Which of the following modifiers is not available in C#?
A. private
B. friend
C. internal
D. public
E. protected
What is the main purpose of a try-catch block?
A. To obtain and use resources that are being caught.
B. To signal the occurrence of an exception during the program execution.
C. To catch and handle an exception generated by an executable code.
D. To ensure that the necessary cleanup of external resources is done immediately.
George works as a Software Developer for GenTech Inc. He creates an application named App1 using Visual Studio .NET. App1 uses the version 2.0.0.0 of an assembly named Assembly1. However, he wants App1 to use a new version i.e.
2.1.0.0 of Assembly1. Therefore, he needs to specify Assembly1's location so that App1 can use version 2.1.0.0 of Assembly1. What will George use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
A. An unmanaged code.
B. A managed code.
C. The
D. The
You work as a Software Developer for ABC Inc. You develop a Web application that contains several Web pages. The Web pages contain several Web server controls that implement validation controls for user input validation. Under which of the following circumstances will you perform user input validation programmatically for Web server controls?
Each correct answer represents a complete solution. Choose all that apply.
A. When the validity of a control or a Web page is to be determined in the Page_Load event h andler.
B. When the user input validation data values are not set until run time.
C. When the server or validation controls are added during design time.
D. When the validity of a control or a Web page is to be determined in the Page_Init event ha ndler.
E. When the server or validation controls are added during run time.
You work as an Enterprise Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET application using .NET Framework 3.5.
The application contains a Web page that will be accessible through the Internet. The Web page holds a Web form that captures data that will be stored in a SQL Server 2008 database. The form at present uses a POST method. The Web page also holds JavaScript validation routines. The validation routines will be used to ensure that the input to the form meets the business requirements and does not contain any code that is unsafe.
There is currently no server-side validation being performed. You are required to evaluate the application and resolve security flaws in the Web page. What will you do?
A. Change the method of the form action to GET.
B. Use Script Controls and Extenders.
C. Create new server-side validation routines.
D. Move the validation routines to a content page.
Julia works as a Software Developer for Mansoft Inc. She develops an application using Visual Studio .NET. The application uses a method named MyMethod, which is located in an unmanaged DLL. Julia wants MyMethod to require the application to allocate unmanaged memory, fill the data, and pass the memory address to the application. She also wants to ensure that on returning from MyMethod, the application de-allocates the unmanaged memory. What will Julia do to accomplish the task?
A. Use the methods of the MemoryStream class.
B. Derive a new class from the Stream class, and override the allocation methods.
C. Use the Marshal class.
D. Use a byte array.
David works as a Software Developer for GenTech Inc. He develops a Web application named
WebApp, which displays the monthly inventory reports of the company. The company's management wants only employees in the Sales Department to have access to WebApp. They will have to be authenticated with a valid username and password. David wants to implement an authorization strategy in the application, which will require the Windows authentication mode of Web security. Which of the following modules will David use to accomplish the task?
A. AnonymousIdentificationModule
B. FormsAuthenticationModule
C. UrlAuthorizationModule
D. FileAuthorizationModule
You work as an Application Developer for ABC Inc. You are assigned with developing a Web site that will handle information related to monthly sales of the company. You wish to secure the Web site so that only employees of the Accounts department can view the Web pages. You need to create roles for the employees of this department. The user account information will be stored in a SQL Server database named Database. You decide to do all this by using the Web Site Administration Tool. Which of the following types of security will you use to accomplish the task?
A. Basic authentication
B. Integrated Microsoft Windows authentication
C. Forms-based authentication
D. Digest authentication
George works as a Software Developer for GenTech Inc. He creates an application named App1 using Visual Studio .NET. App1 uses the version 2.0.0.0 of an assembly named Assembly1. However, he wants App1 to use a new version i.e.
2.1.0.0 of Assembly1. Therefore, he needs to specify Assembly1's location so that App1 can use version 2.1.0.0 of Assembly1. What will George use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
A. An unmanaged code.
B. A managed code.
C. The
D. The
You work as a Software Developer for Mansoft Inc. The company uses Visual Studio.NET as its application development platform. You create an application, which will be used for e-commerce.
You want to ensure that the transactions are highly secured. For this purpose, you have to create a system to verify the identity of a potential customer. Which of the following security techniques will you use to accomplish this task?
A. Spoofing
B. Symmetric encryption
C. Asymmetric encryption
D. Digital certificate