Pass the GIAC GIAC Certification GSSP-.NET Questions and answers with CertsForce

Viewing page 8 out of 14 pages
Viewing questions 71-80 out of questions
Questions # 71:

Which of the following techniques is used to transmit passwords during authentication?

Options:

A.

Asymmetric encryption


B.

Hashing


C.

Salted Hash


D.

Symmetric encryption


Questions # 72:

Which of the following data structures is used for storing reference data types?

Options:

A.

Stack


B.

Queue


C.

Hard disk


D.

Heap


Questions # 73:

Allen works as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. Allen creates an application that will be used to handle security information related to the company. He wants to secure the application by using the most secure authentication method. The method should have a strong key for encryption and send the encrypted password across the network. Which of the following authentication methods will Allen use to accomplish the task?

Options:

A.

Integrated Windows authentication


B.

Basic authentication


C.

Certificate-based authentication


D.

Digest authentication


Questions # 74:

Sam works as a Software Developer for GenTech Inc. He develops an application named App1 using Visual Basic .NET. App1 uses a non-COM DLL named Value1.dll, which contains unmanaged code. Sam writes a method named Method1 in Value1.dll as follows:

Method1 Lib "Value1.dll"(ByVal InputVar As String, ByRef WordsVar As String, ByRef

NumbersVar As Integer) As Integer

Sam wants to use Method1 for parsing a string into an array of string values and an array of integers. Sam wants to enable App1 to call this function. Which of the following statements about the method are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The value of the first parameter cannot be changed by a procedure or a function.


B.

The second parameter will contain all string values found in the first parameter.


C.

The third parameter will contain all integer values found in the second parameter.


D.

The third parameter will contain all string values found in the second parameter.


Questions # 75:

Which of the following classes will you use to specify that a string must be centered when drawn?

Options:

A.

StringAlignment


B.

StingFormat


C.

String


D.

LineAlignment


Questions # 76:

You work as a Software Developer for ABC Inc. You develop an application using Visual Studio .NET 2005. You want to print the contents of a document named MyFile1.doc located on the local computer. Therefore, you use the printing controls in the application. Which of the following events will you use in the application code to accomplish the task?

Options:

A.

EndPrint


B.

QueryPageSettings


C.

PrintPage


D.

BeginPrint


Questions # 77:

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a class library using the .NET Framework. The library will be used to open the NSCs of computers. Later, you will set up the class library to the GAC and provide it Full Trust permission. You write down the following code segments for the socket connections:

SocketPermission permission = new SocketPermission(PermissionState.Unrestricted);

permission.Assert();

A number of the applications that use the class library may not have the necessary permissions to open the network socket connections. Therefore, you are required to withdraw the assertion. Which of the following code segments will you use to accomplish the task?

Options:

A.

permission.PermitOnly();


B.

CodeAccessPermission.RevertDeny();


C.

permission.Deny();


D.

CodeAccessPermission.RevertAssert();


E.

permission.Demand();


Questions # 78:

George works as a Software Developer for GenTech Inc. He creates an application named App1 using Visual Studio .NET. App1 uses the version 2.0.0.0 of an assembly named Assembly1. However, he wants App1 to use a new version i.e. 2.1.0.0 of Assembly1. Therefore, he needs to specify Assembly1's location so that App1 can use version 2.1.0.0 of Assembly1. What will George use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

An unmanaged code.


B.

A managed code.


C.

The element.


D.

The element.


Questions # 79:

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. You are not using an exception handling framework in the application. However, the application must automatically log all unhandled exceptions to an event log. You are required to configure the Web.config file accordingly. Which of the following configurations will you use to accomplish the task?

Options:

A.


B.


C.


D.


Questions # 80:

Session variables can be any valid __________.

Options:

A.

.NET Framework type


B.

Integer type


C.

SessionStateItemCollection object


D.

Object type


Viewing page 8 out of 14 pages
Viewing questions 71-80 out of questions