Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: bestdeal

Free GIAC GSSP-.NET Practice Exam with Questions & Answers | Set: 3

Questions 21

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are developing an application for the customer support using the .NET Framework. The customer support application accepts phone numbers. While running a report, you notice that the phone numbers displayed do not pursue similar format. Furthermore, there are cases of missing digits and missing area codes. You are required to ensure that the phone numbers are entered in the following format:

(###) ###- ####

You need to accomplish this task with the least amount of code. What will you do?

Options:
A.

Use the CustomValidator control.

B.

Replace all TextBox controls that are used for phone number input with MaskedTextBox con trols.

C.

Write code that uses a regular expression.

D.

Use the RegularExpressionValidator control.

GIAC GSSP-.NET Premium Access
Questions 22

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a message queue named SecureQ using .NET Framework. The message queue requires each incoming message to be encrypted. You want to ensure that a message can be sent to SecureQ without an exception being thrown. What will you do to accomplish this task?

Options:
A.

Use the CryptoStream class to encrypt the Body property on the message.

B.

Set the HashAlgorithm property to a value from the HashAlgorithm enumeration on the me ssage.

C.

Set the EncryptionAlgorithm property to a value from the EncryptionAlgorithm enumeration on the message.

D.

Set the UseEncryption property to true on the message.

Questions 23

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0.

The application is used to exchange structured and type information on the Web using Soap. You want to use the BinaryFormatter and SoapFormatter classes to support RPCs and serialization of a graph of objects. Which of the following interfaces will the BinaryFormatter and SoapFormatter classes implement to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

Options:
A.

IFormatter

B.

IFormatable

C.

IRemotingFormatter

D.

IComparable

Questions 24

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You have recently finished development of an ASP.NET Web application using .NET Framework 3.5. You deploy the application on a test server and enable the debugging. The application is hosted in IIS 6.0 and uses the default authentication. Integrated

Windows authentication is enabled and anonymous access is disabled. You have not got the administrative rights on the test server. The following configuration is present in the Web.config filE.

<authentication mode="Windows"/>

<authorization>

</authorization>

You are required to configure the Web.config file to debug the application from your development computer. Which of the following configurations will you use in the Web.config file?

Options:
A.

<authentication mode="Forms"/>

B.

C.

<authorization>

<allow users="?"/>

</authorization>

D.

<authorization>

<allow users="*"/>

</authorization>

Questions 25

You work as a Software Developer for InfoTech Inc. You create a Windows form in a Windows-based application named MyWinApp1. You use graphics in the form. You write the following code in your form:

private void MyMouseEvent1(object sender1, MouseEventArgs event)

{

// Code to handle mouse events

}

You want to implement a property of the MouseEventArgs object. This property will return a Point structure that contains the x-coordinate and y-coordinate of the mouse. Which of the following properties of the MouseEventArgs object will you use to accomplish this?

Options:
A.

Y

B.

Location

C.

Button

D.

X

E.

Delta

F.

Clicks

Questions 26

You work as a Software Developer for ManSoft Inc. You use Microsoft Visual Studio to create a Web service named MyWebService. You create a SOAP message that is not secure in the Web service. You want to use the ReceiveSecurityFilter class in the Web service to handle the receiving and securing of SOAP messages. Which of the following code segments will you use to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:
A.

public class MyReceiveSecurityFilter : ReceiveSecurityFilter

{

public MyReceiveSecurityFilter(string service, Boolean client)

{

base(service, client);

}

public override void ValidateMessageSecurity(SoapEnvelope envelope, Security security)

{

// Implementation validation here

}

}

B.

public class MyReceiveSecurityFilter : ReceiveSecurityFilter

{

public MyReceiveSecurityFilter(string service, Boolean client) : base(service, client)

{ }

public override void ValidateMessageSecurity(SoapEnvelope envelope, Security security)

{

// Implementation validation here

}

}

C.

public class MyReceiveSecurityFilter : ReceiveSecurityFilter

{

public MyReceiveSecurityFilter(string service, Boolean client)

{ }

public override void ValidateMessageSecurity(SoapEnvelope envelope, Security security)

{

// Implementation validation here

}

}

D.

public class MyReceiveSecurityFilter : ReceiveSecurityFilter

{

public MyReceiveSecurityFilter(string service, Boolean client) : base(service, client)

{ }

public void ValidateMessageSecurity(SoapEnvelope envelope, Security security)

{

// Implementation validation here

}

}

Questions 27

You work as a Software Developer for ManSoft Inc. You create an application using Visual Studio .NET

2005. You write the following code snippet in the application:

int amt = 50;

String s = "John gave me " + amt + " dollars";

Console.WriteLine(s);

What will be the output of the above code?

Options:
A.

"John gave me amt dollars"

B.

"John gave me 50 dollars"

C.

Integer variable cannot concatenate with the string

D.

Invalid type cast exception

Questions 28

Samantha works as a Software Developer for InfoWorld Inc. She develops a Web page named SalesReport.aspx for the employees of the company. However, she wants to ensure that all the requests for a particular employee are not stored on the server's memory. She also wants to ensure that no data is lost even after each user session has expired. Which of the following actions will Samantha take to accomplish the task?

Options:
A.

Use a cookieless session state for storing information.

B.

Use the profile properties feature for storing information.

C.

Use the application state for storing information.

D.

Use the session state with cookie for storing information.

Questions 29

Sandra works as a Software Developer for ABC Inc. She develops a Web site on a client computer. She creates a custom control named CustControl1 on a Web page named

MicrosoftCert1. She wants to retain the custom control property information during several round trips to a server. She wants to ensure that the control property is retained even if the view state of the Web page is disabled at the page level. Which of the following client-based techniques for storing state management information will Sandra use to accomplish the task?

Options:
A.

Control state

B.

Cookie

C.

Query string

D.

Hidden field

E.

View state

Questions 30

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. The application stores sensitive profile data in a SQL Server 2008 database. You are required to make sure that no profile data is stored in clear text. What will you do to accomplish the task?

Options:
A.

Use the Aspnet_regiis.exe tool to encrypt the connection string that is used to connect to the database.

B.

Create a custom profile provider and ensure that the provided information is encrypted before it is stored in the database.

C.

Enable the secure sockets layer encryption for the SQL Server connections.

D.

Use SQL Profiler.

GIAC Free Exams

GIAC Free Exams
Prepare for GIAC certification with free access to reliable study resources and practice tests at Examstrack.