in your Web pages. Therefore, you want to add controls to Web pages of your existing application named WebApp1.

Which of the following controls will be most suitable to implement?

Loading... Loading...
143. Which of the following session and instancing modes will you set if you require a sessionfull binding and want to create a new instance object for each client request?

Loading... Loading...
144. You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create an ASP.NET Web application using the .NET Framework. The application is installed in a Network Load Balancing cluster. You are evaluating a bug statement. When a failure takes place in the Web application, the client occasionally gets an error page as anticipated. At other times, the client gets an exception stack with the error message, which is not anticipated. You are required to find out the configuration setting that causes the unanticipated error.

Which of the following configuration settings causes the unanticipated error?

Loading... Loading...
145. In which of the following objects are session variables stored?

Loading... Loading...
146. Bill works as a Software Developer for SunInfo Inc. He develops an application named SunApplication using C# .NET. The employees of the company use SunApplication for viewing and editing inventory data. SunApplication receives data from a file named MyFile.xml, which currently does not provide any information. Bill decides to write code to get information from the MyFile.xml file.

Which of the following code segments will he use to resolve the issue? Each correct answer represents a complete solution. Choose all that apply.

Loading... Loading...
147. You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer.

What will you call the computer that implemented cryptography?

Loading... Loading...
148. Tony works as a Software Developer for TechNet Inc. He creates a satellite assembly named

SatAssembly1. He wants to install SatAssembly1 in the global assembly cache. Therefore, he compiles the assembly by using the Al.exe tool and signs SatAssembly1.

Which of the following possible tools will Tony use to sign SatAssembly1? Each correct answer represents a complete solution. Choose two.

Loading... Loading...
149. What is the main purpose of a try-catch block?

Loading... Loading...
150. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a Web service using .NET Framework 2.0. You want the Web service to utilize a two step process to map XML

generated by Web methods to .NET objects.

What will you do to accomplish the task? Each correct answer represents a part of the solution. Choose two.

Page 16 of 20

Loading... Loading...
151. Which of the following data structures is used for storing reference data types?

Loading... Loading...
152. ECMAScript is supported in many applications and is commonly known as __________.

Loading... Loading...
153. David works as a Software Developer for GenTech Inc. He creates an XML Web service, named MyWebService, using Visual Studio .NET. MyWebService uses Microsoft Windows authentication. Users of MyWebService are in the GenTech domain.

David wants to configure MyWebService to use the following URL-based authorization rules:

l Anonymous users must not be allowed to access MyWebService.

l All the users except User1 and User2 must be allowed to access MyWebService.

David configures Internet Information Services (IIS) to meet these requirements.

Which of the following code will David use to configure the authorization section of the Web.config file for MyWebService?

Loading... Loading...
154. Which of the following provide simplified access to ASP.NET AJAX login, roles, and profile services from Windows Forms and WPF applications?

Loading... Loading...
155. You work as a Software Developer for InfoTech Inc. You create a Windows form in a Windows-based application named MyWinApp1. You use graphics in the form.

You write the following code in your form:

private void MyMouseEvent1(object sender1, MouseEventArgs event)

{

// Code to handle mouse events

}

You want to implement a property of the MouseEventArgs object. This property will return a Point structure that contains the x-coordinate and y-coordinate of the mouse.

Which of the following properties of the MouseEventArgs object will you use to accomplish this?

Loading... Loading...
156. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a class library using the .NET Framework. The library will be used to open the NSCs of computers. Later, you will set up the class library to the GAC and provide it Full Trust permission.

You write down the following code segments for the socket connections:

SocketPermission permission = new SocketPermission(PermissionState.Unrestricted);

permission.Assert();

A number of the applications that use the class library may not have the necessary permissions to open the network socket connections. Therefore, you are required to withdraw the assertion.

Which of the following code segments will you use to accomplish the task?

Loading... Loading...
157. Which of the following classes will you use to specify that a string must be centered when drawn?

Loading... Loading...
158. All of the following are benefits for query expressions allowed by Language-integrated query except for which one?

Loading... Loading...
159. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. The application will be used by school children to read a sequential chain of characters.

What will you do to accomplish this task?

Loading... Loading...
160. Which of the following is required to be implemented by marshal-by-value objects to implement custom serialization rules?

Page 17 of 20

Loading... Loading...
161. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5.

The application rarely experiences errors that cannot be reproduced on a test environment.

You are required to ensure that the application meets the following requirements:

l All unanticipated errors are logged.

l Logging is configured with a least amount of alteration to the application code.

What will you do?

Loading... Loading...
162. You can use LINQ in an ASP.NET application through the LinqDataSource control, the __________ control, or by creating LINQ queries.

Loading... Loading...
163. Allen works as a Software Developer for ManSoft Inc. He develops an application using Visual Studio .NET 2005. Only the employees of the company use the application. Allen wants to ensure that when a request on a page is made by a user the application asks for his authentication.

Which of the following actions will Allen take to accomplish the task? Each correct answer represents a part of the solution. Choose two.

Loading... Loading...
164. Sam works as a Software Developer for GenTech Inc. He creates an ASP.NET page, named Page1, for a college Web site. Page1 is used to enroll new applicants to a certification course offered by the college. In order to get admission to the course, an applicant's age must be between eighteen and twenty-five. The page contains several TextBox controls that are used by applicants to feed their personal details. The data entered by each applicant is then used to check the eligibility of the applicant.

One of the TextBox controls on the page is named txtDateofBirth. Sam wants to verify that the applicants meet the age requirement. He wants to perform validation both on the server-side and on the client-side. In order to validate the age, he adds a CustomValidator control, named CValidator, to the page and sets its ControlToValidate property to txtDateofBirth.

Which of the following will Sam use to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

Loading... Loading...
165. Which of the following utilities is used to encrypt credentials and session state connection strings?

Loading... Loading...
166. You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Web application using .NET Framework 2.0. You add a Web Form that contains a button named bCancel. The button allows users to exit the form. When users click the button, validation should not occur. However, during testing you find that clicking the button does not allow users to exit the form. You need to ensure that users can always exit the page.

What will you do?

Loading... Loading...
167. You work as a Software Developer for ManSoft Inc. You use C# .NET to create an assembly named TestAssembly that will be used by other applications, including a standard COM client application. You must deploy the assembly on the COM application to a client computer. You must ensure that the COM applications can instantiate components within the assembly as COM components.

Which of the following options will you use to accomplish this task?

Loading... Loading...
168. John works as a Software Developer for Blue Well Inc. He wants to create a class named

Class1 and implements the generic IComparable interface.

He writes the following code:

public class Class1 : System.IComparable<Class1>

{

}

However, John needs to compare one object of Class1 with another object.

Which of the following code statement will John include in his application?

Loading... Loading...
169. Allen works as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. Allen creates an application that will be used to handle security information related to the company. He wants to secure the application by using the most secure authentication method. The method should have a strong key for encryption and send the encrypted password across the network.

Which of the following authentication methods will Allen use to accomplish the task?

Loading... Loading...
170. Which of the following is a restriction operator in LINQ?

Page 18 of 20

Loading... Loading...
171. Which of the following options is not a primary objective of the WS-Security 1.1 specification?

Loading... Loading...
172. Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework. He wants to encrypt all his e-mails that he sends to anyone.

Which of the following will he use to accomplish the task?

Loading... Loading...
173. Andrew works as a Software Developer for Mansoft Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to enhance the security of the Web site by implementing Secure Sockets Layer (SSL).

Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two.

Loading... Loading...
174. Which class allows checks against the active principal using the language constructs defined for the declarative and imperative security actions?

Loading... Loading...
175. Which of the following APIs is used to collect information about any running state and any errors that occur within an ASP.NET application?

Loading... Loading...
176. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a class library using the .NET Framework. The library will be used to open the NSCs of computers. Later, you will set up the class library to the GAC and provide it Full Trust permission.

You write down the following code segments for the socket connections:

SocketPermission permission = new SocketPermission(PermissionState.Unrestricted);

permission.Assert();

A number of the applications that use the class library may not have the necessary permissions to open the network socket connections. Therefore, you are required to withdraw the assertion.

Which of the following code segments will you use to accomplish the task?

Loading... Loading...
177. You work as a Software Developer for Hi-Tech Inc. You develop an application using Visual Studio .NET 2005. You create an unregistered COM DLL file named Com1.dll. You want to use this Com1.dll file in your application code. However, Com1.dll needs to be registered in the Windows Registry before it is used by the application.

Which of the following tools will you use to accomplish the task?

Loading... Loading...
178. Allen works as a Software Developer for ABC Inc. He creates an application using Visual Studio .NET 2005. He wants to ensure that the application must manage state effectively. State is how data is moved and persisted throughout the layers of the application. There are number of factors to validate state management.

Which of the following factors will he consider to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

Loading... Loading...
179. Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework. He wants to encrypt all his e-mails that he sends to anyone.

Which of the following will he use to accomplish the task?

Loading... Loading...
180. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You have recently finished the development of an ASP.NET Web application using .NET Framework 3.5. The application must be deployed by using the http://www.ABC.com/ URL. The application has several Web forms.

You need to implement Really Simple Syndication (RSS) feeds functionality. The RSS feeds will be used by the http://www.ABC.com/Updates.rss URL. You must ensure that the application displays the RSS-formatted information when accessing the given URL.

What will you do to accomplish this? Each correct answer represents a part of the solution. Choose two.

Page 19 of 20

Loading... Loading...
181. You work as a Software Developer for ManSoft Inc. You use Microsoft Visual Studio to create a Web service named MyWebService. You create a SOAP message that is not secure in the Web service. You want to use the SendSecurityFilter class in the Web service to handle the transmission and securing of SOAP messages.

Which of the following code segments will you use to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

Loading... Loading...
182. Which of the following is a reference type in Visual C#?

Loading... Loading...
183. You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer.

What will you call the computer that implemented cryptography?

Loading... Loading...
184. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating a custom control library using .NET Framework 3.5. Developers will use this custom control on Web pages in multiple applications. Each and every ASP.NET application will be configured by using different state management approaches. You have to ensure consistent state management for all instances of the custom control.

Which of the following states will you use to accomplish this task?

Loading... Loading...
185. The <customErrors> element does not apply to errors that occur in __________.

Loading... Loading...
186. Which of the following is not a method of controlling traffic through a firewall?

Loading... Loading...
187. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. The application uses serialization to allow users to take an instance of an object and convert it into a format that can be easily transmittable over the network or even stored in a database. You want to provide the base functionality for the common language runtime serialization formatters.

Which of the following classes will you use to accomplish the task?

Loading... Loading...
188. You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an ASP.NET Web application using .NET Framework 3.5. The application will be used to share any type of photos on Internet. All the photos should be accessible in various sizes and formats. You need to add a download feature that can be easily maintained. You also need to make sure that only a single version of all photos is stored on a SQL server database.

What will you do?

Loading... Loading...
189. In .NET Framework 3.5, you can create and access values that persist from one application session to another.

What are these values called?

Loading... Loading...
190. Which of the following modes can be used to configure the Remote Debugging Monitor for remote debugging?

Page 20 of 20

Loading... Loading...
191. Peter works as a Software Developer for NessCom Inc. He creates a Web application named WebApp using Visual Studio .NET. WebApp contains an .aspx page named DataValidatePage.aspx, which has several Web server controls. Two TextBox controls, txtProdID and txtProdName, are used. The txtProdID control is used to enter the identification number of the products used by the company. The txtProdName control is used to enter valid product names. Peter wants to ensure that only valid data is entered in these two TextBox controls. Therefore, he implements a RequiredFieldValidator class in the DataValidatePage.aspx page. Choose the appropriate actions Peter will perform to accomplish the task.

Loading... Loading...
192. You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You have recently finished development of an ASP.NET Web application using the .NET Framework 3.5. You host the application on a Web farm that consists of three Web servers.

You should configure the ASP.NET application for session state to meet the following requirements:

l Session state data should not be lost if a server fails.

l Session state must be maintained across browser requests by the same user.

You are required to configure the Web.config file to meet these requirements.

Which of the following configurations will you use?

Loading... Loading...
193. You work as a Software Developer for ABC Inc. You develop an application using Visual Studio .NET 2005. You want to print the contents of a document named MyFile1.doc located on the local computer. Therefore, you use the printing controls in the application.

Which of the following events will you use in the application code to accomplish the task?

Loading... Loading...
194. Maria works as a Software Developer for BlueWell Inc. She develops an application, named App1, using Visual C# .NET. The application displays employee details from a SQL Server database. Maria wants to use a string array , named MyArray, in the application code to store employee names.

Which of the following statements will she use to declare MyArray?

Loading... Loading...
195. John works as a Software Developer for CyberTech Inc. He creates an ASP .NET page named BookItemList.aspx, which displays a price list of computer books. Registered users have to first log on to the company's Web site in order to view the current price list of different computer books available on the Web site. Users want to maintain the page requests as long as they are accessing the Web page.

John wants to ensure that whenever the Web page BookItemList.aspx is posted back to the server, the price list should not be changed on the registered user's computer. He also wants to validate the page sent back to the server.

Which of the following actions will John take to accomplish the task? Each correct answer represents a part of the solution. Choose two.

Loading... Loading...
196. Mark works as a Software Developer for GenTech Inc. He develops an application, named App1, using Visual Studio .NET. The application contains a Form control, named Form1, which enables users to edit information in a SQL Server database. Mark wants to save all the changes made by users in the database. He defines a boolean variable, named DataIsSaved, in the application code. DataIsSaved indicates whether or not all data are saved in the database. Mark wants to prevent Form1 from closing until all the changes are saved in the database.

Which of the following code will he use to accomplish this?

Loading... Loading...

 

Exit mobile version