Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

GSSP-.NET Sample Questions Answers

Questions 4

Ryan works as a Software Developer for Mansoft Inc. He creates an ASP.NET Web application named MyWebApplication using Visual Studio .NET 2005. MyWebApplication performs validation on XML files in a directory. Whenever a new XML file appears in the directory, MyWebApplication opens the file, checks it for validation, and updates it accordingly. Ryan wants to ensure that each update performed on XML files is logged in the Web application log. He creates a String object named Var1, to store the message to be logged. Which of the following will he use to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

The Trace.WriteLine method

B.

The EventLog.WriteEntry method

C.

The EventLog.EventLogSource property

D.

The EventLog.Source property

Buy Now
Questions 5

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. You need to read the entire contents of a file named Msg.txt into a single string variable using .NET Framework. Which of the following code segments will you use to accomplish the task?

Options:

A.

string NewResult = string.Empty;

StreamReader Strreader = new StreamReader("Msg.txt");

While (!Strreader.EndOfStream) {

NewResult += Strreader.ToString();

B.

string NewResult = null;

StreamReader Strreader = new StreamReader("Msg.txt");

NewResult = Strreader.ReadLine();

C.

string NewResult = null;

StreamReader Strreader = new StreamReader("Msg.txt");

NewResult = Strreader.ReadToEnd();

D.

string NewResult = null;

StreamReader Strreader = new StreamReader("Msg.txt");

NewResult = Strreader.Read().ToString();

Buy Now
Questions 6

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You create an ASP.NET Web application using the .NET Framework 3.5. 91. The application uses ASP.NET AJAX, and you need to deploy it in a Web farm environment. You are required to configure SessionState for the application. Which of the following code segments will you use to accomplish this task?

Options:

A.

B.

C.

D.

Buy Now
Questions 7

You are working on an ASP.NET application that will handle shopping cart for online users. You wish to generate images of all your company's products dynamically on one of the application's Web pages. You need to modify your configuration settings file for this purpose. Which of the following sections of the configuration file will you use to accomplish the task?

Options:

A.

B.

C.

D.

Buy Now
Questions 8

You work as a Software Developer for ManSoft Inc. The company uses Visual Studio .NET 2005 as its application development platform. You create an application named MyApplication using Visual C# .NET. You use the Mutex class for synchronization among threads. You create three threads to enter the protected area one by one. This means that if one thread is already in the protected area, no other thread is allowed to enter in the protected area. When you execute the application, it gives the following output:

As you can see in the above code window, all the three threads enter the protected area at the same time. Drag and drop the appropriate statements that will allow the threads to enter the protected area one by one.

Options:

A.

Buy Now
Questions 9

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. You need to represent a strongly typed lambda expression as a data structure in the form of an expression tree. Which of the following classes will you use to accomplish the task?

Options:

A.

MethodCallExpression

B.

Expression

C.

LambdaExpression

D.

Expression(TDelegate)

Buy Now
Questions 10

You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. The application will be used by all the branches of the company. You sometimes require a variable number of arguments to be passed to a method. For example, you may require a sum method, which calculates the total of the numbers passed to it no matter how many numbers are passed. What will you do to accomplish the task?

Options:

A.

Use the out keyword.

B.

Use the base keyword.

C.

Use the volatile keyword.

D.

Use the params keyword.

E.

Use the ref keyword.

Buy Now
Questions 11

Ricky works as a Software Developer for SoftTech Inc. He creates an XML Web service, named XmlWeb, by using Visual Studio .NET. He wants to publish XmlWeb within the company's intranet. Which of the following actions will Ricky take to publish XmlWeb?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Register XmlWeb in the private UDDI registry.

B.

Use XML Spy to register XmlWeb.

C.

Register XmlWeb in the public UDDI registry.

D.

Build a discovery (disco) document for XmlWeb.

Buy Now
Questions 12

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an ASP.NET Web application using .NET Framework 3.5. The application will be accessed by Internet users. You need to enable users to authenticate from the client-side script. You add the following code fragment in the Web.config file of the application:

You must configure the application to ensure that user credentials are validated against Active Directory by using the client-side script. What will you do to accomplish this?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Add the following code fragment to the Web.config file of the application:

B.

Configure the application to use the ActiveDirectoryMembershipProvider class.

C.

Add the following code fragment to the Web.config file of the application:

D.

Configure the application to use the SqlMembershipProvider class.

E.

Add the following code fragment to the Web.config file of the application:

Buy Now
Questions 13

David works as a Software Developer for McRobert Inc. He develops a Windows-based application, named App1, using Visual C# .NET. The application contains a Form control, named Form1. He wants to write code to initialize class-level variables, named Var1, Var2, and Var3, as soon as Form1 is instantiated. Which of the following code will he use to accomplish this?

Options:

A.

private void Form1_Initialize(System.Object sender, System.EventArgs e)

{

int Var1 = 20;

int Var2 = 40;

int Var3 = 60;

}

B.

private void Form1_New(System.Object sender, System.EventArgs e)

{

int Var1 = 20;

int Var2 = 40;

int Var3 = 60;

}

C.

private void Form1_Load(System.Object sender, System.EventArgs e)

{

int Var1 = 20;

int Var2 = 40;

int Var3 = 60;

}

D.

private void Form1_Create(System.Object sender, System.EventArgs e)

{

int Var1 = 20;

int Var2 = 40;

int Var3 = 60;

}

Buy Now
Questions 14

You work as a Software Developer for ABC Inc. You create a SQL server database named DATA1 that will manage the payroll system of the company. DATA1 contains two tables named EmployeeData and Department. While EmployeeData records detailed information of the employees, Department stores information about the available departments in the company. EmployeeData consists of columns that include EmpID, EmpName, DtOBrth, DtOJoin, DeptNo, Desig, BasicSal, etc. You want to ensure that each employee ID is unique and is not shared between two or more employees. You also want to ensure that the employees enter only valid department numbers in the DeptNo column. Which of the following actions will you perform to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Define views in the database.

B.

Add constraints to the EmployeeData table.

C.

Define triggers in the EmployeeData table.

D.

Define indexes in the EmployeeData table.

E.

Add stored procedures by using Transact-SQL queries.

Buy Now
Questions 15

You work as a Software Developer for ManSoft Inc. The company uses Visual Studio.NET 2005 as its application development platform. You have recently created an application that includes the code shown below.

string str1 = "ABC";

string str2 = "u";

str2 += "Certify";

Console.WriteLine(str1 == str2);

Console.WriteLine((Object) str1 == (Object) str2);

Console.WriteLine(str1.Equals(str2));

What will be the output of the above code?

Options:

A.

True

True

True

B.

True

False

True

C.

False

False

False

D.

False

True

False

Buy Now
Questions 16

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You create an ASP.NET Web application using the .NET Framework 3.5. The application is used to map HTTP requests to HTTP handlers based on a file name extension. You need to ensure that each HTTP handler processes individual HTTP URLs or groups of URL extensions in the application. Which of the following built-in HTTP handlers will you use to accomplish this task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Web service handler (*.asmx)

B.

Generic handler (*.ashx)

C.

Generic Web handler (*.ashx)

D.

ASP.NET page handler (*.aspx)

E.

Trace handler (trace.axd)

Buy Now
Questions 17

Martha works as a Software Developer for NetCom Inc. She develops an application, named App1, using Visual Studio .NET. The application contains a form, named MyForm1. MyForm1 contains several controls including a TextBox, named txtDOB. The txtDOB control is used to accept the date of birth from a user. In order to ensure that a user enters a valid date in txtDOB, Martha adds validation logic to the Validating event of txtDOB. When she tests the form by using some invalid dates in txtDOB, the validation logic does not appear to be working as expected. What is the most likely cause of the issue?

Options:

A.

Martha has set the Locked property of txtDOB to True.

B.

Martha has set the CausesValidation property of txtDOB to False.

C.

Martha has set the SuppressValidation property of txtDOB to True.

D.

Martha has set the TabIndex property of txtDOB to 0.

Buy Now
Questions 18

Perry works as a Web Developer for BlueWell Inc. He creates a catalog application named MyCatalog for a server using Visual Studio .NET. MyCatalog contains data that describes the pricing values of design catalogs. He wants to ensure that only authenticated users are authorized to access the data. He also wants the data to be secured at the highest level of authentication. Which of the following authentication levels will Perry use to accomplish this?

Options:

A.

Packet Privacy

B.

Packet Integrity

C.

Packet

D.

Call

Buy Now
Questions 19

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You are developing an application using .NET Framework 2.0. You are required to use a datatype that will store only the numbers. The numbers should be in positive form and should not be larger than 65,535. Which of the following datatypes will you use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

System.UInt16

B.

ushort

C.

System.Int16

D.

int

E.

short

Buy Now
Questions 20

You work as a Software Developer for ABC Inc. You use C# .NET to develop a windows application. The application will implement a role-based authorization scheme that is based on a Microsoft SQL Server database of user names. Users will enter their names in a text box named UserName. You must ensure that users are assigned the supervisor role and the PG role by default. Which of the following code segments will you use to accomplish this task?

Options:

A.

GenericIdentity identity =

new GenericIdentity(UserName.Text);

string[] RoleArray = {"Supervisor", "PG"};

WindowsPrincipal principal = new WindowsPrincipal(identity);

B.

WindowsIdentity identity =

new WindowsIdentity.GetAnonymous();

string[] RoleArray = {"Supervisor", "PG"};

WindowsPrincipal principal = new GenericPrincipal(identity, RoleArray);

C.

GenericIdentity identity =

new GenericIdentity(UserName.Text);

string[] RoleArray = {"Supervisor", "PG"};

GenericPrincipal principal = new GenericPrincipal(identity, RoleArray);

D.

WindowsIdentity identity =

new WindowsIdentity.GetCurrent();

string[] RoleArray ={"Supervisor", "PG"};

GenericPrincipal principal = new GenericPrincipal(identity, RoleArray);

Buy Now
Questions 21

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a Windows service application that will be used by Visual Studio .NET applications. You want to ensure that an access to the Windows service is restricted. Therefore, you decide to use the ServiceInstaller class. You want to specify the security context of the Windows service application. Whic

Options:

A.

Password property

B.

UserName property

C.

Context property

D.

Account property

Buy Now
Questions 22

Peter works as a Software Developer for PatSoluTech Inc. He develops a Web application using Visual Studio .NET. The application contains an online ordering Web form named WebForm1. WebForm1 contains several Web server controls that include a TextBox control named TextBox1 and an ImageButton control named ImageButton1. He wants data entered in TextBox1 to be validated whenever ImageButton1 is clicked. Which of the following will Peter use to accomplish the task?

Options:

A.

ImageButton1.CausesValidation

B.

ImageButton1.OnClientClick

C.

ImageButton1.ValidationGroup

D.

ImageButton1.Enabled

Buy Now
Questions 23

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows Forms

application using .NET Framework 3.5. You need to execute a method named ProcAmount in the background of the application. The method requires that an integer value 101 is passed to it. You are required to pass an integer value 101 to start a background thread. Which of the following code segments should you use?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

ParameterizedThreadStart tStart;

tStart = new ParameterizedThreadStart(ProcAmount);

Thread thd = new Thread(tStart);

B.

thd.Start(101);

C.

ThreadStart tStart = new ThreadStart(ProcAmount);

Thread thd = new Thread(tStart, 101);

D.

thd.Start();

Buy Now
Questions 24

John works as a Web Developer for ProMetaworks Inc. He creates an ASP.NET application, named MyApp1, by using Visual Studio .NET. MyApp1 contains a page, named Page1. Page1 contains several TextBox controls that accept users' input. John uses several validation controls on the page to validate input controls. He wants to display all the validation error messages on the page in a message box. However, he does not want the validation summary to be displayed inline on the Web page. What will he do to accomplish the task?

Options:

A.

Add a CustomValidator control to the page. Write a custom client-side script function. Set the ClientValidationFunction property of the control to the name of the function.

B.

Add a ValidationSummary control to the page. Set its ShowMessageBox and ValidationSummary properties to True.

C.

Add a ValidationSummary control to the page. Set its ShowMessageBox property to True and ValidationSummary property to False.

D.

Add a ValidationSummary control to the page. Set its DisplayMode property to MessageBox .

Buy Now
Questions 25

Which of the following code snippets is an example of tight encapsulation?

Options:

A.

private int x;

public void fun(){x=5;}

B.

private int x;

private void fun(){x=5;}

C.

public int x;

public void fun() {x=5;}

D.

protected int x;

protected void fun(){x=5;}

E.

int x;

public void fun(){x=5;}

Buy Now
Questions 26

Mark works as a Software Developer for BlueWell Inc. He is required to create a class, named Members. Each element of this class has a unique ID stored in a database field, named Member_ID. Which of the following options will he use to represent Member_ID, while designing the Members class?

Options:

A.

Event

B.

Method

C.

Function

D.

Property

Buy Now
Questions 27

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a class library using the .NET Framework. The library will be used to open the NSCs of computers. Later, you will set up the class library to the GAC and provide it Full Trust permission. You write down the following code segments for the socket connections:

SocketPermission permission = new SocketPermission(PermissionState.Unrestricted); permission.Assert();

A number of the applications that use the class library may not have the necessary permissions to open the network socket connections. Therefore, you are required to withdraw the assertion. Which of the following code segments will you use to accomplish the task?

Options:

A.

CodeAccessPermission.RevertDeny();

B.

permission.Demand();

C.

permission.Deny();

D.

permission.PermitOnly();

E.

CodeAccessPermission.RevertAssert();

Buy Now
Questions 28

You work as a Database Developer for a Web based music company named Music2Music. You are designing a database for online order management application. The customers use the company's Web site to place orders for the music CDs. Orders details are first inserted into an online database named OrdersData. The Orders database includes a table named Orders and a table named OrderDetails. The Orders table contains basic information about the orders. The OrderDetails table contains information about the individual items in the orders. Fragments of the Orders database is given below:

Requirements of the database design are given below:

l Customers must be able to use the company's Web site to view orders stored in the OrdersData database.

l Customers should be able to see only their own orders.

l Customers should not be able to modify the orders.

l The primary key values of the orders are not relevant to the customers and should not be

visible. What will you do?

Options:

A.

Create a view that displays the order information for a customer.

B.

Create a stored procedure that retrieves the order information for a customer.

C.

Grant SELECT permissions on the Orders and OrderDetails tables to the customers

D.

Create a scalar user-defined function that retrieves the order information for a customer.

Buy Now
Questions 29

You work as a Software Developer for ManSoft Inc. You create an application using Visual Studio .NET

2005. You write the following code snippet in the application:

int amt = 50;

String s = "John gave me " + amt + " dollars";

Console.WriteLine(s);

What will be the output of the above code?

Options:

A.

"John gave me amt dollars"

B.

"John gave me 50 dollars"

C.

Integer variable cannot concatenate with the string

D.

Invalid type cast exception

Buy Now
Questions 30

Sam works as a Software Developer for SamTech Inc. He develops a Windows-based application, named App1, using Visual Studio .NET. He wants to set a security policy for the application. To accomplish the task he uses the PolicyLevel class. He wants to set the current policy level to the default state. Which of the following methods will he use to accomplish the task?

Options:

A.

Resolve

B.

ChangedNamePermissionSet

C.

Reset

D.

Recover

Buy Now
Questions 31

Sandra works as a Software Developer for ABC Inc. She develops a Web site on a client computer. She creates a custom control named CustControl1 on a Web page named

MicrosoftCert1. She wants to retain the custom control property information during several round trips to a server. She wants to ensure that the control property is retained even if the view state of the Web page is disabled at the page level. Which of the following client-based techniques for storing state management information will Sandra use to accomplish the task?

Options:

A.

Control state

B.

Cookie

C.

Query string

D.

Hidden field

E.

View state

Buy Now
Questions 32

You work as a Software Developer for Mansoft Inc. The company uses Visual Studio.NET 2005 as its application development platform. You need to write a code segment that can change the file extension of a file named Test.txt. Which of the following code segments will you choose to change the file extension?

Each correct answer represents a complete solution. Choose two.

Options:

A.

using System;

using System.IO;

public class ChangeExample

{

public static void Main()

{

string FileName =@"C.\Test.txt";

Console.Write ("File NamE."+FileName);

Console.Write (" File Extension: {0}", Path.GetExtension(FileName));

Console.Write ("Change File Extension {0}", Path.ChangeExtension(FileName, "doc"));

}

}

B.

using System;

using System.IO;

public class ChangeExample

{

public static void Main()

{

string FileName =@"C.\Test.txt";

Console.Write ("File NamE."+FileName);

Console.Write (" File Extension: {0}", Path.GetExtension(FileName));

Console.Write ("Change File Extension {0}", Path.ChangeExtension(FileName,".exe"));

}

}

C.

using System;

using System.IO;

public class ChangeExample

{

public static void Main()

{

string FileName =@"C.\Test.txt";

Console.Write ("File NamE."+FileName);

Console.Write (" File Extension: {0}", Path.GetExtension(FileName));

Console.Write ("Change File Extension {0}", Path.ChangeExtension(FileName));

}

}

D.

using System;

using System.IO;

public class ChangeExample

{

public static void Main()

{

string FileName =@"C.\Test.txt";

Console.Write ("File NamE."+FileName);

Console.Write (" File Extension: {0}", Path.GetExtension(FileName));

Console.Write ("Change File Extension {0}", Path.ChangeExtension("rft"));

}

}

Buy Now
Questions 33

Sam works as a Software Developer for BlueWell Inc. He creates a .NET Remoting object named MyObj using Visual Studio .NET. He wants to configure MyObj to send and receive confidential information from an XML file stored in an encrypted hard drive. What will he do to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Implement a declarative security check.

B.

Implement an imperative security check.

C.

Use the SecurityAction.Demand value for the SecurityAction flag.

D.

Use the SecurityAction.RequestMinimum value for the SecurityAction flag.

Buy Now
Questions 34

Nick works as a Programmer for ES International Ltd. The company is a manufacturer and a dealer of new cars. This year, the annual sales report of the company showed that the sale of its Escort car model dropped significantly. To lower the inventory of the Escort car model, the company management finally decided to give a 25 to 30 percent discount on the Escort model. Nick receives an XML document that contains a list of the company's car models. Nick wants to load the incoming XML document into a memory stream. He also needs to use another XML document. Which of the following methods will he use to accomplish this task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

LoadXml()

B.

WriteTo()

C.

Load()

D.

ImportNode()

Buy Now
Questions 35

You work as a Software Developer for ManSoft Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You create an application that will be used by all the branches of the company. You use the Regex class in the application to validate some strings. You want to search an input string for an occurrence of a regular expression. Which of the following methods of the Regex class will you use to accomplish the task?

Options:

A.

Match

B.

Matches

C.

Equals

D.

IsMatch

Buy Now
Questions 36

You work as a Software Developer for ABC Inc. You use Visual Studio .NET to develop a Windows application named MyWindowApp. You implement the security classes of the .NET Framework. When users interact with the application, the role-based validation should perform frequently. You must ensure that only validated Windows NT or Windows 2000 domain users are permitted to access the application. You add the appropriate Imports statements for the System.Security.Principal namespace and the System.Threading namespace. Which of the following code segments will you use to accomplish this task?

Options:

A.

Dim identity As WindowsIdentity = _WindowsIdentity.GetAnonymous()

Dim myprincipal As New WindowsPrincipal(identity)

B.

AppDomain.CurrentDomain.SetThreadPrincipal(_

PrincipalPolicy.WindowsPrincipal)

Dim myprincipal As WindowsPrincipal = _CType(Thread.CurrentPrincipal, WindowsPrincipal)

C.

Dim identity As WindowsIdentity = WindowsIdentity.GetCurrent()

Dim myprincipal As New WindowsPrincipal(identity)

D.

AppDomian.CurrentDomain.SetPrincipalPolicy(_

PrincipalPolicy.WindowsPrincipal)

Dim myprincipal As WindowsPrincipal = _CType(Thread.CurrentPrincipal, WindowsPrincipal)

Buy Now
Questions 37

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are developing an application using the .NET Framework 2.0.

You are required to use a datatype that will store only numbers ranging from -32,768 to 32,767.

Which of the following datatypes will you use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

int

B.

string

C.

short

D.

System.Int16

Buy Now
Questions 38

Allen works as a Software Developer for Mansoft Inc. He develops a Web application using Visual Studio .NET. He adds a Web reference to an XML Web service named MyWebService in the application. MyWebService includes a method named MyMethod, which takes user identification number as a parameter and returns a DataSet object containing user information. The System.ArgumentException is thrown if the user identification number does not lie between 1 and 500. Allen writes a try and catch block to capture the exception thrown by the Web service. Which of the following exceptions will the try and catch block catch if a user calls MyMethod passing 501 as a parameter?

Options:

A.

System.Web.Services.Protocols.SoapException

B.

System.Web.Services.Protocols.SoapHeaderException

C.

System.ApplicationException

D.

System.ArgumentNullException

Buy Now
Questions 39

Allen works as a Software Developer for ABC Inc. He develops an application using Visual Studio .NET

2005. The application will be used for the registration of employees by filling a form provided in the application. The form contains the following fields:

l First Name

l Last Name

l Date of Birth

l E-mail

He provides a TextBox control for each field. He wants an employee to be able to receive a user-defined error message when he makes a wrong entry. Which of the following properties is mandatory if a

CustomValidator control is used to validate an entry?

Options:

A.

EnableViewState

B.

EnableTheming

C.

ErrorMessage

D.

IsValid

Buy Now
Questions 40

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are creating a .NET remoting application using .NET Framework

2.0. You want to use a remote object whose lifetime is controlled by a server and the remote object is created for each client request. Which of the following objects will you use to accomplish the task?

Options:

A.

Client activated

B.

MarshalByRefObject

C.

Server activated Singleton

D.

Server activated SingleCall

Buy Now
Questions 41

You work as a Software Developer for ABC Inc. The company has several branches worldwide.

The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

Options:

A.

Cryptosystem

B.

Cryptanalyst

C.

Cryptographic toolkit

D.

Cryptographer

Buy Now
Questions 42

Martha works as a Software Developer for HiTech Inc. She develops a Web application named

SalesApp that contains a Web page named MyWebForm1.aspx. The Web page contains validation controls for the Web server controls on the page. Martha wants the custom validation error message to display if the validation fails to call the validation control on the Web page. Which of the following actions will Martha take to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Call the Validate method of the validation control.

B.

Check the IsValid property of the validation control.

C.

Handle the Page_Init event handler.

D.

Handle the Page_Load event handler.

Buy Now
Questions 43

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create an application using the .NET Framework. You create a class named Master that contains numerous child objects. The Master class contains a method named ProcessChild that executes actions on the child objects. The Master class objects will be serializable. You must ensure that the ProcessChild method is executed subsequent to the Master class object and all its child objects are reformed. Which of the following actions will you take to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Create an OnDeserialization method that calls the ProcessChild method.

B.

Apply the OnDeserializingAttribute class to the ProcessChild method.

C.

Specify that the Master class implements the IDeserializationCallback interface.

D.

Apply OnSerializedAttribute to the ProcessChild method.

E.

Specify that the Master class inherits from the ObjectManager class.

Buy Now
Questions 44

John works as a Web Developer for TechCom Inc. He creates an ASP.NET application, named MyApp1, by using Visual Studio .NET for a University Web site. Students will use MyApp1 to view their term end results. MyApp1 contains an ASP.NET page, named Page1. Page1 contains a TextBox control, named txtEnrolmentNo, and two Button controls, named btnSubmit and btnCancel.

John wants to display the text "Enter Enrolment Number" within txtEnrolmentNo. He wants to ensure that if a user tries to submit the page without entering an enrolment number, the word "Error" appears next to txtEnrolmentNo. Which of the following actions will he take to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Add a RequiredFieldValidator control to the page. Set its ControlToValidate property to txtEnrolmentNo, InitialValue property to "Enter Enrolment Number", and ErrorMessage property to "Error".

B.

Add a RequiredFieldValidator control to the page. Set its ControlToValidate property to txtEnrolmentNo, ErrorMessage property to "Enter Enrolment Number", and InitialValue property to "Error".

C.

Set the InitialValue property of txtEnrolmentNo to "Enter Enrolment number".

D.

Set the Text property of txtEnrolmentNo to "Enter Enrolment number".

E.

Add a RegularExpressionValidator control to the page. Set its ControlToValidate property to txtEnrolmentNo, ErrorMessage property to "Enter Enrolment Number", and InitialValue property to "Error".

Buy Now
Questions 45

Sam works as a Software Developer for SamTech Inc. He creates an XML Web service, named

WebService1, using Visual Studio .NET. WebService1 uses the .NET Framework security class libraries to implement security. It implements role-based authorization based on a SQL Server database containing user names. Sam adds the following statements to the Web service codE. using System.Security.Principal; using System.Threading;

Sam wants to ensure that only validated users are permitted to access WebService1 by entering their user names and passwords in TextBox controls, named Text1 and Text2. He wants to implement imperative security check on WebService1. He also wants to ensure that users are assigned the Manager role and the Subordinate role by default. Which of the following classes will Sam use to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

WindowsPrincipal

B.

GenericIdentity

C.

WindowsIdentity

D.

GenericPrincipal

Buy Now
Questions 46

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows Forms application using .NET Framework 3.5. The application needs a thread that accepts an integer parameter. You write the following code segment in the application:

Thread myThread = new Thread(new ParameterizedThreadStart(doWork));

myThread.Start(125);

You are required to declare the signature of the doWork method. Which of the following method signatures will you use?

Options:

A.

public void doWork(int nCount)

B.

public void doWork(Object oCount)

C.

public void doWork()

D.

public void doWork(Delegate oCount)

Buy Now
Questions 47

You work as an Enterprise Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an Enterprise application using .NET Framework 3.5. The application must meet the following requirements:

l The application loads XML from streams.

l The application creates XML from scratch by using functional construction.

l The application queries XML using XPath-like axes.

l The application validates XML trees using XSD.

What will you do to meet these requirements with least development efforts?

Options:

A.

Use LINQ to XML.

B.

Use LINQ to SQL.

C.

Use the XML Schema Definition Tool.

D.

Use ADO.NET Data Services.

Buy Now
Questions 48

Maria works as a Software Developer for BlueWell Inc. She develops an application named App1 using Visual Studio .NET 2005. App1 contains several pages. Maria wants to use components that provide services and resources. She also wants to release the resources explicitly by the components. Which of the following methods will she use to accomplish this task?

Options:

A.

The Finalize method of the BackgroundWorker class

B.

The Dispose method of the BackgroundWorker class

C.

The Dispose method of the Component class

D.

The Finalize method of the Component class

Buy Now
Questions 49

Maria works as a Software Developer for MarcLync Inc. She creates an XML Web service, named MyWebService, using Visual Studio .NET. Maria wants to debug MyWebService. Therefore, she attaches a debugger to the Web service process. However, Maria notices that whenever MyWebService is executed, it throws an exception System.Net.WebException after a certain time period. The exception displays the message "The current operation has timed-out." Maria wants to modify the code in MyWebService. Which of the following actions will Maria take in order to resolve this issue?

Options:

A.

Set the timeout value for the MyWebService call to zero.

B.

Set the timeout value for the MyWebService call to false.

C.

Add an exception handling block.

D.

Set the timeout value for the MyWebService call to -1.

Buy Now
Questions 50

You work as an Enterprise Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET application using .NET Framework 3.5. You have already created a data contract for a WCF service and the ASP.NET Web application, which consumes the WCF service. The application has the following requirements:

l On low network bandwidth the serialized format of the data contract type should be minimum.

l The application uses AJAX to retrieve the data from the WCF service.

l Use the least amount of development effort.

What will you do?

Options:

A.

Use the XML format.

B.

Use the WPF format.

C.

Use the Binary Format Description format.

D.

Use the Java Script Notation format.

Buy Now
Questions 51

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create the definition for a Car class by using the following code segment:

public class Car {

[XmlAttribute(AttributeName = "category")]

public string CarType;

public string model;

[XmlIgnore]

public int year;

[XmlElement(ElementName = "mileage")]

public int miles;

public ConditionType condition;

public Car() {

}

public enum ConditionType {

[XmlEnum("Poor")] BelowAverage,

[XmlEnum("Good")] Average,

[XmlEnum("Excellent")] AboveAverage

}}

You create an instance of the Car class. You fill the public fields of the Car class as shown in the table below:

You are required to recognize the XML block that is produced by the Car class after serialization. Which of the following XML blocks represents the output of serializing the Car class?

Options:

A.

xmlns:xsi="http://www.w3.org/2002/XMLSchema-instance "

xmlns:xsd="http://www.w3.org/2002/XMLSchema "

category="sedan">

racer

15000

Excellent

B.

xmlns:xsi="http://www.w3.org/2002/XMLSchema-instance "

xmlns:xsd="http://www.w3.org/2002/XMLSchema "

category="sedan">

racer

15000

Excellent

C.

xmlns:xsi="http://www.w3.org/2002/XMLSchema-instance "

xmlns:xsd="http://www.w3.org/2002/XMLSchema ""

CarType="sedan">

racer

15000

AboveAverage

D.

xmlns:xsi="http://www.w3.org/2002/XMLSchema-instance "

xmlns:xsd="http://www.w3.org/2002/XMLSchema ">

sedan

racer

15000

Excellent

Buy Now
Questions 52

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. You create an application using .NET Framework. You need to establish a Secure Sockets Layer (SSL) session with a remote server. The security policy of the company requires that both the client and server to provide a valid certificate for authentication before communications begins. Which of the following properties of the SslStream class will you use to accomplish this task?

Options:

A.

SslStream.IsServer

B.

SslStream.IsMutuallyAuthenticated

C.

SslStream.IsAuthenticated

D.

SslStream.IsSigned

E.

SslStream.IsEncrypted

Buy Now
Questions 53

You work as a Software Developer for Mansoft Inc. The company uses Visual Studio.NET as its application development platform. You create an application, which will be used for e-commerce.

You want to ensure that the transactions are highly secured. For this purpose, you have to create a system to verify the identity of a potential customer. Which of the following security techniques will you use to accomplish this task?

Options:

A.

Spoofing

B.

Symmetric encryption

C.

Asymmetric encryption

D.

Digital certificate

Buy Now
Questions 54

Samantha works as a Software Developer for InfoWorld Inc. She develops a Web page named SalesReport.aspx for the employees of the company. However, she wants to ensure that all the requests for a particular employee are not stored on the server's memory. She also wants to ensure that no data is lost even after each user session has expired. Which of the following actions will Samantha take to accomplish the task?

Options:

A.

Use a cookieless session state for storing information.

B.

Use the profile properties feature for storing information.

C.

Use the application state for storing information.

D.

Use the session state with cookie for storing information.

Buy Now
Questions 55

George works as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. George creates an application using the .NET Framework. He writes the following code snippet in the application:

public class FirstClass

{

public static int test=500;

}

public class SecondClass : FirstClass

{

public static void Main(String[] args)

{

SecondClass mb=new SecondClass();

mb.MyMethod();

}

public void MyMethod()

{

//Appropriate statement

}

}

George wants to modify the value of the test variable in MyMethod to 1000. Which of the following code segments will he place in MyMethod to accomplish this task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

base.test=1000;

B.

test=1000;

C.

FirstClass.test=1000;

D.

test=1000.00;

Buy Now
Questions 56

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows Forms application using .NET Framework 3.5. The application contains a data-bound control. The user interface (UI) for modifying data from a LinqDataSource control is typically provided through the data-bound control. You are required to perform automatic data modifications. Which of the following conditions are required to enable automatic data modifications?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

The class that is assigned to the ContextTypeName property must derive from DataContext .

B.

The GroupBy property cannot be assigned a value.

C.

The property that is assigned to the TableName property must derive from Table(TEntity).

D.

The Where property cannot be assigned a value.

E.

The Select property cannot be assigned a value.

Buy Now
Questions 57

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an ASP.NET Web application using .NET Framework 3.5. You need to implement a system to monitor Service Level Agreement (SLA) compliance in the application. You are required to make a method to enable precise calculation of the time taken by all requests to process. What will you do to accomplish this?

Options:

A.

Implement a Timer component in the application. Calculate the elapsed time between the Start and Stop methods.

B.

Implement a base Web form for all the Web forms in the application. Calculate the elapsed time between the Load and Unload events.

C.

Create and register a custom HttpHandler.

D.

Create and register a custom HttpModule.

Buy Now
Questions 58

Charles works as a Web Developer for TechNet Inc. He develops an application named AdAgentsApp for advertising agents by using Visual Studio .NET. AdAgentsApp uses several Web services provided by the company. The employees in the IT department use only the existing port numbers 80 (HTTP protocol) and 443 (HTTPS protocol) for firewall security. However, they are forbidden to open any other new ports. These ports have been used to ensure the highest security level of authentication.

Which of the following actions should Charles take to maintain the highest security?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Use Windows Basic Authentication with SSL.

B.

Use Windows Digest Authentication.

C.

Use Custom Authentication.

D.

Send the encrypted information in SOAP headers.

E.

Use Windows Authentication with Client Certificates.

Buy Now
Questions 59

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. The application stores sensitive profile data in a SQL Server 2008 database. You are required to make sure that no profile data is stored in clear text. What will you do to accomplish the task?

Options:

A.

Use the Aspnet_regiis.exe tool to encrypt the connection string that is used to connect to the database.

B.

Create a custom profile provider and ensure that the provided information is encrypted before it is stored in the database.

C.

Enable the secure sockets layer encryption for the SQL Server connections.

D.

Use SQL Profiler.

Buy Now
Questions 60

John works as a Web Developer for ProLabs Inc. He develops an ASP.NET application, named

MyWebApp1, using Visual Studio .NET. One of the pages in the application is named as Page1.aspx, which does not need to maintain session state. To improve the performance of the application, John wants to disable session state for Page1. Which of the following actions will he take to accomplish the task?

Options:

A.

Set the EnableViewState attribute in the @ Page directive to false.

B.

Set the DisableSessionState attribute in the @ Page directive to true.

C.

In the sessionState configuration section of the application's Web.config file, set the mode attribute to off.

D.

Set the EnableSessionState attribute in the @ Page directive to false.

Buy Now
Questions 61

You work as a Software Developer for InfoTech Inc. You develop an application named MyApp that works as a scientific calculator. A user inputs data and retrieves the calculated results based on the input values. The application uses a SQL database that contains two tables. One table contains data related to standard calculation specifications and the other table stores input values entered by the user. You want to ensure that the user is able to retrieve appropriate data fast. Which of the following actions will you take to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Use more than one component to process input data.

B.

Write code that performs multiple tasks simultaneously.

C.

Run multiple processes on a single thread.

D.

Use a single component to process input data.

E.

Run multiple processes on separate threads.

Buy Now
Questions 62

You work as a Software Developer for InfoTech Inc. You create a Windows form in a Windows-based application named MyWinApp1. You use graphics in the form. You write the following code in your form:

private void MyMouseEvent1(object sender1, MouseEventArgs event)

{

// Code to handle mouse events

}

You want to implement a property of the MouseEventArgs object. This property will return a Point structure that contains the x-coordinate and y-coordinate of the mouse. Which of the following properties of the MouseEventArgs object will you use to accomplish this?

Options:

A.

Y

B.

Location

C.

Button

D.

X

E.

Delta

F.

Clicks

Buy Now
Questions 63

You work as a Software Developer for ManSoft Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You are creating a global application that will be used by all the branches of the company. You want to perform the encoding of Unicode characters with error detection capability. Which of the following classes will you use to accomplish the task?

Each correct answer represents a complete solution. Choose three.

Options:

A.

UTF8Encoding

B.

UnicodeEncoding

C.

UTF7Encoding

D.

UTF32Encoding

E.

ASCIIEncoding

Buy Now
Questions 64

Emily works as a Programmer in an Eye Research Center. The center keeps several records such as case history records for old patients and newly admitted patients, and records for outdoor patients. The Head of the Research Center wants Emily to generate reports for each outdoor patient with minimum network traffic. Emily develops an application named OutdoorPatientReport by using Visual Studio .NET. She needs to utilize the data repository as maintained by the center.

She wants to ensure that the application is displayed to all the doctors. Which of the following actions will Emily take to accomplish this task?

Options:

A.

Use Microsoft SQL Server stored procedures for data calculations.

B.

Implement a batch processing system for data calculations.

C.

Create more than one database for data manipulations.

D.

Use SQL Server indexes to optimize data calculations.

Buy Now
Questions 65

Mark works as a Software Developer for BlueWell Inc. The company uses Visual Studio .NET as its application development platform. He develops four applications using the .NET Framework.. All the four applications use an assembly named MyAssembly. He deploys the applications on the company's intranet. Later, Mark modifies MyAssembly and wants to ensure that all applications use the latest version of MyAssembly. What will he do to accomplish this?

Options:

A.

Modify the application configuration file of client computers.

B.

Modify the reference patch of client computers.

C.

Modify the machine configuration file of client computers.

D.

Modify the publisher policy configuration file containing a reference to client computers.

Buy Now
Questions 66

Which of the following is used, if a reference to an object is required to be made when it is passed from one application to another?

Options:

A.

Marshal By Reference object

B.

Singleton object

C.

SingleCall object

D.

Marshal By Value object

Buy Now
Questions 67

Andrew works as a Software Developer for BlueWell Inc. He develops a Windows-based application, named App1, using Visual Studio .NET. The application uses Microsoft SQL Server as a backend database. Andrew wants to perform security checks on App1. Which of the following statements regarding security checks are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Declarative security check works by instantiating security classes.

B.

Declarative security check works by assigning attributes to assemblies.

C.

Imperative security check works by instantiating security classes.

D.

Imperative security check works by assigning attributes to assemblies.

Buy Now
Questions 68

You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating a Web application using .NET Framework 2.0. The application will be used in Local Area Network (LAN). The Web application reads comma enclosed text files. The text files exist in a subdirectory under the Web application's root directory. You must ensure that users never directly navigate to these files in a Web browser if they are not members of the Accounting role. You are required to write an ASP.NET HTTP handler that will use the FileAuthorizationModule class. Which of the following forms of authentications will you use?

Options:

A.

Forms

B.

Mutual

C.

Microsoft Windows Integrated Security

D.

Anonymous

Buy Now
Questions 69

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. You create an ASP.NET application by using the .NET Framework 3.5. You need to implement a means to monitor Service Level Agreement (SLA) compliance in the application. You are required to identify a method to enable perfect calculation of the time that all requests take to process.

What will you do?

Options:

A.

Create and register a custom HttpModule.

B.

Use the IRequiresSessionState interface.

C.

Use the WebHttpBinding class.

D.

Create and register a custom HttpHandler.

Buy Now
Questions 70

You work as an ADO.NET Application Developer for ABC Inc. The company uses Microsoft Visual Studio .NET 2008 as its application development platform. You create an ADO.NET application by using .NET Framework 3.5. You write the following code in the application:

string tree = "ABC";

System.Reflection.MethodInfo addMethod = typeof(Dictionary).GetMethod("Add");

You need to create an ElementInit that represents calling Dictionary.Add(tree.Length, tree). Drag and drop the appropriate values to accomplish the task.

Options:

A.

Buy Now
Questions 71

You work as a Software Developer for ABC Inc. You create a Web page named MyWebForm1.aspx that displays a student's registration form. The page uses three CheckBox controls and several other Web server controls on the page. The CheckBox controls contain information about the educational qualifications. You want to ensure that a message containing educational status and relevant information is displayed as soon as a user clicks the CheckBox controls. Which of the following actions will you take to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Set the AutoPostBack property to false.

B.

Use the CheckedChanged event.

C.

Set the CausesValidation property to false.

D.

Set the CausesValidation property to true.

E.

Set the Checked property to true.

F.

Set the AutoPostBack property to true.

Buy Now
Questions 72

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows application using .NET Framework 3.5. The application captures account information. The account number has the following specifications:

l It holds literal and input characters of the alphanumeric type.

l It has a predefined format.

You must ensure that the account number is in the correct format. You must also ensure that only input characters are accepted from users. What will you do?

Options:

A.

Use a RichTextBox control and create a regular expression to validate the format.

B.

Use a TextBox control and bind it to a string that has the required format.

C.

Use a MaskedTextBox control and create a mask to validate the format.

D.

Use a TextBox control and create a regular expression to validate the format.

Buy Now
Questions 73

Jackson works as a Programmer for a life insurance company. He creates an application named App1 using Visual Studio .NET. App1 uses a SQL Server database named Database1. Jackson creates a SqlDataAdapter object named Data1 in App1. Jackson wants to ensure that the performance of App1 improves. Which of the following objects will he use in conjunction with the Data1 object when connecting to Database1?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

SqlConnection

B.

OleDbConnection

C.

SqlDataReader

D.

SqlCommand

Buy Now
Questions 74

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You create an ASP.NET Web application using the .NET Framework 3.5. The application uses Session objects. You are changing the application to run on a Web farm. You want to make sure that the application can access the Session objects from all the servers in the Web farm. You also make sure that when any server in the Web farm restarts or stops responding, the Session objects are not lost. What will you do?

Options:

A.

Use InProc Session Management mode to store session data in the ASP.NET worker process

B.

Use StateServer Session Management mode to store session data in a common State Server process on a Web server in the Web farm

C.

Use SQLServer Session Management mode to store session data in an individual database for each Web server in the Web farm

D.

Use SQLServer Session Management mode to store session data in a common Microsoft SQL Server 2005 database

Buy Now
Questions 75

You work as a Software Developer for ABC Inc. You create an ASP.NET Web application named MyWebApplication. You want to provide secure access to company's customers. You want to enable users to access the site from any browser by providing their user name and password. Which of the following authentication methods will you use to accomplish this task?

Options:

A.

Windows NT

B.

Secure Socket Layer

C.

Basic

D.

Single Sign-On

E.

Certificate Server

Buy Now
Questions 76

Adam works as a Software Developer for ABC Inc. He creates an ASP.NET application, named MyApp. During beta testing of MyApp, he ensures that both developers and beta testers see the actual text of error messages. Adam performs beta testing of other applications on the same test server. All the other applications display ASP.NET error messages. After completing beta testing, Adam promotes the beta test server to a production server. He wants all the applications to display a single, userfriendly error message. Adam also wants to configure MyApp and the production server to meet these goals. What will he do to accomplish the required task with minimum administrative effort?

Options:

A.

In the Web.config file for MyApp, add the following element:

B.

In the Machine.config file, add the following element:

C.

In the MyApp.config file, add the following element:

D.

In the MyApp.config file, add the following element:

E.

In the Web.config file for MyApp, add the following element:

F.

In the Machine.config file, add the following element:

Buy Now
Questions 77

Roger works as a Software Developer for BlackWell Inc. He develops an application, named MyApplication1, using Visual Studio .NET. The application contains a form, named MyForm1, which will be used to set a password for a user. A password allotted to a user will be case-sensitive. MyForm1 contains several controls including two TextBox controls, named txtPassword and txtConfirm, respectively. The txtMyPassword control is used to accept a string from a user. The string entered in txtPasword will be used as the password for the user. In txtConfirm, the user has to retype the string that he enters in txtPassword. This will ensure that there are no typing errors. MyForm1 also contains a Button control, named cmdSetPassword, which when clicked will set the password for the user.

Before setting the password for a user, Roger wants to ensure that the two text boxes contain the same string. In order to accomplish this, he decides to use the StrComp function. The password for a user can only be set if the StrComp function returns 0. He has not used an Option Compare statement in the code. Which of the following statements can Roger use to compare the two strings?

Each correct answer represents a complete solution. Choose two.

Options:

A.

StrComp(txtPassword.Text, txtConfirm.Text, CompareMethod.Binary)

B.

StrComp(txtPassword.Text, txtConfirm.Text, CompareMethod.Text)

C.

StrComp(txtPassword.Text, txtConfirm.Text, CompareMethod.CaseSensitive)

D.

StrComp(txtPassword.Text, txtConfirm.Text)

Buy Now
Questions 78

Mark works as a Software Developer for CyberNet Inc. He develops a serviced component, named MyComponent1, using Visual Studio .NET. MyComponent1 uses a SQL Server database. In the code, Mark uses the ExecuteNonQuery method of the SqlCommand class to execute a Transact- SQL statement. Which of the following values will the ExecuteNonQuery method return?

Options:

A.

A string type value

B.

A boolean type value

C.

An integer type value

D.

A double type value

Buy Now
Questions 79

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. You are using string datatype in the application to store text based information. You want to match character in a string in such a way that the match must occur at the point where the previous match ended. Which of the following characters will you use to accomplish the task?

Options:

A.

\z

B.

\b

C.

\Z

D.

\G

Buy Now
Questions 80

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Windows application using the .NET Framework. You create a database to maintain the record of the students. You create a table named Student. You want to retrieve names and roll number of those students whose age is less than ten years. An instance of the SqlCommand class named StudentCommand is already created. Which of the following code segments should you use to execute the query?

Options:

A.

StudentCommand.CommandType = CommandType.StoredProcedure;

StudentCommand.CommandText = "SELECT Name, Roll number FROM Student WHERE Age <

10";

B.

StudentCommand.CommandType = CommandType.StoredProcedure;

StudentCommand.CommandText = "Name and Roll number of students less than ten years";

C.

StudentCommand.CommandType = CommandType.Text;

StudentCommand.CommandText = "SELECT Name, Roll number FROM Student WHERE Age <

10";

D.

StudentCommand.CommandText = CommandText.Text;

StudentCommand.CommandType = "SELECT Name, Roll number FROM Student WHERE Age <

10";

Buy Now
Questions 81

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating a Windows Forms application using .NET Framework 3.5. You need to develop a new control for the application. You must ensure that the control inherits the TreeView control by adding a custom node tag and a highlight color. What will you do?

Options:

A.

Set the control's DrawMode property to OwnerDrawText, and then implement a custom DrawNode event handler.

B.

Set the control's DrawMode property to OwnerDrawAll, and then implement a custom DrawNode event handler.

C.

Write a code segment in the DrawNode event handler to give the highlight color.

D.

Override the OnPaint method.

Buy Now
Questions 82

Smith works as a Software Developer for BlueWell Inc. He develops a Web application named WebApp by using Visual Studio .NET. He wants to deploy WebApp on a target computer. He wants to take precautionary measures in the application so that no issues may arise while deploying it. Which of the following measures will Smith take to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Organize data in the application configuration files.

B.

Use a tracing feature to trace and gather information about each step in the program execu tion.

C.

Use a technique to avoid errors and to store error-related information.

D.

Use a debugger to step through the application code while it is running.

E.

Respond to health monitoring events in order to log performance and error-related conditio ns.

Buy Now
Questions 83

You work as a Software Developer for ABC Inc. You create an ASP.NET Web application named MyWebApplication. You want to provide secure access to company's customers. You want to enable users to access the site from any browser by providing their user name and password. Which of the following authentication methods will you use to accomplish this task?

Options:

A.

Windows NT

B.

Secure Socket Layer

C.

Basic

D.

Single Sign-On

E.

Certificate Server

Buy Now
Questions 84

ASP.NET version 2.0 health monitoring supports an __________.

Options:

A.

Event driven model

B.

Event provider model

C.

Event log model

D.

Event API model

Buy Now
Questions 85

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a class library using the .NET Framework. The library will be used to open the NSCs of computers. Later, you will set up the class library to the GAC and provide it Full Trust permission. You write down the following code segments for the socket connections:

SocketPermission permission = new SocketPermission(PermissionState.Unrestricted);

permission.Assert(); A number of the applications that use the class library may not have the necessary permissions to open the network socket connections. Therefore, you are required to withdraw the assertion. Which of the following code segments will you use to accomplish the task?

Options:

A.

permission.PermitOnly();

B.

CodeAccessPermission.RevertDeny();

C.

permission.Deny();

D.

CodeAccessPermission.RevertAssert();

E.

permission.Demand();

Buy Now
Questions 86

You work as a Software Developer for ABC Inc. You develop a multi-threaded application named MyMultThreadApp using Visual Studio .NET. The application logs all warning and informational messages in an event log that keeps track of significant events when the application is running. The event log records information that might be useful for troubleshooting or performance analysis. Which of the following are the considerations that you must keep in mind when logging events with multithreaded components?

Each correct answer represents a complete solution. Choose three.

Options:

A.

An exclusive lock should be obtained on the log to avoid race conditions.

B.

Each shared component should be thread-safe when interacting with an event log.

C.

The System.Threading namespace should be used to record the identity of each thread for logging messages.

D.

The Debug and Trace classes should be used to log events.

Buy Now
Questions 87

You work as a Software Developer for Hi-Tech Inc. You develop an application using Visual Studio .NET 2005. You create an unregistered COM DLL file named Com1.dll. You want to use this Com1.dll file in your application code. However, Com1.dll needs to be registered in the Windows Registry before it is used by the application. Which of the following tools will you use to accomplish the task?

Options:

A.

Wsdl.exe

B.

Regsvr32.exe

C.

Tlbimp.exe

D.

Disco.exe

Buy Now
Questions 88

Allen works as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. Allen creates an application that will be used to handle security information related to the company. He wants to secure the application by using the most secure authentication method. The method should have a strong key for encryption and send the encrypted password across the network. Which of the following authentication methods will Allen use to accomplish the task?

Options:

A.

Integrated Windows authentication

B.

Basic authentication

C.

Certificate-based authentication

D.

Digest authentication

Buy Now
Questions 89

Henry works as a Software Developer for SoftTech Inc. He creates a Windows form named

MyForm1. The form contains detailed information about a student. The form uses a ListBox control named ListBox1 that concatenates two strings displayed in two TextBox controls. Henry wants a method to return a value for the control. Which of the following options will he consider while creating a method for the control?

Options:

A.

A method with a string return type.

B.

A void method that passes only one parameter.

C.

A method with an integer return type.

D.

A void method that passes more than one parameter.

Buy Now
Questions 90

Which of the following is an exception of background threads as compared to foreground threads?

Options:

A.

A background thread does not continue the managed execution environment running.

B.

A background thread does not affect the outcome of an unhandled exception.

C.

A background thread belongs to the managed thread pool.

D.

A background thread changes to a foreground thread at any time.

Buy Now
Questions 91

You work as a Web Administrator for BlueWell Inc. The company's sales employees access the Web server from remote locations via the Internet using Netscape Navigator or Internet Explorer. You want to secure the Web server. To secure the Web server, you want to use cookieless forms authentication. Which of the following properties will you use to accomplish the task?

Options:

A.

FormsCookiePath

B.

CookieDomain

C.

CookieMode

D.

FormsCookieName

Buy Now
Questions 92

Which of the following classes limits the number of threads that can access a resource or pool of resources concurrently?

Options:

A.

Semaphore

B.

Mutex

C.

Thread

D.

Monitor

Buy Now
Questions 93

Which of the following techniques is used to transmit passwords during authentication?

Options:

A.

Asymmetric encryption

B.

Hashing

C.

Salted Hash

D.

Symmetric encryption

Buy Now
Questions 94

You work as a software developer for ManSoft Inc. The company uses Visual Studio .NET 2005 as its application development platform. You use C#. NET to create an assembly that will be consumed by other Visual Studio .NET applications. No Permissions should be granted to this assembly unless the assembly makes a minimum permission request. You need to write a code for the assembly that makes a minimum permission request. Which of the following code segments will you use to accomplish this task?

Options:

A.

[Assembly: PermissionSet(SecurityAction.PermitOnly, Unrestricted = true)]

B.

[Assembly: PermissionSet(SecurityAction.RequestOptional, Unrestricted = true)]

C.

[Assembly: PermissionSet(SecurityAction.PermitOnly, Unrestricted = false)]

D.

[Assembly: PermissionSet(SecurityAction.RequestOptional, Unrestricted = false)]

Buy Now
Questions 95

Bill works as a Software Developer for SunInfo Inc. He develops an application named SunApplication using C# .NET. The employees of the company use SunApplication for viewing and editing inventory data. SunApplication receives data from a file named MyFile.xml, which currently does not provide any information. Bill decides to write code to get information from the MyFile.xml file. Which of the following code segments will he use to resolve the issue?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

FileInfo FI = new FileInfo(@"c:\temp\MyFile.xml");

Console.WriteLine("Filename " + FI.FullName );

Console.WriteLine(" Created at " + FI.CreationTime );

Console.WriteLine(" Accessed at " + FI.LastAccessTime );

B.

FileInfo FI = new FileInfo ("@c:\program files\temp\MyFile.xml");

Console.WriteLine ("Filename " + FI.FullName );

Console.WriteLine(" Created at " + FI.CreationTime );

Console.WriteLine(" Accessed at " + FI.LastAccessTime );

C.

FileInfo FI = new FileInfo("MyFile.xml");

Console.WriteLine("Filename " + FI.FullName );

Console.WriteLine(" Created at " + FI.CreationTime );

Console.WriteLine(" Accessed at " + FI.LastAccessTime );

D.

string str=@"c:\windows\MyFile.xml";

FileInfo FI = new FileInfo (str);

FI.Open (FileMode.Open, FileAccess.Read);

Console.WriteLine("Filename " + FI.FullName );

Console.WriteLine(" Created at " + FI.CreationTime );

Console.WriteLine(" Accessed at " + FI.LastAccessTime );

Buy Now
Questions 96

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a class library using the .NET Framework. The library will be used to open the NSCs of computers. Later, you will set up the class library to the GAC and provide it Full Trust permission. You write down the following code segments for the socket connections:

SocketPermission permission = new SocketPermission(PermissionState.Unrestricted);

permission.Assert();

A number of the applications that use the class library may not have the necessary permissions to open the network socket connections. Therefore, you are required to withdraw the assertion. Which of the following code segments will you use to accomplish the task?

Options:

A.

permission.PermitOnly();

B.

CodeAccessPermission.RevertDeny();

C.

permission.Deny();

D.

CodeAccessPermission.RevertAssert();

E.

permission.Demand();

Buy Now
Questions 97

You work as an Application Developer for ABC Inc. You are assigned with developing a Web site that will handle information related to monthly sales of the company. You wish to secure the Web site so that only employees of the Accounts department can view the Web pages. You need to create roles for the employees of this department. The user account information will be stored in a SQL Server database named Database. You decide to do all this by using the Web Site Administration Tool. Which of the following types of security will you use to accomplish the task?

Options:

A.

Forms-based authentication

B.

Integrated Microsoft Windows authentication

C.

Basic authentication

D.

Digest authentication

Buy Now
Questions 98

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished development of an application using .NET Framework 2.0. The application has multiple threads that execute one after another. You want to modify the application and schedule the threads for execution based on their assigned priority. What will you do to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Use the Highest priority.

B.

Use the BelowNormal priority.

C.

Use the Normal priority.

D.

Use the Middle priority.

E.

Use the Lowest priority.

Buy Now
Questions 99

Patrick works as a Software Developer for GenTech Inc. He develops an application, named App1, using Visual C# .NET. He implements security using the security classes of the .NET Framework. He defines the following statements in the application:

PrincipalPermission Principal_Perm1 = new PrincipalPermission("Nick", "General

Manager");

PrincipalPermission Principal_Perm2 = new PrincipalPermission("Jack", "Accountant");

Patrick wants to check whether all demands that succeed for Principal_Perm1 also succeed for Principal_Perm2. Which of the following methods of the PrincipalPermission class will he use to accomplish this?

Options:

A.

Intersect

B.

IsSubSetOf

C.

IsUnrestricted

D.

Union

Buy Now
Questions 100

In which of the following objects are session variables stored?

Options:

A.

SessionStateStoreData

B.

SessionStateModule

C.

SessionStateItemCollection

D.

SessionStateStoreProviderBase

Buy Now
Questions 101

Sam works as a Software Developer for GenTech Inc. He develops an application named App1 using Visual Basic .NET. App1 uses a non-COM DLL named Value1.dll, which contains unmanaged code. Sam writes a method named Method1 in Value1.dll as follows:

Method1 Lib "Value1.dll"(ByVal InputVar As String, ByRef WordsVar As String, ByRef

NumbersVar As Integer) As Integer

Sam wants to use Method1 for parsing a string into an array of string values and an array of integers. Sam wants to enable App1 to call this function. Which of the following statements about the method are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The value of the first parameter cannot be changed by a procedure or a function.

B.

The second parameter will contain all string values found in the first parameter.

C.

The third parameter will contain all integer values found in the second parameter.

D.

The third parameter will contain all string values found in the second parameter.

Buy Now
Questions 102

You can use LINQ in an ASP.NET application through the LinqDataSource control, the __________ control, or by creating LINQ queries.

Options:

A.

ADO.NET DataSet

B.

ObjectDataSource

C.

SqlDataSource

D.

XmlDataSource

Buy Now
Questions 103

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an ASP.NET Web application using .NET Framework 3.5. The application will be deployed on an intranet server of the company. You require that the application meets the following requirements:

l Users can log on to the application by using their Active Directory credentials.

l Each Web page in the application must display user name and password controls for an unauthenticated user.

What will you do to accomplish this?

Options:

A.

Use Forms authentication and use the SqlMembershipProvider class.

B.

Use Forms authentication and use the ActiveDirectoryMembershipProvider class.

C.

Use Windows authentication and enable impersonation.

D.

Use Windows authentication and disable impersonation.

Buy Now
Questions 104

Hannah works as a Programmer in a college of Information Technology. The company uses Visual Studio .NET as its application development platform. The Dean of the college wants to obtain the performance report of each student. Hannah develops an application named StudentPerformanceReport by using Visual C# .NET. This application uses a SQL Server database named Database1 and a stored procedure named PROC1. PROC1 executes a query that returns the internal assessment result of each student.

Hannah uses a TextBox control named AssessmentText in the application form named MyForm. She wants to display the total test result of each student in the AssessmentText text box control.

StudentPerformanceReport uses a SqlCommand object to run PROC1. Hannah wants to write code to call PROC1. PROC1 contains an output parameter and displays its value as "@AssessmentResult" in text format. Which of the following code segments can Hannah use to accomplish this task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

AssessmentText.Text = comm.Parameters["@AssessmentResult"].SourceColumn;

B.

AssessmentText.Text = (string)comm.Parameters["@AssessmentResult"].Value;

C.

AssessmentText.Text = comm.Parameters["@AssessmentResult"].Value.ToString();

D.

AssessmentText.Text = comm.Parameters["@AssessmentResult"].ToString();

Buy Now
Questions 105

You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

Options:

A.

Cryptographic toolkit

B.

Cryptosystem

C.

Cryptographer

D.

Cryptanalyst

Buy Now
Questions 106

Which of the following classes will you use to specify that a string must be centered when drawn?

Options:

A.

StringAlignment

B.

StingFormat

C.

String

D.

LineAlignment

Buy Now
Questions 107

Which of the following provide simplified access to ASP.NET AJAX login, roles, and profile services from Windows Forms and WPF applications?

Options:

A.

Entity Framework

B.

AJAX application services

C.

Client application services

D.

Sync Framework

Buy Now
Questions 108

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished development of Web services using the .NET Framework. The access control to Web services is part of your accountability. You are currently revealing an existing class as a XML Web service. You are required to ensure that the XML Web service is exclusively accessible to Web service clients within the ABC Inc. domain. To fulfill this requirement you want to change the access modifiers on methods that must be represented as Web methods. What will you do to accomplish this task?

Options:

A.

Use the Public access modifier for each Web method.

B.

Use the Private access modifier for each Web method.

C.

Use the Internal or Friend access modifier for each Web method.

D.

Use the Protected access modifier for each Web method.

Buy Now
Questions 109

You work as a Software Developer for ABC Inc. The company has several branches Worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an applications using .NET Framework 2.0. You want to allow users to view various details of a given unmanaged code. What will you do to accomplish the task?

Options:

A.

Use a COM/DCOM server.

B.

Use the Dispinterface.

C.

Use the Makecert.exe.

D.

Use the dumpbin.exe.

Buy Now
Questions 110

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You need to write a code segment that transfers the contents of a byte array named ToSend by using a NetworkStream object named NetStr. You want to use a cache of size only 8,192 bytes. Which of the following code segments will you use to accomplish the task?

Options:

A.

MemoryStream MStream = new MemoryStream(8192);

NetStr.Write(ToSend, 0, (int) MStream.Length);

B.

BufferedStream BStream = new BufferedStream(NetStr);

BStream.Write(ToSend, 0, 8192);

C.

BufferedStream BStream = new BufferedStream(NetStr, 8192);

BStream.Write(ToSend, 0, ToSend.Length);

D.

MemoryStream MStream = new MemoryStream(8192);

MStream.Write(ToSend, 0, (int) NetStr.Length);

Buy Now
Questions 111

You work as a Software Developer for ManSoft Inc. The company uses Visual Studio.NET 2005 as its application development platform. You have recently created an application that includes the code shown below.

string str1 = "ABC";

string str2 = "u";

str2 += "Certify";

Console.WriteLine(str1 == str2);

Console.WriteLine((Object) str1 == (Object) str2);

Console.WriteLine(str1.Equals(str2));

What will be the output of the above code?

Options:

A.

False

False

False

B.

False

True

False

C.

True

True

True

D.

True

False

True

Buy Now
Questions 112

You work as a Software Developer for ABC Inc. You create a Console application to create multiple satellite assemblies. Which of the following statements about satellite assemblies are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

They do not contain any executable code.

B.

An application can have only one satellite assembly.

C.

The Assembly Linker tool is used to compile .resources files into satellite assemblies.

D.

They are used to deploy language-specific resources for an application.

Buy Now
Questions 113

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a class library using the .NET Framework. The library will be used to open the NSCs of computers. Later, you will set up the class library to the GAC and provide it Full Trust permission. You write down the following code segments for the socket connections:

SocketPermission permission = new SocketPermission(PermissionState.Unrestricted);

permission.Assert();

A number of the applications that use the class library may not have the necessary permissions to open the network socket connections. Therefore, you are required to withdraw the assertion. Which of the following code segments will you use to accomplish the task?

Options:

A.

permission.PermitOnly();

B.

CodeAccessPermission.RevertDeny();

C.

permission.Deny();

D.

CodeAccessPermission.RevertAssert();

E.

permission.Demand();

Buy Now
Questions 114

The element does not apply to errors that occur in __________.

Options:

A.

XML Web services

B.

Windows services

C.

Web services directory

D.

Web services

Buy Now
Questions 115

You work as a Software Developer for Mansoft Inc. You create an application and use it to create users as members of the local Users group. Which of the following code snippets imperatively demands that the current user is a member of the local Users group?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

System.AppDomain.CurrentDomain.SetPrincipalPolicy(PrincipalPolicy.WindowsPrincipal);

PrincipalPermission MyPermission = new PrincipalPermission(null, @"BUILTIN\Users", true);

MyPermission.Demand();

B.

System.AppDomain.CurrentDomain.SetPrincipalPolicy(PrincipalPolicy.WindowsPrincipal);

PrincipalPermission MyPermission = new PrincipalPermission(null, @"Users", true); MyPermission.Demand();

C.

PrincipalPermission MyPermission = new PrincipalPermission(null, @"BUILTIN\Users", true); MyPermission.Demand();

D.

PrincipalPermission MyPermission = new PrincipalPermission(null, @"Users", true); MyPermission.Demand();

Buy Now
Questions 116

You work as an Enterprise Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a logging utility class using .NET Framework 3.5. The utility class writes logs to event log services. You are required to ensure that the client applications that use the utility class can create an instance of the utility class only if they have access rights to write to the event log services.

What will you do?

Options:

A.

Use role based security in the class constructor.

B.

Use declarative security check on the assembly.

C.

Use role based security on the class.

D.

Use code access security on the class.

Buy Now
Questions 117

You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create an ASP.NET Web application using the .NET Framework. The application is installed in a Network Load Balancing cluster. You are evaluating a bug statement. When a failure takes place in the Web application, the client occasionally gets an error page as anticipated. At other times, the client gets an exception stack with the error message, which is not anticipated. You are required to find out the configuration setting that causes the unanticipated error.

Which of the following configuration settings causes the unanticipated error?

Options:

A.

B.

C.

D.

Buy Now
Questions 118

You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Web application using .NET Framework 2.0. You add a Web Form that contains a button named bCancel. The button allows users to exit the form. When users click the button, validation should not occur. However, during testing you find that clicking the button does not allow users to exit the form. You need to ensure that users can always exit the page. What will you do?

Options:

A.

Set the CausesValidation property of the bCancel button to false.

B.

Set the AccessibleName property of the validation controls on the Web Form to "false".

C.

Set the ControlToValidate property of the validation controls on the Web Form to the ID of the control.

D.

Set the Enabled property of the validation controls on the Web Form to false.

Buy Now
Questions 119

You work as a Database Administrator for ABC Inc. The company has a SQL Server 2000 computer. One of the databases on the server contains a table named Employees, for storing information about employees in the company. There are two employees, Joe and Rick, to whom you want to give additional responsibilities. You want Joe to be allowed to modify only the E-mail column of the table, and Rick should be allowed to modify only the Salary column of the table. Neither Joe nor Rick should be allowed to have permission on the Employees table.

You want to ensure that the above rule is followed strictly. What will you do to accomplish this?

Options:

A.

Create a user-defined function to modify data.

B.

Create a RULE on both the columns.

C.

Create a stored procedure to modify data

D.

Create a CHECK constraint on both the columns.

Buy Now
Questions 120

You work as an Enterprise Application Developer for Mansoft Inc. You are participating in the

design for a Web-based Order Management System. There are a few configuration options, such as applicable tax percentage, repeat customer discount percentage, etc., which are applicable to all the users of the Order Management System. However, these configuration options might be changed in the future. Which of the following techniques will you use to maintain this information from the performance and maintenance point of view?

Options:

A.

Application state

B.

Database support

C.

Profile properties

D.

Session state

Buy Now
Questions 121

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You create an ASP.NET Web application using the .NET Framework 3.5. The application contains a data-bound control. The user interface (UI) for modifying data from a LinqDataSource control is typically provided through the data-bound control. You are required to perform automatic data modifications. Which of the following conditions are required to enable automatic data modifications?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

The class that is assigned to the ContextTypeName property must derive from DataContext .

B.

The Where property cannot be assigned a value.

C.

The GroupBy property cannot be assigned a value.

D.

The Select property cannot be assigned a value.

E.

The property that is assigned to the TableName property must derive from Table(TEntity).

Buy Now
Questions 122

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows Forms application using .NET Framework 3.5. You need to execute a method named ProcAmount in the background of the application. The method requires that an integer value 101 is passed to it. You are required to pass an integer value 101 to start a background thread. Which of the following code segments should you use?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

thd.Start(101);

B.

ParameterizedThreadStart tStart; tStart = new ParameterizedThreadStart(ProcAmount);

Thread thd = new Thread(tStart);

C.

thd.Start();

D.

ThreadStart tStart = new ThreadStart(ProcAmount);

Thread thd = new Thread(tStart, 101);

Buy Now
Questions 123

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You have recently finished development of a Windows application using .NET Framework. Users report that the application is not running properly. When the users try to complete a particular action, the following error message comes out:

Unable to find assembly 'myservices, Version=1.0.0.0, Culture=neutral,

PublicKeyToken=29b5ad26c9de9b95'.

You notice that the error occurs as soon as the application tries to call functionality in a serviced component that was registered by using the following command:

regsvcs.exe myservices.dll

You must make sure that the application can call the functionality in the serviced component with no exceptions being thrown. What will you do to accomplish this task?

Options:

A.

Run the command line tool: regasm.exe myservices.dll.

B.

Copy the serviced component assembly into the C:\Program Files\ComPlus Applications fold er.

C.

Run the command line tool: gacutil.exe /i myservices.dll.

D.

Copy the serviced component assembly into the C:\WINDOWS\system32\Com folder.

Buy Now
Questions 124

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows application using .NET Framework 3.5. The application will process one million records in a production environment. Therefore, you need to test the application by using 7,500 records in a limited test environment to identify potential problems that might arise when the application is moved to the production environment. What will you do?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Test the resource files.

B.

Test the thread pool pattern usage.

C.

Test the collection type usage.

D.

Test the number of MSI files used for deployment.

Buy Now
Questions 125

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. The application is hosted on Microsoft Windows Server 2008. Only FTP access is available to the server. You need to improve the searching of the pages in the search engines by taking action to URLs that do not have an .aspx file extension. You must ensure that all pages as well as static content can also be requested. What will you do to accomplish this?

Options:

A.

Use an HttpHandler object.

B.

Use a Request object.

C.

Use an HttpModule object.

D.

Use an ISAPI filter.

Buy Now
Questions 126

Maria works as a Software Developer for MaryLync Inc. She develops an application using Visual C# .NET, for National Stock Broker Inc. The application is used to handle sales and purchase of shares. She wants to ensure that whenever an error occurs in the code, the user is directed to an error page called error1.aspx. She writes a class named StockBroker that contains the code for real stock application. Which of the following attributes of the @ Page directive should she use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Inherits

B.

Description

C.

ErrorPage

D.

Culture

Buy Now
Questions 127

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating an application for a Bank using the .NET Framework. You create a method that gets the images of cancelled checks and displays them. You presently have access to a method that reads the images from a SQL server database as a sequence of bytes. You need to transfer the image from the SQL server database to a form with the least amount of temporary buffers and files. Which of the following classes will you use to accomplish this task?

Options:

A.

FileStream

B.

NetworkStream

C.

BufferedStream

D.

MemoryStream

Buy Now
Questions 128

You work as a Software Developer for ABC Inc. You create a Web service named MyWebService using Visual Studio .NET. You implement a public Web method. You make the method accessible through a Web service application by attaching the WebMethod attribute to the public method. The public method is stored in the class file of the Web service file. When you create a Web service project using the Web service project template, by default, one public method named HelloWorld is created. The HelloWorld public method does not become available through the Web service until you attach the WebMethod attribute. The method must be applied to each method declaration. Now, you want to configure a Web service method. You want to ensure that the Web method performs updates on more than one databases or if the sequence of updates is critical to the overall success of the Web method. Which of the following properties will you use to accomplish this task?

Options:

A.

TransactionOption

B.

Description

C.

BufferResponse

D.

EnableSession

Buy Now
Questions 129

Mark works as a Web Developer for TechCom Inc. He creates an ASP.NET application named

Application1 by using Visual Studio .NET. Only registered users of the company will be able to use the application. The application contains a page named UserAcc.aspx that allows new users to register themselves to the registered users' list of the company. The UserAcc page contains several text box controls that accept users' personal details such as user name, password, home address, zip code, phone number, etc. One of the text box controls on the page is named ZipProperty in which a user enters a zip code.

Mark wants to ensure that when a user submits the UserAcc page, ZipProperty must contain five numeric digits. Which of the following validation controls will he use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

RequiredFieldValidator

B.

RangeValidator

C.

CompareValidator

D.

RegularExpressionValidator

E.

RequiredValidator

Buy Now
Questions 130

You work as a Software Developer for ABC Inc. The company has several branches Worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an applications using .NET Framework 2.0. You want to allow users to view various details of a given unmanaged code. What will you do to accomplish the task?

Options:

A.

Use the dumpbin.exe.

B.

Use a COM/DCOM server.

C.

Use the Makecert.exe.

D.

Use the Dispinterface.

Buy Now
Questions 131

You work as a Software Developer for ABC Inc. You develop an application using Visual Studio .NET 2005. You want to print the contents of a document named MyFile1.doc located on the local computer. Therefore, you use the printing controls in the application. Which of the following events will you use in the application code to accomplish the task?

Options:

A.

BeginPrint

B.

QueryPageSettings

C.

PrintPage

D.

EndPrint

Buy Now
Questions 132

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a Web service using .NET Framework 2.0. You want the Web service to utilize a two step process to map XML generated by Web methods to .NET objects. What will you do to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Use deserialization

B.

Use serialization

C.

Use Marshal-by-ref objects

D.

Use Marshal-by-value objects

Buy Now
Questions 133

You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Web application using .NET Framework 2.0. You configure the application at the following levels:

l Root Web

l Web application root directory

l Web site

l Web application subdirectory

In which of the following files will these levels be stored?

Options:

A.

Proxy auto-config

B.

ApplicationName.config

C.

Manhine.config

D.

Web.config

Buy Now
Questions 134

You work as a Software Developer for ABC Inc. You create a Web page named MyWebPage that displays detailed information of a registered user. The page contains a TextBox Web server control that requires the RangeValidator validation control to validate whether the user has entered the correct date of birth. A validation error message is displayed if the user has entered the value, which is greater than the date of registration. However, you want to ensure that the validation control on the Web page does not occupy any space, but share the same location for the display of error messages on the Web page. You also want to ensure that the layout of the Web page is changed when the error message is displayed. Which of the following actions will you take to accomplish the task?

Options:

A.

Design the Dynamic layout of the Web page.

B.

Implement the ValidationSummary control instead of the RangeValidator control.

C.

Design the Static layout of the Web page.

D.

Design the None layout of the Web page.

Buy Now
Questions 135

Hannah works as a Programmer in a college of Information Technology. The company uses Visual Studio .NET as its application development platform. The Dean of the college wants to obtain the performance report of each student. Hannah develops an application named StudentPerformanceReport by using Visual C# .NET. This application uses a SQL Server database named Database1 and a stored procedure named PROC1. PROC1 executes a query that returns the internal assessment result of each student. Hannah uses a TextBox control named AssessmentText in the application form named MyForm. She wants to display the total test result of each student in the AssessmentText text box control. StudentPerformanceReport uses a SqlCommand object to run PROC1. Hannah wants to write code to call PROC1. PROC1 contains an output parameter and displays its value as "@AssessmentResult" in text format. Which of the following code segments can Hannah use to accomplish this task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

AssessmentText.Text = (string)comm.Parameters["@AssessmentResult"].Value;

B.

AssessmentText.Text = comm.Parameters["@AssessmentResult"].SourceColumn;

C.

AssessmentText.Text = comm.Parameters["@AssessmentResult"].ToString();

D.

AssessmentText.Text = comm.Parameters["@AssessmentResult"].Value.ToString();

Buy Now
Questions 136

George works as a Software Developer for GenTech Inc. He creates an application named App1 using Visual Studio .NET. App1 uses the version 2.0.0.0 of an assembly named Assembly1. However, he wants App1 to use a new version i.e. 2.1.0.0 of Assembly1. Therefore, he needs to specify Assembly1's location so that App1 can use version 2.1.0.0 of Assembly1. What will George use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

An unmanaged code.

B.

A managed code.

C.

The element.

D.

The element.

Buy Now
Questions 137

You work as a Software Developer for ManSoft Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You create an application that will be used by all the branches of the company. You want to use declarative attributes that configure security for a serviced component of the application. Which of the following attributes will you use in order to support component, interface, or method level role checks?

Options:

A.

SecureMethod

B.

ComponentAccessControl

C.

SecurityRole

D.

ApplicationAccessControl

Buy Now
Questions 138

Martin works as a Software Developer for BlueWell Inc. He creates an ASP.NET application, named App1. During beta testing of App1, he ensures that the actual ASP.NET error messages are displayed whenever errors are encountered. He also ensures that both developers and beta testers see the actual text of the error messages.

During beta testing of App1, Martin performs beta testing of other applications also on the same test server. All the other applications display the ASP.NET error messages. After completing beta testing, Martin promotes the beta test server to a production server. He wants all the applications to display a single, user-friendly error message. Martin also wants to configure App1 and the production server to meet these goals. He removes the customErrors element from the Web.config file for App1. What else will he do to accomplish the required task with minimum administrative effort?

Options:

A.

In the Web.config file for App1, add the following element:

B.

In the App1.config file, add the following element:

C.

In the App1.config file, add the following element:

D.

In the Machine.config file, add the following element:

E.

In the Machine.config file, add the following element:

F.

In the Web.config file for App1, add the following element:

Buy Now
Questions 139

You work as an Enterprise Application Developer for SunInfo Inc. The company uses Visual Studio 2008 as its application development platform. You create a Web application using .NET Framework 3.5. You use cross-page posting to redirect users to another page. You want to access the public property values from the source page in the target page. Which of the following actions can you perform to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Include an @PreviousPageType directive in the target page. Set the VirtualPath attribute to the path of the source page and set the TypeName attribute to the type name of the previous page.

B.

Include an @Master directive in the target page.

C.

Include an @PreviousPageType directive in the target page and set the VirtualPath attribute to the path of the source page.

D.

Include an @Register directive in the target page that references the source page.

Buy Now
Questions 140

Ross works as a Software Developer for GenTech Inc. He develops a Windows-based application using Visual Studio .NET. He uses the Write method of the Debug and Trace classes to record information about the execution of the application in Windows 2000 event log. Ross performs integration testing on the application. He wants to ensure that only one entry is made to the event log, each time a call is made to the Write method of either class. Which of the following code will he use to accomplish this?

Each correct answer represents a complete solution. Choose two.

Options:

A.

EventLogTraceListener RossTraceListener = new EventLogTraceListener("RossEventLogSource");

Trace.Listeners.Add(RossTraceListener);

B.

EventLogTraceListener RossDebugListener = new EventLogTraceListener("RossEventLogSource");

Debug.Listeners.Add(RossDebugListener);

C.

EventLogTraceListener RossTraceListener = new EventLogTraceListener("RossEventLogSource");

Debug.Listeners.Add(RossTraceListener);

Trace.Listeners.Add(RossTraceListener);

D.

EventLogTraceListener RossDebugListener = new EventLogTraceListener("RossEventLogSource");

EventLogTraceListener RossTraceListener = new EventLogTraceListener("RossEventLogSource");

Debug.Listeners.Add(RossDebugListener);

Trace.Listeners.Add(RossTraceListener);

Buy Now
Questions 141

Julia works as a Software Developer for Mansoft Inc. She develops an application using Visual Studio .NET. The application uses a method named MyMethod, which is located in an unmanaged DLL. Julia wants MyMethod to require the application to allocate unmanaged memory, fill the data, and pass the memory address to the application. She also wants to ensure that on returning from MyMethod, the application de-allocates the unmanaged memory. What will Julia do to accomplish the task?

Options:

A.

Use the methods of the MemoryStream class.

B.

Derive a new class from the Stream class, and override the allocation methods.

C.

Use the Marshal class.

D.

Use a byte array.

Buy Now
Questions 142

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an ASP.NET Web application using .NET Framework 3.5. The application will be accessed by users from remote locations over the Internet. You need to use ASP.NET role management. You must ensure that any authorization information cached on remote client computers is as secure as possible. What will you do?

Options:

A.

Use the RsaProtectedConfigurationProvider class.

B.

Use the DpapiProtectedConfigurationProvider class.

C.

Set the cookieProtection attribute to Validation in the roleManager element of the Web.conf ig file.

D.

Set the cookieProtection attribute to Encryption in the roleManager element of the Web.con fig file.

Buy Now
Questions 143

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a method to hash data with the Secure Hash Algorithm (SHA) using .NET Framework. The hash data is passed to the method as a byte array named msg. You are required to calculate the hash of the msg array by using the SHA1. It is also mandatory to place the result into a byte array named Myhash. Which of the following code segments should you use to accomplish the task?

Options:

A.

SHA1 Mysha1 = new SHA1CryptoServiceProvider();

Mysha1.GetHashCode();

byte[] Myhash = Mysha1.Hash;

B.

SHA1 Mysha1 = new SHA1CryptoServiceProvider();

byte[] Myhash = null;

Mysha1.TransformBlock(msg, 0, msg.Length, Myhash, 0);

C.

SHA1 Mysha1 = new SHA1CryptoServiceProvider();

byte[] Myhash = BitConverter.GetBytes(Mysha1.GetHashCode());

D.

SHA1 Mysha1 = new SHA1CryptoServiceProvider();

byte[] Myhash = Mysha1.ComputeHash(msg);

Buy Now
Questions 144

You work as an ADO.NET Application Developer for ABC Inc. The company uses Microsoft Visual Studio .NET 2008 as its application development platform. You create an ADO.NET application by using .NET Framework 3.5. You are using the System.Linq.Expressions namespace. You need to specify an expression that applies a delegate or lambda expression to a list of argument expressions. Which of the following classes will you use to accomplish the task?

Options:

A.

ListInitExpression

B.

InvocationExpression

C.

MemberAssignment

D.

NewArrayExpression

Buy Now
Questions 145

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating an assembly. The assembly contains a public method. The Global Assembly Cache contains a second assembly. You require that the public method is only called from the second assembly. Which of the following permission classes will you use to accomplish this task?

Options:

A.

DataProtectionPermission

B.

DBDataPermission

C.

StrongNameIdentityPermission

D.

GacIdentityPermission

E.

PublisherIdentityPermission

Buy Now
Questions 146

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Windows application using the .NET Framework. The application contains many controls. You add an ErrorProvider component named errorPro and a DateTimePicker control named datePick to the application. You are required to configure the application to display an error notification icon next to datePick when a user enters a date that is greater than today's date. What will you do to accomplish this task?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Create an event handler named verifyDate for the Validating event of datePick.

B.

Create an event handler named verifyDate for the Validated event of datePick.

C.

In the verifyDate event handler, call errorPro.SetError(datePick, "Date is greater then today's date") if the value of datePick value is greater than today's date.

D.

In the verifyDate event handler, call errorPro.SetError(datePick, "") if the datePick.Value is greater than today's date.

Buy Now
Questions 147

You work as a Software Developer for Mansoft Inc. You create an application using Visual Studio .NET 2005. You write code in the application and execute it, but it caused an error. Now, you want to find out the reason that has thrown the exception. Which of the following properties will you use to accomplish this task?

Options:

A.

Source

B.

StackTrace

C.

Message

D.

Data

E.

TraceSwitch

Buy Now
Exam Code: GSSP-.NET
Exam Name: GIAC GIAC Secure Software Programmer - C#.NET
Last Update: Sep 15, 2025
Questions: 491
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now GSSP-.NET