Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSSP-NET-CSHARP Practice Exam with Questions & Answers | Set: 4

Questions 31

Perry works as a Web Developer for BlueWell Inc. He creates a catalog application named MyCatalog for a server using Visual Studio .NET. MyCatalog contains data that describes the pricing values of design catalogs. He wants to ensure that only authenticated users are authorized to access the data. He also wants the data to be secured at the highest level of authentication. Which of the following authentication levels will Perry use to accomplish this?

Options:
A.

Packet Privacy

B.

Packet Integrity

C.

Packet

D.

Call

GIAC GSSP-NET-CSHARP Premium Access
Questions 32

Which of the following code snippets is an example of tight encapsulation?

Options:
A.

private int x;

public void fun(){x=5;}

B.

private int x;

private void fun(){x=5;}

C.

public int x;

public void fun() {x=5;}

D.

protected int x;

protected void fun(){x=5;}

E.

int x;

public void fun(){x=5;}

Questions 33

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Windows application using .NET Framework 2.0. The application provides accessibility features. The forms in the application display a background image. You want to remove the image whenever a user selects Use High Contrast in the Accessibility Options in Control Panel. You are required to add an event to handle this accessibility setting change. Which of the following events will you use to accomplish this task?

Options:
A.

UserPreferenceChanged

B.

StyleChanged

C.

ChangeUICues

D.

DisplaySettingsChanged

Questions 34

You work as a Software Developer for Mansoft Inc. You create an ASP.NET Web application named MyWebApp. You implement a security protocol to transmit secured data between a client and a server. You try to authenticate the client computer. However, you are unable to do so, and the AuthenticationException exception is thrown. Which of the following classes will you use to accomplish this task?

Each correct answer represents a complete solution. Choose two.

Options:
A.

NegotiateStream

B.

SslStream

C.

Stream

D.

AuthenticatedStream

Questions 35

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. You are using regular expression in the application to validate email, phone number, etc. You are required to match any single character except "\n". Which of the following wildcard characters will you use to accomplish the task?

Options:
A.

x/y

B.

+

C.

?

D.

.

Questions 36

John works as a Web Developer for ABC Inc. He develops an ASP.NET application, named MyApp1, using Visual Studio .NET. The application will be used in the Sales department to generate monthly reports. John wants to deploy the application on the company's intranet. The company uses Microsoft Windows authentication. John wants to deny access to all the members of the Guest1 role. Which of the following attributes will he use in the <authorization> element of the application's Web.config file to accomplish the task?

Options:
A.

B.

C.

D.

Questions 37

Which of the following is required to be implemented by marshal-by-value objects to implement custom serialization rules?

Options:
A.

ISerializable

B.

SerializableAttribute

C.

ISerializableAttribute

D.

ISerialize

Questions 38

Sam works as a Software Developer for GenTech Inc. He develops an application named App1 using Visual Basic .NET. App1 uses a non-COM DLL named Value1.dll, which contains unmanaged code. Sam writes a method named Method1 in Value1.dll as follows:

Method1 Lib "Value1.dll"(ByVal InputVar As String, ByRef WordsVar As String, ByRef

NumbersVar As Integer) As Integer

Sam wants to use Method1 for parsing a string into an array of string values and an array of integers. Sam wants to enable App1 to call this function. Which of the following statements about the method are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

The value of the first parameter cannot be changed by a procedure or a function.

B.

The second parameter will contain all string values found in the first parameter.

C.

The third parameter will contain all integer values found in the second parameter.

D.

The third parameter will contain all string values found in the second parameter.

Questions 39

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You are creating an ASP.NET Web application using the .NET Framework 3.5. The application stores sensitive profile data in a MS SQL Server 2008 database. You are required to make sure that the profile data never stored in clear text. What will you do?

Options:
A.

Create a strongly typed custom ProfileProvider class. In the ProfileProvider class, encrypt the provided information before storing it in the database.

B.

Use the ASP.NET IIS Registration Tool to encrypt the connection string to connect to the SQL Server database.

C.

Create a custom profile provider. In the custom provider, encrypt the provided information before storing it in the database.

D.

Enable the SSL encryption for the SQL Server connections.

Questions 40

Which of the following is the best encryption algorithm to encrypt and decrypt messages?

Options:
A.

AES

B.

TripleDES

C.

DES

D.

RSA

GIAC Related Exams

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.