Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

GIAC GSSP-NET-CSHARP Exam - Cheat-Test.com

Free GSSP-NET-CSHARP Sample Questions:

Q: 1
You work as a Software Developer for XXYY Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. You create a Web form in the application that permits users to provide personal information. You add a DropDownList control to the Web form to retrieve the residential status of users. The default item that the DropDownList control displays is the "Select Country" option. You have to ensure that users select a country other than the default option. Which of the following validation controls should you use to accomplish this task?
A. RangeValidator
B. RequiredFieldValidator
C. CustomValidator
D. RegularExpressionValidator
Answer: B

Q: 2
You work as a Software Developer for XXYY Inc. The company uses Visual Studio .NET 2005 as its application development platform. You create an application for the company. You need to validate the phone number passed to a class as a parameter in the application. Which of the following is the most effective way to verify that the format of the data matches a phone number?
A. Regular expressions
B. Nested If statements
C. Use the String.Length property
D. A try/catch block
Answer: A

Q: 3
You work as a Software Developer for XXYY Inc. The company uses Visual Studio .NET 2005 as its application development platform. You have recently finished development of a Windows application using .NET Framework. Users report that the application is not running properly. When the users try to complete a particular action, the following error message comes out:
Unable to find assembly 'myservices, Version=1.0.0.0, Culture=neutral,
PublicKeyToken=29b5ad26c9de9b95'.
You notice that the error occurs as soon as the application tries to call functionality in a serviced component that was registered by using the following command:
regsvcs.exe myservices.dll
You must make sure that the application can call the functionality in the serviced component with no exceptions being thrown. What will you do to accomplish this task?
A. Run the command line tool: regasm.exe myservices.dll.
B. Copy the serviced component assembly into the C:\Program Files\ComPlus Applications fold er.
C. Run the command line tool: gacutil.exe /i myservices.dll.
D. Copy the serviced component assembly into the C:\WINDOWS\system32\Com folder.
Answer: C

Q: 4
Allen works as a Software Developer for XXYY Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework. He wants to encrypt all his e-mails that he sends to anyone. Which of the following will he use to accomplish the task?
A. PPP
B. FTP
C. PPTP
D. PGP
Answer: D

Q: 5
You work as a Software Developer for XXYY Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?
A. Cryptographic toolkit
B. Cryptosystem
C. Cryptographer
D. Cryptanalyst
Answer: B

Q: 6
You work as a Software Developer for XXYY Inc. The company uses Visual Studio .NET as its application development platform. You create a class library using the .NET Framework. The library will be used to open the NSCs of computers. Later, you will set up the class library to the GAC and provide it Full Trust permission. You write down the following code segments for the socket connections:
SocketPermission permission = new SocketPermission(PermissionState.Unrestricted);
permission.Assert();
A number of the applications that use the class library may not have the necessary
permissions to
open the network socket connections. Therefore, you are required to withdraw the assertion. Which of the following code segments will you use to accomplish the task?
A. permission.PermitOnly();
B. CodeAccessPermission.RevertDeny();
C. permission.Deny();
D. CodeAccessPermission.RevertAssert();
E. permission.Demand();
Answer: D

Q: 7
You work as an Application Developer for XXYY Inc. You are assigned with developing a Web site that will handle information related to monthly sales of the company. You wish to secure the Web site so that only employees of the Accounts department can view the Web pages. You need to create roles for the employees of this department. The user account information will be stored in a SQL Server database named Database. You decide to do all this by using the Web Site Administration Tool. Which of the following types of security will you use to accomplish the task?
A. Forms-based authentication
B. Integrated Microsoft Windows authentication
C. Basic authentication
D. Digest authentication
Answer: A

Q: 8
You work as a Software Developer for ManSoft Inc. The company uses Visual Studio.NET 2005 as its application development platform. You have recently created an application that includes the code shown below.
string str1 = "XXYYinc";
string str2 = "u";
str2 += "Certify";
Console.WriteLine(str1 == str2);
Console.WriteLine((Object) str1 == (Object) str2);
Console.WriteLine(str1.Equals(str2));
What will be the output of the above code?
A. False
False
False
B. False
True
False
C. True
True
True
D. True
False
True
Answer: D

Q: 9
What is the main purpose of a try-catch block?
A. To obtain and use resources that are being caught.
B. To signal the occurrence of an exception during the program execution.
C. To catch and handle an exception generated by an executable code.
D. To ensure that the necessary cleanup of external resources is done immediately.
Answer: C

Q: 10
You work as a Software Developer for XXYY Inc. The company uses Visual Studio.NET 2008 as its application development platform. You create an ASP.NET Web application using the .NET Framework 3.5. The application contains two HTML pages named Error.htm and PageNotFound.htm. You want to make sure that the following requirements are met:
l When any user requests a page that does not exist, the PageNotFound.htm page is displayed.
l When any other error occurs, the Error.htm page is displayed. Which of the following code segments will you add to the Web.config file to accomplish this task?
A. <customErrors mode="On" defaultRedirect="Error.htm">
<error statusCode="404" redirect="PageNotFound.htm"/>
</customErrors>
B. <customErrors mode="Off">
<error statusCode="400" redirect="Error.htm"/>
<error statusCode="404" redirect="PageNotFound.htm"/>
</customErrors>
C. <customErrors mode="On">
<error statusCode="400" redirect="Error.htm"/>
<error statusCode="404" redirect="PageNotFound.htm"/>
</customErrors>
D. <customErrors mode="Off" defaultRedirect="Error.htm">
<error statusCode="404" redirect="PageNotFound.htm"/>
</customErrors>
Answer: A

Q: 11
You work as a Software Developer for XXYY Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an ASP.NET Web application using .NET Framework 3.5. The application will be used to share any type of photos on Internet. All the photos should be accessible in various sizes and formats. You need to add a download feature that can be easily maintained. You also need to make sure that only a single version of all photos is stored on a SQL server database. What will you do?
A. Create an HttpModule class to determine the request for the photo download. Process the photo
according to the given format and size, and after that return the processed photo in the response.
B. Create a user control that converts the photo to the required format and size.
C. Create an HttpHandler class to determine the request for the photo download. Process the photo according to the given format and size, and after that return the processed photo in the response.
D. Create an ActiveX control that converts the photo to the required format and size.
Answer: C

Q: 12
You work as a Software Developer for XXYY Inc. The company uses Visual Studio.NET 2008 as its application development platform. You have recently finished development of an ASP.NET Web application using the .NET Framework 3.5. You host the application on a Web farm that consists of three Web servers. You should configure the ASP.NET application for session state to meet the following requirements:
l Session state data should not be lost if a server fails.
l Session state must be maintained across browser requests by the same user.
You are required to configure the Web.config file to meet these requirements. Which of the following configurations will you use?
A. <sessionState mode="StateServer"/>
B. <sessionState mode="InProc"/>
C. <sessionState mode="Custom"/>
D. <sessionState mode="SQLServer"/>
Answer: D

Q: 13
You work as a Software Developer for XXYY Inc. The company has several branches worldwide. The company uses Visual Studio .NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. The application will be used by all the branches of the company. You are using the CompareInfo class for culture-sensitive string comparisons. You write the following code in the application:
String s1 = "C rtify";
String s2 = "c rtify";
String s3 = "c rtify";
You need to compare the s1 string with the s2 string and ensure that the string comparison must ignore case. Which of the following code segments will you use to accomplish the task?
A. CompareInfo cmp = CultureInfo.InvariantCulture.CompareInfo;
Console.WriteLine(cmp.Compare(s1, s2, CompareOptions.IgnoreCase));
B. CompareInfo cmp = CultureInfo.InvariantCulture.CompareInfo;
Console.WriteLine(cmp.Compare(s1, s2, CompareOptions.None));
C. CompareInfo cmp = CultureInfo.InvariantCulture.CompareInfo;
Console.WriteLine(cmp.Compare(s1, s2, CompareOptions.Ordinal));
D. CompareInfo cmp = CultureInfo.InvariantCulture.CompareInfo;
Console.WriteLine(cmp.Compare(s1, s2, CompareOptions.OrdinalIgnoreCase));
Answer: A

Q: 14
Andrew works as a Software Developer for Mansoft Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to enhance the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use?
Each correct answer represents a complete solution. Choose two.
A. Symmetric
B. Secret
C. IPSec
D. Asymmetric
Answer: A, D

Q: 15
You work as a Software Developer for Mansoft Inc. You create an application and use it to create code access security policies. Which of the following tools will you use to examine and modify code access security policies from a batch file?
A. Tlbimp.exe
B. GacUtil.exe
C. Sn.exe
D. Caspol.exe
E. StoreAdm.exe
Answer: D

Q: 16
You can use LINQ in an ASP.NET application through the LinqDataSource control, the __________ control, or by creating LINQ queries.
A. ADO.NET DataSet
B. ObjectDataSource
C. SqlDataSource
D. XmlDataSource
Answer: B

Q: 17
Which of the following techniques is used to transmit passwords during authentication?
A. Asymmetric encryption
B. Hashing
C. Salted Hash
D. Symmetric encryption
Answer: C

Q: 18
Which of the following session and instancing modes will you set if you require a sessionfull binding and want to create a new instance object for each client request?
A. Set SessionMode to Allowed and IntsanceMode to PerSession.
B. Set SessionMode to Required and IntsanceMode to Single.
C. Set SessionMode to Required and IntsanceMode to PerCall.
D. Set SessionMode to Allowed and IntsanceMode to PerCall.
Answer: C

Q: 19
In .NET Framework 3.5, you can create and access values that persist from one application session to another. What are these values called?
A. Objects
B. Settings
C. Properties
D. Attributes
Answer: B

Q: 20
Session variables can be any valid __________.
A. .NET Framework type
B. Integer type
C. SessionStateItemCollection object
D. Object type
Answer: A

Q: 21
In which of the following objects are session variables stored?
A. SessionStateStoreData
B. SessionStateModule
C. SessionStateItemCollection
D. SessionStateStoreProviderBase
Answer: C

Q: 22
Which of the following utilities is used to encrypt credentials and session state connection strings?
A. Aximp.exe
B. Aspnet_regiis.exe
C. Aspnet_compiler.exe
D. Aspnet_setreg.exe
Answer: D

Q: 23
Which of the following modifiers is not available in C#?
A. private
B. friend
C. internal
D. public
E. protected
Answer: B

Q: 24
Which of the following classes will you use to specify that a string must be centered when drawn?
A. StringAlignment
B. StingFormat
C. String
D. LineAlignment
Answer: B

Q: 25
Which of the following is a reference type in Visual C#?
A. primitive types
B. strings
C. enums
D. structures
Answer: B

Q: 26
Which of the following data structures is used for storing reference data types?
A. Stack
B. Queue
C. Hard disk
D. Heap
Answer: D

Q: 27
Which of the following is a restriction operator in LINQ?
A. GROUPBY
B. WHERE
C. THENBY
D. SELECTMANY
Answer: B

Q: 28
Which of the following modifiers in C# will you use if you do NOT want a custom-build component to be a base class?
A. sealed
B. virtual
C. override
D. static
Answer: A

Q: 29
Which of the following attributes of the customErrors element is used to specify whether custom errors are enabled, disabled, or shown only to remote clients?
A. Off
B. Mode
C. On
D. RemoteOnly
Answer: B


© 2014 Cheat-Test.com, All Rights Reserved