Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GIAC Certification GSSP-.NET Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSSP-.NET Premium Access

View all detail and faqs for the GSSP-.NET exam


812 Students Passed

89% Average Score

98% Same Questions
Viewing page 2 out of 15 pages
Viewing questions 11-20 out of questions
Questions # 11:

John works as a Web Developer for ProLabs Inc. He develops an ASP.NET application, named

MyWebApp1, using Visual Studio .NET. One of the pages in the application is named as Page1.aspx, which does not need to maintain session state. To improve the performance of the application, John wants to disable session state for Page1. Which of the following actions will he take to accomplish the task?

Options:

A.

Set the EnableViewState attribute in the @ Page directive to false.

B.

Set the DisableSessionState attribute in the @ Page directive to true.

C.

In the sessionState configuration section of the application's Web.config file, set the mode attribute to off.

D.

Set the EnableSessionState attribute in the @ Page directive to false.

Questions # 12:

Which of the following is not a type of Remote object?

Options:

A.

Server-activated object

B.

Client-activated object

C.

Singleton object

D.

Single call object

Questions # 13:

You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

Options:

A.

Cryptographic toolkit

B.

Cryptosystem

C.

Cryptographer

D.

Cryptanalyst

Questions # 14:

You work as a Software Developer for ABC Inc. You develop a multi-threaded application named MyMultThreadApp using Visual Studio .NET. The application logs all warning and informational messages in an event log that keeps track of significant events when the application is running. The event log records information that might be useful for troubleshooting or performance analysis. Which of the following are the considerations that you must keep in mind when logging events with multithreaded components?

Each correct answer represents a complete solution. Choose three.

Options:

A.

An exclusive lock should be obtained on the log to avoid race conditions.

B.

Each shared component should be thread-safe when interacting with an event log.

C.

The System.Threading namespace should be used to record the identity of each thread for logging messages.

D.

The Debug and Trace classes should be used to log events.

Questions # 15:

Which of the following attributes of the customErrors element is used to specify whether custom errors are enabled, disabled, or shown only to remote clients?

Options:

A.

Off

B.

Mode

C.

On

D.

RemoteOnly

Questions # 16:

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a class library using the .NET Framework. The library will be used to open the NSCs of computers. Later, you will set up the class library to the GAC and provide it Full Trust permission. You write down the following code segments for the socket connections:

SocketPermission permission = new SocketPermission(PermissionState.Unrestricted);

permission.Assert();

A number of the applications that use the class library may not have the necessary permissions to open the network socket connections. Therefore, you are required to withdraw the assertion. Which of the following code segments will you use to accomplish the task?

Options:

A.

permission.PermitOnly();

B.

CodeAccessPermission.RevertDeny();

C.

permission.Deny();

D.

CodeAccessPermission.RevertAssert();

E.

permission.Demand();

Questions # 17:

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. You are not using an exception handling framework in the application. However, the application must automatically log all unhandled exceptions to an event log. You are required to configure the Web.config file accordingly. Which of the following configurations will you use to accomplish the task?

Options:

A.

B.

C.

D.

Questions # 18:

You work as a Software Developer for ManSoft Inc. You use Microsoft Visual Studio to create a Web service named MyWebService. You create a SOAP message that is not secure in the Web service. You want to use the SendSecurityFilter class in the Web service to handle the transmission and securing of SOAP messages. Which of the following code segments will you use to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

Options:

A.

public class MySendSecurityFilter : SendSecurityFilter

{

public MySendSecurityFilter(string service, Boolean client)

{ }

public override void SecureMessage(SoapEnvelope envelope, Security security)

{

// Implement validation here

}

}

B.

public class MySendSecurityFilter : SendSecurityFilter

{

public MySendSecurityFilter(string service, Boolean client)

{

base(service,client);

}

public override void SecureMessage(SoapEnvelope envelope, Security security)

{

// Implement validation here

}

}

C.

public class MySendSecurityFilter : SendSecurityFilter

{

public MySendSecurityFilter(string service, Boolean client) : base(service,client)

{ }

public override void SecureMessage(SoapEnvelope envelope, Security security)

{

// Implement validation here

}

}

D.

public class MySendSecurityFilter : SendSecurityFilter

{

public MySendSecurityFilter(string service, Boolean client) : base(service,client)

{ }

public void SecureMessage(SoapEnvelope envelope, Security security)

{

// Implement validation here

}

}

Questions # 19:

David works as a Software Developer for GenTech Inc. He creates an XML Web service, named MyWebService, using Visual Studio .NET. MyWebService uses Microsoft Windows authentication. Users of MyWebService are in the GenTech domain. David wants to configure MyWebService to use the following URL-based authorization rules:

l Anonymous users must not be allowed to access MyWebService.

l All the users except User1 and User2 must be allowed to access MyWebService.

David configures Internet Information Services (IIS) to meet these requirements. Which of the following code will David use to configure the authorization section of the Web.config file for MyWebService?

Options:

A.

<authorization>

<allow users=''*''>

</authorization>

B.

<authorization>

<allow users="*">

</authorization>

C.

<authorization>

<allow users="*">

</authorization>

D.

<authorization>

<allow users="*">

</authorization>

E.

<authorization>

<allow users="*">

</authorization>

Questions # 20:

George works as a Software Developer for GenTech Inc. He creates an application named App1 using Visual Studio .NET. App1 uses the version 2.0.0.0 of an assembly named Assembly1. However, he wants App1 to use a new version i.e. 2.1.0.0 of Assembly1. Therefore, he needs to specify Assembly1's location so that App1 can use version 2.1.0.0 of Assembly1. What will George use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

An unmanaged code.

B.

A managed code.

C.

The element.

D.

The element.

Viewing page 2 out of 15 pages
Viewing questions 11-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.