Perry works as a Web Developer for BlueWell Inc. He creates a catalog application named MyCatalog for a server using Visual Studio .NET. MyCatalog contains data that describes the pricing values of design catalogs. He wants to ensure that only authenticated users are authorized to access the data. He also wants the data to be secured at the highest level of authentication. Which of the following authentication levels will Perry use to accomplish this?
Which of the following code snippets is an example of tight encapsulation?
You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Windows application using .NET Framework 2.0. The application provides accessibility features. The forms in the application display a background image. You want to remove the image whenever a user selects Use High Contrast in the Accessibility Options in Control Panel. You are required to add an event to handle this accessibility setting change. Which of the following events will you use to accomplish this task?
You work as a Software Developer for Mansoft Inc. You create an ASP.NET Web application named MyWebApp. You implement a security protocol to transmit secured data between a client and a server. You try to authenticate the client computer. However, you are unable to do so, and the AuthenticationException exception is thrown. Which of the following classes will you use to accomplish this task?
Each correct answer represents a complete solution. Choose two.
You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. You are using regular expression in the application to validate email, phone number, etc. You are required to match any single character except "\n". Which of the following wildcard characters will you use to accomplish the task?
John works as a Web Developer for ABC Inc. He develops an ASP.NET application, named MyApp1, using Visual Studio .NET. The application will be used in the Sales department to generate monthly reports. John wants to deploy the application on the company's intranet. The company uses Microsoft Windows authentication. John wants to deny access to all the members of the Guest1 role. Which of the following attributes will he use in the <authorization> element of the application's Web.config file to accomplish the task?
Which of the following is required to be implemented by marshal-by-value objects to implement custom serialization rules?
Sam works as a Software Developer for GenTech Inc. He develops an application named App1 using Visual Basic .NET. App1 uses a non-COM DLL named Value1.dll, which contains unmanaged code. Sam writes a method named Method1 in Value1.dll as follows:
Method1 Lib "Value1.dll"(ByVal InputVar As String, ByRef WordsVar As String, ByRef
NumbersVar As Integer) As Integer
Sam wants to use Method1 for parsing a string into an array of string values and an array of integers. Sam wants to enable App1 to call this function. Which of the following statements about the method are true?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You are creating an ASP.NET Web application using the .NET Framework 3.5. The application stores sensitive profile data in a MS SQL Server 2008 database. You are required to make sure that the profile data never stored in clear text. What will you do?
Which of the following is the best encryption algorithm to encrypt and decrypt messages?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
GIAC Free Exams |
---|
![]() |