[Free] 2017(Sep) CollectDumps Testking GIAC GSSP-NET-CSHARP Dumps with VCE and PDF 71-80

CollectDumps 2017 Sep GIAC Official New Released GSSP-NET-CSHARP
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSSP-NET-CSHARP.html

GIAC GIAC Secure Software Programmer – C#.NET

Question No: 71 – (Topic 1)

Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework. He wants to encrypt all his e-mails that he sends to anyone. Which of the following will he use to accomplish the task?

  1. PPP

  2. FTP

  3. PGP

  4. PPTP

Answer: C

Question No: 72 – (Topic 1)

John works as a Web Developer for TechCom Inc. He creates an ASP.NET application, named MyApp1, using Visual Studio .NET. Only registered users of the company will be able to use the application. The application contains a page, named NewAccount.aspx that allows new users to register themselves to the registered user list of the company. The NewAccount page contains several TextBox controls that accept users#39; personal details such as username, password, confirm password, first name, last name, home address, zip code, phone number, etc. One of the TextBox controls on the page is named txtZipCode in which a user enters a Zip code.

John wants to ensure that when a user submits the NewAccount page, txtZipCode must contain five numeric digits. He wants least development effort. Which of the following validation controls will he use to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

  1. CompareValidator

  2. RequiredFieldValidator

  3. RangeValidator

  4. RegularExpressionValidator

Answer: B,D

Question No: 73 – (Topic 1)

John works as a Software Developer for DawnStar Inc. He creates a class, named MyClass1. He wants to generate a key pair that he will use to give the compiled assembly a strong name. Which of the following tools will he use to accomplish the task?

  1. Installutil.exe

  2. Gacutil.exe

  3. Sn.exe

  4. Al.exe

Answer: C

Question No: 74 – (Topic 1)

Hannah works as a Programmer in a college of Information Technology. The company uses Visual Studio .NET as its application development platform. The Dean of the college wants to obtain the performance report of each student. Hannah develops an application named StudentPerformanceReport by using Visual C# .NET. This application uses a SQL Server database named Database1 and a stored procedure named PROC1. PROC1 executes a query that returns the internal assessment result of each student.

Hannah uses a TextBox control named AssessmentText in the application form named MyForm. She wants to display the total test result of each student in the AssessmentText text box control.

StudentPerformanceReport uses a SqlCommand object to run PROC1. Hannah wants to write code to call PROC1. PROC1 contains an output parameter and displays its value as quot;@AssessmentResultquot; in text format. Which of the following code segments can Hannah use to accomplish this task?

Each correct answer represents a complete solution. Choose two.

  1. AssessmentText.Text = comm.Parameters[quot;@AssessmentResultquot;].SourceColumn;

  2. AssessmentText.Text = (string)comm.Parameters[quot;@AssessmentResultquot;].Value;

  3. AssessmentText.Text = comm.Parameters[quot;@AssessmentResultquot;].Value.ToString();

  4. AssessmentText.Text = comm.Parameters[quot;@AssessmentResultquot;].ToString();

Answer: B,C

Question No: 75 – (Topic 1)

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a Web service application using

.NET Framework. The Web service provides confidential data of employees to applications that manage access to company facilities. The Web service is accessible by using TCP and is sheltered by using WSE 3.0. The company has implemented fingerprint readers to grant employees access to the facilities. All the captured images of the employees#39; fingerprints are retained by the Web service application. You must make certain that the existing WSE encryption policy can be applied to the fingerprint image. You are required to provide the solution that must reduce the size of the Web service message.

What will you do to accomplish this task?

  1. Configure the Web service to use base64 encoding to pass the binary fingerprint image.

  2. Create a SOAP extension to manage encryption for the message.

  3. Configure the Web service to use Message Transmission Optimization Mechanism to pass the binary fingerprint image.

  4. Create a SOAP filter to manage encryption for the message.

Answer: C

Question No: 76 – (Topic 1)

You work as a Software Developer for InfoTech Inc. You create a Windows form in a Windows-based application named MyWinApp1. You use graphics in the form. You write the following code in your form:

private void MyMouseEvent1(object sender1, MouseEventArgs event)

{

// Code to handle mouse events

}

You want to implement a property of the MouseEventArgs object. This property will return a Point structure that contains the x-coordinate and y-coordinate of the mouse. Which of the following properties of the MouseEventArgs object will you use to accomplish this?

  1. Y

  2. Delta

  3. Location

  4. Button

  5. Clicks

  6. X

Answer: C

Question No: 77 – (Topic 1)

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You have recently finished development of a

Windows application using .NET Framework. Users report that the application is not running properly. When the users try to complete a particular action, the following error message comes out:

Unable to find assembly #39;myservices, Version=1.0.0.0, Culture=neutral, PublicKeyToken=29b5ad26c9de9b95#39;.

You notice that the error occurs as soon as the application tries to call functionality in a serviced component that was registered by using the following command:

regsvcs.exe myservices.dll

You must make sure that the application can call the functionality in the serviced component with no exceptions being thrown. What will you do to accomplish this task?

  1. Run the command line tool: regasm.exe myservices.dll.

  2. Copy the serviced component assembly into the C:\Program Files\ComPlus Applications fold er.

  3. Run the command line tool: gacutil.exe /i myservices.dll.

  4. Copy the serviced component assembly into the C:\WINDOWS\system32\Com folder.

Answer: C

Question No: 78 – (Topic 1)

Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework. He wants to encrypt all his e-mails that he sends to anyone. Which of the following will he use to accomplish the task?

  1. PPP

  2. FTP

  3. PPTP

  4. PGP

Answer: D

Question No: 79 – (Topic 1)

You work as a Software Developer for ABC Inc. The company has several branches

worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

  1. Cryptographic toolkit

  2. Cryptosystem

  3. Cryptographer

  4. Cryptanalyst

Answer: B

Question No: 80 – (Topic 1)

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a class library using the .NET Framework. The library will be used to open the NSCs of computers. Later, you will set up the class library to the GAC and provide it Full Trust permission. You write down the following code segments for the socket connections:

SocketPermission permission = new SocketPermission(PermissionState.Unrestricted); permission.Assert();

A number of the applications that use the class library may not have the necessary permissions to open the network socket connections. Therefore, you are required to withdraw the assertion. Which of the following code segments will you use to accomplish the task?

  1. permission.PermitOnly();

  2. CodeAccessPermission.RevertDeny();

  3. permission.Deny();

  4. CodeAccessPermission.RevertAssert();

  5. permission.Demand();

Answer: D

100% Free Download!
Download Free Demo:GSSP-NET-CSHARP Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSSP-NET-CSHARP Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE