Summer Sale - Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

GSSP-.NET GIAC GIAC Secure Software Programmer - C#.NET Questions and Answers

Questions 4

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished development of an application using .NET Framework 2.0. The application has multiple threads that execute one after another. You want to modify the application and schedule the threads for execution based on their assigned priority. What will you do to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Use the Highest priority.

B.

Use the BelowNormal priority.

C.

Use the Normal priority.

D.

Use the Middle priority.

E.

Use the Lowest priority.

Buy Now
Questions 5

You work as a Software Developer for ManSoft Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You create an application that will be used by all the branches of the company. You use the Regex class in the application to validate some strings. You want to search an input string for an occurrence of a regular expression. Which of the following methods of the Regex class will you use to accomplish the task?

Options:

A.

Match

B.

Matches

C.

Equals

D.

IsMatch

Buy Now
Questions 6

Tony works as a Software Developer for TechNet Inc. He creates a satellite assembly named

SatAssembly1. He wants to install SatAssembly1 in the global assembly cache. Therefore, he compiles the assembly by using the Al.exe tool and signs SatAssembly1. Which of the following possible tools will Tony use to sign SatAssembly1?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Installer tool

B.

File Signing tool

C.

.NET Services Installation tool

D.

Strong Name tool

Buy Now
Questions 7

Which of the following can be used as an alternative of S/MIME standard?

Options:

A.

MIME

B.

SMTP

C.

MIME/PGP

D.

NNTP

Buy Now
Questions 8

You work as a Software Developer for Mansoft Inc. You create an application and use it to create users as members of the local Users group. Which of the following code snippets imperatively demands that the current user is a member of the local Users group?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

System.AppDomain.CurrentDomain.SetPrincipalPolicy(PrincipalPolicy.WindowsPrincipal);

PrincipalPermission MyPermission = new PrincipalPermission(null, @"BUILTIN\Users", true);

MyPermission.Demand();

B.

System.AppDomain.CurrentDomain.SetPrincipalPolicy(PrincipalPolicy.WindowsPrincipal);

PrincipalPermission MyPermission = new PrincipalPermission(null, @"Users", true); MyPermission.Demand();

C.

PrincipalPermission MyPermission = new PrincipalPermission(null, @"BUILTIN\Users", true); MyPermission.Demand();

D.

PrincipalPermission MyPermission = new PrincipalPermission(null, @"Users", true); MyPermission.Demand();

Buy Now
Questions 9

You work as a Software Developer for ABC Inc. The Company uses .NET Framework 2.0 as its application development platform. You are creating an application that will perform different types of comparison operations. Therefore, you decide to use only those methods that are available in all the classes of .NET Framework 2.0. Which of the following methods will you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Compare

B.

ToString

C.

Copy

D.

Equals

E.

GetType

Buy Now
Questions 10

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. You have recently finished development of an application using .NET Framework. The application used two threads named threadOne and threadTwo. You are required to modify the code of the application to prevent the execution of threadOne until threadTwo completes execution. What will you do to accomplish this task?

Options:

A.

Use a WaitCallback delegate to synchronize the threads.

B.

Configure threadTwo to run at a higher priority.

C.

Configure threadOne to run at a lower priority.

D.

Call the Sleep method of threadOne.

E.

Call the SpinLock method of threadOne

Buy Now
Questions 11

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. The application is a library application that catalogs Classes and books. The application contains a DataContext object named Classes and a related line of business object named Books. The Classes DataContext object is queried by using the following LINQ query: var query = from class in Classes where class.Books.All(b => b.Price <= 50) select class;

You have to find out the result that will be returned from the query. What will be the result of the query?

Options:

A.

All books that have a price greater than or equal to 50.

B.

All books that have a price less than or equal to 50.

C.

All Classes that have the price of the related book greater than or equal to 50.

D.

All Classes that have the price of the related book less than or equal to 50.

Buy Now
Questions 12

You work as a Web Application Developer for SunInfo Inc. The company uses Visual Studio 2008 as its application development platform. You create a Windows Forms application using .NET Framework 3.5. You add a button control to a form named form1. You want to retrieve more information about the mouse event. You use the MouseClick event in your application. Which of the following parameters will you pass to the event handler of the MouseClick event?

Options:

A.

An object parameter representing the sender of the event and an instance of KeyEventArgs

B.

An object parameter representing the sender of the event and an EventArgs parameter

C.

An object parameter representing the sender of the event and an instance of KeyPressEven tArgs

D.

An object parameter representing the sender of the event and an instance of MouseEventA rgs

Buy Now
Questions 13

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows Forms application using .NET Framework 3.5. The application contains a data-bound control. The user interface (UI) for modifying data from a LinqDataSource control is typically provided through the data-bound control. You are required to perform automatic data modifications. Which of the following conditions are required to enable automatic data modifications?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

The class that is assigned to the ContextTypeName property must derive from DataContext .

B.

The GroupBy property cannot be assigned a value.

C.

The property that is assigned to the TableName property must derive from Table(TEntity).

D.

The Where property cannot be assigned a value.

E.

The Select property cannot be assigned a value.

Buy Now
Questions 14

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You create an application named StringRW using .NET Framework. You store some characters into an array of Unicode characters. You need to write all or some of these characters into a String object. Which of the following code segments will you choose to accomplish this task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

StringBuilder sb = new StringBuilder("This is my character String Builder");

char[] b = { 'c', 'l', 'a', 's', 's', 'r', 'i', 'g', 'h', 't', 'd', 'o', 'd' };

StringWriter sw = new StringWriter(sb);

Object obj=(Object)b;

sw.Write(obj);

Console.WriteLine(sb);

sw.Close();

B.

StringBuilder sb = new StringBuilder("This is my character String Builder");

char[] b = { 'c', 'l', 'a', 's', 's', 'r', 'i', 'g', 'h', 't', 'd', 'o', 'd' };

StringWriter sw = new StringWriter(sb);

sw.Write(b);

Console.WriteLine(sb);

sw.Close();

C.

StringBuilder sb = new StringBuilder("This is my character String Builder");

char[] b = { 'c', 'l', 'a', 's', 's', 'r', 'i', 'g', 'h', 't', 'd', 'o', 'd' };

string str=new string(b);

StringWriter sw = new StringWriter(sb);

sw.Write(str);

Console.WriteLine(sb);

sw.Close();

D.

StringBuilder sb = new StringBuilder("This is my character String Builder");

char[] b = { 'c', 'l', 'a', 's', 's', 'r', 'i', 'g', 'h', 't', 'd', 'o', 'd' };

StringWriter sw = new StringWriter(sb);

sw.Write(b, 0, 5);

Console.WriteLine(sb);

sw.Close();

Buy Now
Questions 15

Maria works as a Software Developer for BlueWell Inc. She develops an application, named App1, using Visual C# .NET. App1 contains a Form control, named Form1, for collecting users' contact information. Form1 contains a TextBox control, named TextBox1. App1 requires users to enter data in TextBox1. Maria writes a method, named Method1, to validate the entered data. She adds an ErrorProvider control, named Control1, to Form1. Maria wants to ensure that App1 notifies the users if they enter invalid data in TextBox1. Which of the following code will she use to accomplish this?

Options:

A.

public void TextBox1_Validating(object sender, System.CancelEventArgs e)

{

if(Method1() == false)

{

Control1.UpdateBinding();

}

}

B.

public void TextBox1_Validating(object sender, System.ComponentModel.CancelEventArgs e)

{

if(Method1() == false)

{

Control1.SetError(TextBox1, "Invalid Email Entry.");

}

}

C.

public void TextBox1_Validated(object sender, System.ComponentModel.CancelEventArgs e)

{

if(Method1() == false)

{

Control1.UpdateBinding();

}

}

D.

public void TextBox1_Validated(object sender, System.ComponentModel.CancelEventArgs e)

{

if(Method1() == false)

{

Control1.SetError(TextBox1, "Invalid Email Entry.");

}

}

Buy Now
Questions 16

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are developing an application using the .NET Framework 2.0.

You are required to use a datatype that will store only numbers ranging from -32,768 to 32,767.

Which of the following datatypes will you use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

int

B.

string

C.

short

D.

System.Int16

Buy Now
Questions 17

Mark works as a Software Developer for TechBook Inc. He develops an ASP.NET application, named MyApp1, using Visual Studio .NET. MyApp1 contains an ASP.NET page that is used to register new participants to a quiz contest, which is to be held recently in the city of New York. In order to take part in the quiz contest, an applicant must be between the age of fifteen and twenty-five. Mark adds a TextBox control, named txtDateOfBirth, to the page. He wants to ensure that each prospective participant enters his date of birth in txtDateOfBirth. He also wants to verify that prospective participants meet the age requirement. For this, Mark wants to use a custom client script function. He also wants to minimize the number of trips made to the server. Which of the following actions will Mark perform to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Add a RequiredFieldValidator control to the page. Set its ControlToValidate property to txtDateOfBirth.

B.

Set the ClientValidationFunction property of the CustomValidator control to the name of the script function that performs the client-side validation.

C.

Set the AutoPostBack property of txtDateOfBirth to True.

D.

Add a CustomValidator control to the page. Set its ControlToValidate property to txtDateOf Birth.

E.

Set the ClientValidationFunction property of txtDateOfBirth to the name of the script function that performs the client-side validation.

F.

Set the AutoPostBack property of txtDateOfBirth to False.

Buy Now
Questions 18

You work as a Software Developer for ABC Inc. The company has several branches worldwide.

The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

Options:

A.

Cryptosystem

B.

Cryptanalyst

C.

Cryptographic toolkit

D.

Cryptographer

Buy Now
Questions 19

Andrew works as a Software Developer for BlueWell Inc. He develops a Windows-based application, named App1, using Visual Studio .NET. The application uses Microsoft SQL Server as a backend database. Andrew wants to perform security checks on App1. Which of the following statements regarding security checks are true?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Declarative security check works by instantiating security classes.

B.

Declarative security check works by assigning attributes to assemblies.

C.

Imperative security check works by instantiating security classes.

D.

Imperative security check works by assigning attributes to assemblies.

Buy Now
Questions 20

Sam works as a Software Developer for SamTech Inc. He develops a Windows-based application, named App1, using Visual Studio .NET. He wants to set a security policy for the application. To accomplish the task he uses the PolicyLevel class. He wants to set the current policy level to the default state. Which of the following methods will he use to accomplish the task?

Options:

A.

Resolve

B.

ChangedNamePermissionSet

C.

Reset

D.

Recover

Buy Now
Questions 21

Samantha works as a Software Developer for InfoWorld Inc. She develops a Web page named SalesReport.aspx for the employees of the company. However, she wants to ensure that all the requests for a particular employee are not stored on the server's memory. She also wants to ensure that no data is lost even after each user session has expired. Which of the following actions will Samantha take to accomplish the task?

Options:

A.

Use a cookieless session state for storing information.

B.

Use the profile properties feature for storing information.

C.

Use the application state for storing information.

D.

Use the session state with cookie for storing information.

Buy Now
Questions 22

Allen works as a Software Developer for Mansoft Inc. He develops a Web application using Visual Studio .NET. He adds a Web reference to an XML Web service named MyWebService in the application. MyWebService includes a method named MyMethod, which takes user identification number as a parameter and returns a DataSet object containing user information. The System.ArgumentException is thrown if the user identification number does not lie between 1 and 500. Allen writes a try and catch block to capture the exception thrown by the Web service. Which of the following exceptions will the try and catch block catch if a user calls MyMethod passing 501 as a parameter?

Options:

A.

System.Web.Services.Protocols.SoapException

B.

System.Web.Services.Protocols.SoapHeaderException

C.

System.ApplicationException

D.

System.ArgumentNullException

Buy Now
Questions 23

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating a Windows service application using the .NET Framework. The service is used to execute several tasks that require background processing. You do not want to actively manage threads in the service application, but you must make sure that security checks are performed during the execution of the task. What will you do to accomplish the task?

Options:

A.

Use the ThreadPool.UnsafeQueueUserWorkItem method.

B.

thread2 raises its own priority

C.

Use the Thread.Start method.

D.

Use the Thread.Resume method.

E.

Use the ThreadPool.QueueUserWorkItem method.

Buy Now
Questions 24

You work as a Software Developer for ABC Inc. You are defining a component for an application. In some deployments, the component will be deployed on the same computer as the application. In other deployments the component will be deployed on a separate computer. The component has implicit dependencies and needs to access and use server-side resources that cannot cross system boundaries.

You must ensure that your component design supports both deployment scenarios. What will you do to accomplish the task?

Options:

A.

Create a SingleCall object.

B.

Create a marshal-by-value object.

C.

Create a marshal-by-reference object.

D.

Create a Singleton object.

Buy Now
Questions 25

Dennis works as a Software Developer for BlueWell Inc. He develops an application, named App1, using Visual C# .NET. App1 contains a class, named Class1, which is stored in a namespace, named BlueWell.Namespace1. Dennis wants to create another class, named Class2, and use Class1 from Class2. For this, he wants to define an alias, named Alias1, and use it in Class2.

Which of the following statements will Dennis use to define Alias1?

Options:

A.

BlueWell.Namespace1.Class1 : Alias1;

B.

BlueWell.Namespace1.Class1, Alias1;

C.

using Alias1 = BlueWell.Namespace1.Class1;

D.

Alias1 = BlueWell.Namespace1.Class1;

Buy Now
Questions 26

You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application for the branch in China. You are also implementing encoding in the application for Chinese language. Which of the following encoding types will you use to support Chinese language?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

UTF-16

B.

UTF-8

C.

UTF-32

D.

ASCII

Buy Now
Questions 27

You work as a Software Developer for Mansoft Inc. You create an ASP.NET Web application named MyWebApp. You implement a security protocol to transmit secured data between a client and a server. You try to authenticate the client computer. However, you are unable to do so, and the AuthenticationException exception is thrown. Which of the following classes will you use to accomplish this task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

NegotiateStream

B.

SslStream

C.

Stream

D.

AuthenticatedStream

Buy Now
Questions 28

You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. The application will be used by all the branches of the company. You sometimes require a variable number of arguments to be passed to a method. For example, you may require a sum method, which calculates the total of the numbers passed to it no matter how many numbers are passed. What will you do to accomplish the task?

Options:

A.

Use the base keyword.

B.

Use the ref keyword.

C.

Use the params keyword.

D.

Use the out keyword.

E.

Use the volatile keyword.

Buy Now
Questions 29

You work as a Software Developer for ABC Inc. You create a Console application to create multiple satellite assemblies. Which of the following statements about satellite assemblies are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

They do not contain any executable code.

B.

They are used to deploy language-specific resources for an application.

C.

The Assembly Linker tool is used to compile .resources files into satellite assemblies.

D.

An application can have only one satellite assembly.

Buy Now
Questions 30

Charles works as a Web Developer for Cyber Net Inc. The company frequently receives production information from external vendors in the form of XML data. Charles stores these XML data in a disk container of the Web server as .xsd schema files and .xdr schema files. There are specific rules for writing XML codes to define the structure and data types for XML documents. Which of the following criteria should NOT be considered while writing an XML document?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

A well-formed XML document should contain a start tag but not necessarily an end tag.

B.

An XML document must enclose the beginning and ending points of a tag by using the symbols '<' and '>' respectively.

C.

A well-formed XML document should contain a start tag and an end tag.

D.

An XML document should be specified according to the application or business requirement s.

E.

An XML document should have predefined elements and attributes.

Buy Now
Questions 31

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Windows Forms application by using the .NET Framework. The application executes a background thread. You are required to create the thread to exit, but you must also inform the main thread when the background thread has finished. What will you do to accomplish this?

Options:

A.

Call the Join method of the Thread class.

B.

Call the Sleep method of the Thread class.

C.

Call the Abort method of the Thread class.

D.

Call the Interrupt method of the Thread class.

Buy Now
Questions 32

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating an application using the .NET Framework. You are required to call an unmanaged method from your managed code with the help of platform invoke services. What will you do to accomplish this task?

Options:

A.

1. Export a type library for your managed code

B.

1. Import a type library as an assembly

2. Create instances of COM object

C.

1. Register your assembly by using COM

2. Reference your managed code from COM

D.

1. Create a class to hold DLL methods

2. Create prototype methods with managed code

Buy Now
Questions 33

You work as a Software Developer for ManSoft Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You create an application that will be used by all the branches of the company. You use the Regex class in the application to validate some strings. You want to search an input string for an occurrence of a regular expression. Which of the following methods of the Regex class will you use to accomplish the task?

Options:

A.

Matches

B.

Match

C.

IsMatch

D.

Equals

Buy Now
Questions 34

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. You create your own HTTP handlers that render custom output to the browser in the application. Other than this, under which of the following operations will you use your HTTP handlers?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Image server

B.

Aggregator

C.

Image mapping

D.

RSS feeds

Buy Now
Questions 35

Sam works as a Software Developer for GenTech Inc. He deploys an ASP.NET application on a server. When an error occurs, users are redirected to a custom error page that is specified in the Web.config file. Users report that a particular page repeatedly generates errors. Sam wants to gather detailed information about the error on this page. He also wants to ensure that users continue to be redirected to the custom error page, if the requested pages generate errors. What will Sam do to accomplish this?

Options:

A.

In the Web.config file, set the mode attribute of the customErrors element to RemoteOnly.

Access the page from a browser on the server.

B.

Modify the Web.config file to include the following element:

Access the application from a browser on a client computer.

C.

In the Web.config file, set the mode attribute of the customErrors element to RemoteOnly.

Access the page from a browser on a client computer.

D.

Modify the @ Page directive so that the Trace and the LocalOnly attributes are set to true.

Access the page from a browser on the server.

Buy Now
Questions 36

You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a Web application using .NET Framework 2.0. You configure the application at the following levels:

l Root Web

l Web application root directory

l Web site

l Web application subdirectory

In which of the following files will these levels be stored?

Options:

A.

Manhine.config

B.

Proxy auto-config

C.

ApplicationName.config

D.

Web.config

Buy Now
Questions 37

You work as a Software Developer for ABC Inc. You have created a console application that uses two threads, named thread1 and thread2. You need to modify the code to prevent the execution of thread1 until thread2 completes its execution. Which of the following steps will you take to accomplish this task?

Options:

A.

Call the SpinWait() method of thread1.

B.

Use a WaitCallBack delegate to synchronize the threads.

C.

Call the sleep() method of thread1.

D.

Configure thread1 to run at a lower priority.

E.

Configure thread2 to run at a higher priority.

Buy Now
Questions 38

You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating a Web application using .NET Framework 2.0. The application will be used in Local Area Network (LAN). The Web application reads comma enclosed text files. The text files exist in a subdirectory under the Web application's root directory. You must ensure that users never directly navigate to these files in a Web browser if they are not members of the Accounting role. You are required to write an ASP.NET HTTP handler that will use the FileAuthorizationModule class. Which of the following forms of authentications will you use?

Options:

A.

Forms

B.

Mutual

C.

Microsoft Windows Integrated Security

D.

Anonymous

Buy Now
Questions 39

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. You are using the StringBuilder class to string values. You want to create a StringBuilder object that can store 75 characters and should be initialized with "ABC". You also want to append a formatted string to the end of the StringBuilder object. Which of the following code segments will you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

StringBuilder MyStrBuild = new StringBuilder(75);

MyStrBuild.AppendFormat("ABC{0}{1}{2}", "INDIA", 'U', 'S');

B.

StringBuilder MyStrBuild = new StringBuilder("ABC", 75);

MyStrBuild.Append("INDIAUS");

C.

StringBuilder MyStrBuild = new StringBuilder("ABC");

MyStrBuil.Capacity=75;

MyStrBuild.AppendFormat("INDIA{0}{1}", 'U', 'S');

D.

StringBuilder MyStrBuild = new StringBuilder("ABC", 75);

MyStrBuild.AppendFormat("INDIA{0}{1}", 'U', 'S');

Buy Now
Questions 40

John works as a Web Developer for TechCom Inc. He creates an ASP.NET application, named MyApp1, using Visual Studio .NET. Only registered users of the company will be able to use the application. The application contains a page, named NewAccount.aspx that allows new users to register themselves to the registered user list of the company. The NewAccount page contains several TextBox controls that accept users' personal details such as username, password, confirm password, first name, last name, home address, zip code, phone number, etc. One of the TextBox controls on the page is named txtZipCode in which a user enters a Zip code. John wants to ensure that when a user submits the NewAccount page, txtZipCode must contain five numeric digits. He wants least development effort. Which of the following validation controls will he use to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

RequiredFieldValidator

B.

RegularExpressionValidator

C.

CompareValidator

D.

RangeValidator

Buy Now
Questions 41

Tony works as a Software Developer for TechNet Inc. He creates a satellite assembly named

SatAssembly1. He wants to install SatAssembly1 in the global assembly cache. Therefore, he compiles the assembly by using the Al.exe tool and signs SatAssembly1. Which of the following possible tools will Tony use to sign SatAssembly1?

Each correct answer represents a complete solution. Choose two.

Options:

A.

File Signing tool

B.

.NET Services Installation tool

C.

Installer tool

D.

Strong Name tool

Buy Now
Questions 42

Patrick works as a Software Developer for GenTech Inc. He develops an application, named App1, using Visual C# .NET. He implements security using the security classes of the .NET Framework. He defines the following statements in the application:

PrincipalPermission Principal_Perm1 = new PrincipalPermission("Nick", "General

Manager");

PrincipalPermission Principal_Perm2 = new PrincipalPermission("Jack", "Accountant");

Patrick wants to check whether all demands that succeed for Principal_Perm1 also succeed for Principal_Perm2. Which of the following methods of the PrincipalPermission class will he use to accomplish this?

Options:

A.

Intersect

B.

IsSubSetOf

C.

IsUnrestricted

D.

Union

Buy Now
Questions 43

Mario works as a Software Developer for BlueWell Inc. He develops an application, named App1, by using Visual Studio .NET. He deploys the application on a client computer. He wants to use the existing assembly named Assembly1. However, Assembly1 needs to be configured in the global assembly cache so that App1 is able to use it. He wants to ensure that the application data transferred to and from the server to the client computer is well secured. Which of the following tools will Mario use to accomplish the task?

Options:

A.

Regasm.exe

B.

Sn.exe

C.

Mscorcfg.msc

D.

Regsvcs.exe

Buy Now
Questions 44

John works as a Software Developer for DawnStar Inc. He creates a class, named MyClass1. He wants to generate a key pair that he will use to give the compiled assembly a strong name. Which of the following tools will he use to accomplish the task?

Options:

A.

Gacutil.exe

B.

Sn.exe

C.

Installutil.exe

D.

Al.exe

Buy Now
Questions 45

You work as a Software Developer for ABC Inc. The company's server room is in a highly secured environment. The company wants to ensure that the server room uses thumb impressions for authentication. Which of the following authentication methods will you suggest?

Options:

A.

SSL certificates

B.

Biometrics

C.

User policy

D.

Smart card

E.

Certificate

Buy Now
Questions 46

Peter works as a Software Developer for GenTech Inc. He develops an application named App1 using Visual Studio .NET. App1 uses an assembly named Assembly1. Peter installs App1 and Assembly1 to the C:\Program Files\App1 and C:\Program Files\Assembly1 folders respectively. While executing App1, Peter finds that App1 fails to execute with TypeLoadException. What will he do to resolve this issue.

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

Uninstall Assembly from the C:\Program Files\Assembly1 folder.

B.

Reinstall Assembly1 to the C:\Windows\Microsoft .NET Framework\Assembly1 folder.

C.

Reinstall Assembly1 to the C:\Program Files\App1 folder.

D.

Change the system path to C:\Program Files\Assembly1.

Buy Now
Questions 47

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a method to hash data with the Secure Hash Algorithm (SHA) using .NET Framework. The hash data is passed to the method as a byte array named msg. You are required to calculate the hash of the msg array by using the SHA1. It is also mandatory to place the result into a byte array named Myhash. Which of the following code segments should you use to accomplish the task?

Options:

A.

SHA1 Mysha1 = new SHA1CryptoServiceProvider();

Mysha1.GetHashCode();

byte[] Myhash = Mysha1.Hash;

B.

SHA1 Mysha1 = new SHA1CryptoServiceProvider();

byte[] Myhash = null;

Mysha1.TransformBlock(msg, 0, msg.Length, Myhash, 0);

C.

SHA1 Mysha1 = new SHA1CryptoServiceProvider();

byte[] Myhash = BitConverter.GetBytes(Mysha1.GetHashCode());

D.

SHA1 Mysha1 = new SHA1CryptoServiceProvider();

byte[] Myhash = Mysha1.ComputeHash(msg);

Buy Now
Questions 48

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a remoting application that provides stock information to customers using .NET Framework. The server component raises an event on the client computer when certain conditions are met. You must ensure that the server raises exactly one event for each client application that is registered for the event. What will you do to accomplish this task?

Options:

A.

Configure the server class as a Singleton Activated Object (SAO) and check for duplicate client delegate methods before raising the event.

B.

Configure the server class as a Client Activated Object (CAO) and override the CreateObjRef method to check for duplicate client delegate methods before raising the event.

C.

Configure the server class as a SingleCall Activated Object (SAO) and check for duplicate client delegate methods before raising the event.

D.

Configure the server class as a Client Activated Object (CAO) and check for duplicate client delegate methods before raising the event.

Buy Now
Questions 49

Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. He develops an application that manipulates files containing confidential information. He wants to make a copy of the existing file, named

ConfidentInfo1 to a new file, named ConfidentInfo2 in the local drive by using an instance method. However, Allen wants to ensure that the existing file does not overwrite the new file.

Which of the following classes' instance method will Allen consider in the application to accomplish the task?

Options:

A.

StringWriter class

B.

FileInfo class

C.

BinaryWriter class

D.

DirectoryInfo class

Buy Now
Questions 50

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an ASP.NET Web application using .NET Framework 3.5. The application will be accessed by users from remote locations over the Internet. You need to use ASP.NET role management. You must ensure that any authorization information cached on remote client computers is as secure as possible. What will you do?

Options:

A.

Use the RsaProtectedConfigurationProvider class.

B.

Use the DpapiProtectedConfigurationProvider class.

C.

Set the cookieProtection attribute to Validation in the roleManager element of the Web.conf ig file.

D.

Set the cookieProtection attribute to Encryption in the roleManager element of the Web.con fig file.

Buy Now
Questions 51

You work as a Software Developer for Mansoft Inc. The company uses Visual Studio.NET as its application development platform. You create an ASP.NET Web application using the .NET Framework. You want to authenticate the application and then deploy it on a server running

Microsoft Windows Server 2003 Standard Edition hosting Microsoft Internet Information Services 6.0. Which of the following authentication methods will you use to accomplish the task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

Integrated Windows

B.

Extensible Authentication Protocol

C.

Windows NT

D.

Anonymous

E.

Basic

Buy Now
Questions 52

You work as a Software Developer for ManSoft Inc. The company uses Visual Studio.NET 2005 as its application development platform. You have recently created an application that includes the code shown below.

string str1 = "ABC";

string str2 = "u";

str2 += "Certify";

Console.WriteLine(str1 == str2);

Console.WriteLine((Object) str1 == (Object) str2);

Console.WriteLine(str1.Equals(str2));

What will be the output of the above code?

Options:

A.

True

True

True

B.

True

False

True

C.

False

False

False

D.

False

True

False

Buy Now
Questions 53

George works as a Software Developer for GenTech Inc. He creates an application named App1 using Visual Studio .NET. App1 uses the version 2.0.0.0 of an assembly named Assembly1. However, he wants App1 to use a new version i.e. 2.1.0.0 of Assembly1. Therefore, he needs to specify Assembly1's location so that App1 can use version 2.1.0.0 of Assembly1. What will George use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The element.

B.

A managed code.

C.

The element.

D.

An unmanaged code.

Buy Now
Questions 54

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a Web service application using .NET Framework. The Web service provides confidential data of employees to applications that manage access to company facilities. The Web service is accessible by using TCP and is sheltered by using WSE 3.0. The company has implemented fingerprint readers to grant employees access to the facilities. All the captured images of the employees' fingerprints are retained by the Web service application. You must make certain that the existing WSE encryption policy can be applied to the fingerprint image. You are required to provide the solution that must reduce the size of the Web service message.

What will you do to accomplish this task?

Options:

A.

Configure the Web service to use base64 encoding to pass the binary fingerprint image.

B.

Configure the Web service to use Message Transmission Optimization Mechanism to pass the binary fingerprint image.

C.

Create a SOAP filter to manage encryption for the message.

D.

Create a SOAP extension to manage encryption for the message.

Buy Now
Questions 55

You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating a Web application using .NET Framework 2.0. The application is accessed by ABC users and some of ABC's affiliates. All users who access theapplication must have their credentials stored in the UCData database. You need to implement a login page that authenticates users against the UCData database. What will you do?

Options:

A.

In the Web.config file, set the Authentication Mode to Passport.

B.

In the Web.config file, set the Authentication Mode to None.

C.

In the Web.config file, set the Authentication Mode to Windows.

D.

In the Web.config file, set the Authentication Mode to Forms.

Buy Now
Questions 56

Which of the following code snippets is an example of tight encapsulation?

Options:

A.

protected int x;

protected void fun(){x=5;}

B.

int x;

public void fun(){x=5;}

C.

public int x;

public void fun() {x=5;}

D.

private int x;

public void fun(){x=5;}

E.

private int x;

private void fun(){x=5;}

Buy Now
Questions 57

Mark works as a Software Developer for BlueWell Inc. He is required to create a class, named Members. Each element of this class has a unique ID stored in a database field, named Member_ID. Which of the following options will he use to represent Member_ID, while designing the Members class?

Options:

A.

Event

B.

Method

C.

Function

D.

Property

Buy Now
Questions 58

You work as a Software Developer for ManSoft Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You create an application that will be used by all the branches of the company. You use the Regex class in the application to validate some strings. You want to search an input string for an occurrence of a regular expression. Which of the following methods of the Regex class will you use to accomplish the task?

Options:

A.

Match

B.

Matches

C.

Equals

D.

IsMatch

Buy Now
Questions 59

You work as a Software Developer for ManSoft Inc. You use Microsoft Visual Studio to create a Web service named MyWebService. You create a SOAP message that is not secure in the Web service. You want to use the SendSecurityFilter class in the Web service to handle the transmission and securing of SOAP messages. Which of the following code segments will you use to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

public class MySendSecurityFilter : SendSecurityFilter

{

public MySendSecurityFilter(string service, Boolean client)

{ }

public override void SecureMessage(SoapEnvelope envelope, Security security)

{

// Implement validation here

}

}

B.

public class MySendSecurityFilter : SendSecurityFilter

{

public MySendSecurityFilter(string service, Boolean client)

{

base(service,client);

}

public override void SecureMessage(SoapEnvelope envelope, Security security)

{

// Implement validation here

}

}

C.

public class MySendSecurityFilter : SendSecurityFilter

{

public MySendSecurityFilter(string service, Boolean client) : base(service,client)

{ }

public override void SecureMessage(SoapEnvelope envelope, Security security)

{

// Implement validation here

}

}

D.

public class MySendSecurityFilter : SendSecurityFilter

{

public MySendSecurityFilter(string service, Boolean client) : base(service,client)

{ }

public void SecureMessage(SoapEnvelope envelope, Security security)

{

// Implement validation here

}

}

Buy Now
Questions 60

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating a Windows Forms application using .NET Framework 3.5. You need to develop a new control for the application. You must ensure that the control inherits the TreeView control by adding a custom node tag and a highlight color. What will you do?

Options:

A.

Set the control's DrawMode property to OwnerDrawText, and then implement a custom DrawNode event handler.

B.

Set the control's DrawMode property to OwnerDrawAll, and then implement a custom DrawNode event handler.

C.

Write a code segment in the DrawNode event handler to give the highlight color.

D.

Override the OnPaint method.

Buy Now
Questions 61

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating an application using the .NET Framework. You write the following code snippet to call a method from the Win32 API by using PInvoke:

int rst = MessageBox(hWd, Mytext, Mycaption, Mytype);

You are required define a method prototype. Which of the following code segments will you use to accomplish this task?

Options:

A.

[DllImport("user32")] extern int MessageBoxA(int hWd, String Mytext, String Mycaption, uint Mytype);

B.

[DllImport("user32")] extern int Win32API_User32_MessageBox(Int hWd, String Mytext, String Mycaption, uint Mytype);

C.

[DllImport("user32")] extern int MessageBox(int hWd, String Mytext, String Mycaption, uint Mytype);

D.

[DllImport("C:\\WINDOWS\\system32\\user32.dll")] extern int MessageBox(int hWd, String Mytext, String Mycaption, uint Mytype);

Buy Now
Questions 62

You work as an Enterprise Application Developer for SunInfo Inc. The company uses Visual Studio 2008 as its application development platform. You create a Windows Forms application using .NET Framework 3.5. You want to notify the users when a print job has finished. Which of the following events will you use to accomplish the task?

Options:

A.

PrintDocument.PrintPage

B.

PrintDocument.EndPrint

C.

PrintDocument.QueryPageSettings

D.

PrintDocument.BeginPrint

Buy Now
Questions 63

Patrick works as a Software Developer for GenTech Inc. He develops an application, named App1, using Visual C# .NET. He implements security using the security classes of the .NET Framework. He defines the following statements in the application:

PrincipalPermission Principal_Perm1 = new PrincipalPermission("Nick", "General

Manager");

PrincipalPermission Principal_Perm2 = new PrincipalPermission("Jack", "Accountant");

Patrick wants to check whether all demands that succeed for Principal_Perm1 also succeed for Principal_Perm2. Which of the following methods of the PrincipalPermission class will he use to accomplish this?

Options:

A.

Intersect

B.

IsSubSetOf

C.

IsUnrestricted

D.

Union

Buy Now
Questions 64

You work as an Application Developer for ABC Inc. You are assigned with developing a Web site that will handle information related to monthly sales of the company. You wish to secure the Web site so that only employees of the Accounts department can view the Web pages. You need to create roles for the employees of this department. The user account information will be stored in a SQL Server database named Database. You decide to do all this by using the Web Site Administration Tool. Which of the following types of security will you use to accomplish the task?

Options:

A.

Forms-based authentication

B.

Integrated Microsoft Windows authentication

C.

Basic authentication

D.

Digest authentication

Buy Now
Questions 65

Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework. He wants to encrypt all his e-mails that he sends to anyone. Which of the following will he use to accomplish the task?

Options:

A.

PPP

B.

PPTP

C.

FTP

D.

PGP

Buy Now
Questions 66

Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework. He wants to encrypt all his e-mails that he sends to anyone. Which of the following will he use to accomplish the task?

Options:

A.

PPP

B.

FTP

C.

PPTP

D.

PGP

Buy Now
Questions 67

Which of the following provide simplified access to ASP.NET AJAX login, roles, and profile services from Windows Forms and WPF applications?

Options:

A.

Entity Framework

B.

AJAX application services

C.

Client application services

D.

Sync Framework

Buy Now
Questions 68

Allen works as a Software Developer for ManSoft Inc. He develops an application using Visual Studio .NET 2005. Only the employees of the company use the application. Allen wants to ensure that when a request on a page is made by a user the application asks for his authentication. Which of the following actions will Allen take to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

Specify User.Identity to authenticate the user.

B.

Set the impersonate attribute of the element to true.

C.

Specify the username and password attributes.

D.

Set the impersonate attribute of the element to false.

Buy Now
Questions 69

Which of the following techniques is used to transmit passwords during authentication?

Options:

A.

Asymmetric encryption

B.

Hashing

C.

Salted Hash

D.

Symmetric encryption

Buy Now
Questions 70

You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

Options:

A.

Cryptographic toolkit

B.

Cryptosystem

C.

Cryptographer

D.

Cryptanalyst

Buy Now
Questions 71

Which of the following classes limits the number of threads that can access a resource or pool of resources concurrently?

Options:

A.

Semaphore

B.

Mutex

C.

Thread

D.

Monitor

Buy Now
Questions 72

Allen works as a Software Developer for Mansoft Inc. He creates an ASP.NET Web application named MyApplication. He wants to use the Health Monitor to monitor MyApplication to record details about events rather than just the values of specific data counters. Which of the following health monitoring child elements will he use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Rules

B.

Profiles

C.

bufferModes

D.

customErrors

E.

eventMappings

F.

Providers

Buy Now
Exam Code: GSSP-.NET
Exam Name: GIAC GIAC Secure Software Programmer - C#.NET
Last Update: Jun 30, 2025
Questions: 491

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now GSSP-.NET testing engine

PDF (Q&A)

$36.75  $104.99
buy now GSSP-.NET pdf
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 03 Jul 2025