Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSSP-NET-CSHARP Practice Exam with Questions & Answers | Set: 6

Questions 51

You work as a Software Developer for ABC Inc. You develop a multi-threaded application named MyMultThreadApp using Visual Studio .NET. The application logs all warning and informational messages in an event log that keeps track of significant events when the application is running. The event log records information that might be useful for troubleshooting or performance analysis. Which of the following are the considerations that you must keep in mind when logging events with multithreaded components?

Each correct answer represents a complete solution. Choose three.

Options:
A.

An exclusive lock should be obtained on the log to avoid race conditions.

B.

Each shared component should be thread-safe when interacting with an event log.

C.

The System.Threading namespace should be used to record the identity of each thread for logging messages.

D.

The Debug and Trace classes should be used to log events.

GIAC GSSP-NET-CSHARP Premium Access
Questions 52

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a Web service application using .NET Framework. The Web service provides confidential data of employees to applications that manage access to company facilities. The Web service is accessible by using TCP and is sheltered by using WSE 3.0. The company has implemented fingerprint readers to grant employees access to the facilities. All the captured images of the employees' fingerprints are retained by the Web service application. You must make certain that the existing WSE encryption policy can be applied to the fingerprint image. You are required to provide the solution that must reduce the size of the Web service message.

What will you do to accomplish this task?

Options:
A.

Configure the Web service to use base64 encoding to pass the binary fingerprint image.

B.

Create a SOAP extension to manage encryption for the message.

C.

Configure the Web service to use Message Transmission Optimization Mechanism to pass the binary fingerprint image.

D.

Create a SOAP filter to manage encryption for the message.

Questions 53

Which of the following elements will you use to add a script to the ScriptManager declaratively?

Options:
A.

<connectionStrings>

B.

C.

</configuration>

D.

<script>

Questions 54

John works as a Web developer for HiTech Inc. He develops an application named MyApp by using Visual C# .NET. John uses a SQL Server database. He writes the following code:

OleDbCommand cmd = new OleDbCommand();

cmd.CommandText = "UPDATE Employees SET Rank = 'Senior' WHERE Basic > 10000";

cmd.ExecuteNonQuery();

Now he wants to improve the performance of the program code. Which of the following actions will he perform to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:
A.

Use database indexing.

B.

Use an OleDbDataReader object to execute the program code.

C.

Use a Cache object to execute the program code.

D.

Use a SqlCommand object instead of an OleDbCommand object.

E.

Use a stored procedure instead of the CommandText property.

F.

Use the Prepare method on the OleDbCommand object before executing the program code.

Questions 55

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating a Windows Forms application using .NET Framework 3.5. You need to develop a new control for the application. You must ensure that the control inherits the TreeView control by adding a custom node tag and a highlight color. What will you do?

Options:
A.

Write a code segment in the DrawNode event handler to give the highlight color.

B.

Override the OnPaint method.

C.

Set the control's DrawMode property to OwnerDrawText, and then implement a custom DrawNode event handler.

D.

Set the control's DrawMode property to OwnerDrawAll, and then implement a custom DrawNode event handler.

Questions 56

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating an application using the .NET Framework. You write the following code snippet to call a method from the Win32 API by using PInvoke:

int rst = MessageBox(hWd, Mytext, Mycaption, Mytype);

You are required define a method prototype. Which of the following code segments will you use to accomplish this task?

Options:
A.

[DllImport("user32")] extern int MessageBoxA(int hWd, String Mytext, String Mycaption, uint Mytype);

B.

[DllImport("user32")] extern int Win32API_User32_MessageBox(Int hWd, String Mytext, String Mycaption, uint Mytype);

C.

[DllImport("user32")] extern int MessageBox(int hWd, String Mytext, String Mycaption, uint Mytype);

D.

[DllImport("C:\\WINDOWS\\system32\\user32.dll")] extern int MessageBox(int hWd, String Mytext, String Mycaption, uint Mytype);

Questions 57

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. The application uses serialization to allow users to take an instance of an object and convert it into a format that can be easily transmittable over the network or even stored in a database. You want to provide the base functionality for the common language runtime serialization formatters. Which of the following classes will you use to accomplish the task?

Options:
A.

SoapFormatter

B.

FormatterConverter

C.

Formatter

D.

BinaryFormatter

Questions 58

You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

Options:
A.

Cryptographic toolkit

B.

Cryptosystem

C.

Cryptographer

D.

Cryptanalyst

Questions 59

John works as a Software Developer for InfoTech Inc. He develops an application named

SerializeObj. He creates a custom class and wants to serialize its object. He also wants the object to be stored into an XML file named File1.xml. He writes the following code: public class Employees

{

public string EmpID;

public string EmpName;

public decimal Salary;

}

Which of the following code statements will John add in the application?

Options:
A.

XmlSerializer ObjectSerializer = new XmlSerializer(typeof(Employees), ObjectTypes);

B.

XmlSerializer ObjectSerializer = new XmlSerializer(typeof(Employees));

C.

XmlSerializer ObjectSerializer = new XmlSerializer(Employees);

D.

XmlSerializer ObjectSerializer = new XmlSerializer();

Questions 60

In which of the following objects are session variables stored?

Options:
A.

SessionStateStoreData

B.

SessionStateModule

C.

SessionStateItemCollection

D.

SessionStateStoreProviderBase

GIAC Related Exams

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.