Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GSSP-NET-CSHARP Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSSP-NET-CSHARP Premium Access

View all detail and faqs for the GSSP-NET-CSHARP exam


786 Students Passed

86% Average Score

96% Same Questions
Viewing page 2 out of 15 pages
Viewing questions 11-20 out of questions
Questions # 11:

You work as a Web Application Developer for SunInfo Inc. The company uses Visual Studio 2008 as its application development platform. You create a Web application using .NET Framework 3.5. You want to attach the Visual Studio Debugger to Internet Explorer when the application is running. Which of the following steps will you take to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

In the Attach to Process dialog box, select the instance of Internet Explorer (iexplorer.exe) to be attached to the debugger.

B.

In Visual Studio, go to the Debug menu and select Start Debugging.

C.

In Visual Studio, go to the Debug menu, click Windows, and then click Script Explorer.

D.

In Visual Studio, go to the Debug menu and click Attach to Process.

Questions # 12:

You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

Options:

A.

Cryptographic toolkit

B.

Cryptosystem

C.

Cryptographer

D.

Cryptanalyst

Questions # 13:

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. You need to represent a strongly typed lambda expression as a data structure in the form of an expression tree. Which of the following classes will you use to accomplish the task?

Options:

A.

MethodCallExpression

B.

Expression(TDelegate)

C.

Expression

D.

LambdaExpression

Questions # 14:

John works as a Software Developer for DawnStar Inc. He creates a class, named MyClass1. He wants to generate a key pair that he will use to give the compiled assembly a strong name. Which of the following tools will he use to accomplish the task?

Options:

A.

Installutil.exe

B.

Gacutil.exe

C.

Sn.exe

D.

Al.exe

Questions # 15:

Which of the following session and instancing modes will you set if you require a sessionfull binding and want to create a new instance object for each client request?

Options:

A.

Set SessionMode to Allowed and IntsanceMode to PerSession.

B.

Set SessionMode to Required and IntsanceMode to Single.

C.

Set SessionMode to Required and IntsanceMode to PerCall.

D.

Set SessionMode to Allowed and IntsanceMode to PerCall.

Questions # 16:

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished development of Web services using the .NET Framework. The access control to Web services is part of your accountability. You are currently revealing an existing class as a XML Web service. You are required to ensure that the XML Web service is exclusively accessible to Web service clients within the ABC Inc. domain. To fulfill this requirement you want to change the access modifiers on methods that must be represented as Web methods. What will you do to accomplish this task?

Options:

A.

Use the Public access modifier for each Web method.

B.

Use the Private access modifier for each Web method.

C.

Use the Internal or Friend access modifier for each Web method.

D.

Use the Protected access modifier for each Web method.

Questions # 17:

You work as a Software Developer for ABC Inc. The company has several branches Worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an applications using .NET Framework 2.0. You want to allow users to view various details of a given unmanaged code. What will you do to accomplish the task?

Options:

A.

Use a COM/DCOM server.

B.

Use the Dispinterface.

C.

Use the Makecert.exe.

D.

Use the dumpbin.exe.

Questions # 18:

Hannah works as a Programmer in a college of Information Technology. The company uses Visual Studio .NET as its application development platform. The Dean of the college wants to obtain the performance report of each student. Hannah develops an application named StudentPerformanceReport by using Visual C# .NET. This application uses a SQL Server database named Database1 and a stored procedure named PROC1. PROC1 executes a query that returns the internal assessment result of each student.

Hannah uses a TextBox control named AssessmentText in the application form named MyForm. She wants to display the total test result of each student in the AssessmentText text box control.

StudentPerformanceReport uses a SqlCommand object to run PROC1. Hannah wants to write code to call PROC1. PROC1 contains an output parameter and displays its value as "@AssessmentResult" in text format. Which of the following code segments can Hannah use to accomplish this task?

Each correct answer represents a complete solution. Choose two.

Options:

A.

AssessmentText.Text = comm.Parameters["@AssessmentResult"].SourceColumn;

B.

AssessmentText.Text = (string)comm.Parameters["@AssessmentResult"].Value;

C.

AssessmentText.Text = comm.Parameters["@AssessmentResult"].Value.ToString();

D.

AssessmentText.Text = comm.Parameters["@AssessmentResult"].ToString();

Questions # 19:

Which class allows checks against the active principal using the language constructs defined for the declarative and imperative security actions?

Options:

A.

IPrincipal

B.

CodeAccessPermission

C.

PrincipalPermission

D.

SecurityPermission

Questions # 20:

You work as an Application Developer for ABC Inc. You are assigned with developing a Web site that will handle information related to monthly sales of the company. You wish to secure the Web site so that only employees of the Accounts department can view the Web pages. You need to create roles for the employees of this department. The user account information will be stored in a SQL Server database named Database. You decide to do all this by using the Web Site Administration Tool. Which of the following types of security will you use to accomplish the task?

Options:

A.

Forms-based authentication

B.

Integrated Microsoft Windows authentication

C.

Basic authentication

D.

Digest authentication

Viewing page 2 out of 15 pages
Viewing questions 11-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.