Practice Questions

Question 1

After you compile your application into an executable named MyApp.exe , what will be the name of the file that contains the values assigned to the dynamic properties in your application?

  • A. app.config

  • B. MyApp.config

  • C. machine.config

  • D. MyApp.exe.config

  • E. MyApp.exe

A1:

Answer D is correct. The name of the configuration file for an executable application takes the form <application name>.exe.config . Answer A is incorrect because app.config is only used by an application within the IDE. Answer B is incorrect because it lacks the executable designation ( .exe ) linking it to the primary MyApp.exe executable. Answer C is incorrect because the machine.config file details machine configuration details rather than application-level settings. Answer E is incorrect because MyApp.exe is the name of the compiled executable rather than its associated configuration file.

Question 2

Which of the following properties can be specified at runtime by using a dynamic property? [Select all correct answers.]

  • A. Text

  • B. ShowInTaskBar

  • C. Enabled

  • D. ReadOnly

A2:

Answers A, B, C, and D are correct. You can use dynamic properties to set any property at runtime.

Question 3

Which of the following actions may be performed using the Microsoft .NET Framework Configuration tool? [Select all that apply.]

  • A. Manage configured assemblies

  • B. Manage remoting channels

  • C. Manage application settings

  • D. Manage security policy settings

  • E. Manage the contents of the GAC

A3:

Answers A, B, C, D, and E are all correct. The Microsoft .NET Framework Configuration tool may be used to manage configured assemblies, remoting channels, application settings, security policy settings, and the contents of the Global Assembly Cache (GAC).

Question 4

How many configuration files can a Visual Basic .NET Windows application have?

  • A. Zero

  • B. One

  • C. Two

  • D. Three

  • E. As many as needed

A4:

Answer B is correct. An application may only have one configuration file. Answers A, C, D, and E are incorrect because they specify an incorrect number of configuration filesalthough it is possible for an application to also be affected by a machine.config file, if present.

Question 5

How should you redirect calls from one version of an assembly to a newer version of the same assembly?

  • A. Change the application that calls the assembly to reference the newer version.

  • B. Use the Microsoft .NET Framework Configuration tool to create a configured assembly that will redirect the calls.

  • C. Replace the old version of the assembly with the new version of the assembly.

  • D. Install the new version of the assembly alongside the old version of the assembly.

A5:

Answer B is correct. By creating a configured assembly, you can redirect calls to one version of an assembly to a different version. Answer A is incorrect because there's no need to change all the calling applications. Answers C and D are incorrect because .NET applications will by default only call the version of an assembly that they were created with, even if a newer version of the assembly is available.

Question 6

Which of the following are valid permission object types? [Select all that apply.]

  • A. Code access

  • B. Group based

  • C. Role based

  • D. User based

  • E. Identity

A6:

Answers A, C, and E are correct. The .NET Framework groups permissions into three object types: code access, role based, and identity. Answer B is incorrect because there is no defined group-based security object type ( group-based access control is referred to as role-based security ). Answer D is incorrect because there is no defined user-based security object type.

Question 7

You have created an application that may be exposed to anonymous access and want to ensure that only other code modules that have a specific set of permissions may use your application. Which of the following SecurityAction flags would be most appropriate?

  • A. RequestMinimum

  • B. RequestOptional

  • C. RequestRefuse

  • D. Demand

A7:

Answer D is correct. The Demand flag specifies that only code modules that have the specified permissions may call your application. Answer A is incorrect because the RequestMinimum flag is used to verify that the calling code has at least the minimum permissions specified. Answer B is incorrect because the RequestOptional flag is used to check whether the calling code has some optional, but not strictly required, permissions. Answer C is incorrect because the RequestRefuse flag is used to restrict the possible permissions your application will have. Although it would be a good idea to configure RequestRefuse in an anonymous-access application, this is not the best answer to meet the proposed requirement.

Question 8

You want to create a code group that includes only a single assembly. Which of these membership conditions should you use for this code group?

  • A. Publisher

  • B. Site

  • C. Hash

  • D. URL

A8:

Answer C is correct. The easiest solution for creating a single-assembly code group is to use the cryptographic-hash membership condition. This way, only the assembly with the matching hash value will be included in the code group. Answer A is incorrect because a single publisher may distribute multiple assemblies. Answer B is incorrect because it includes every assembly from a particular Web site. Answer D is incorrect because the contents of a URL might change in the future to point to a different assembly.

Question 9

Which of the following default permission sets should be used to grant all permissions except the permission to skip security checks?

  • A. Execution

  • B. Internet

  • C. LocalIntranet

  • D. FullTrust

  • E. Everything

A9:

Answer E is correct. The Everything permission set includes all permissions except the permission to skip security checks. Answers A, B, and C are incorrect because the Execution, Internet, and LocalIntranet permission sets do not have sufficient permissions to meet the requirement. Answer D is incorrect because the FullTrust permission set grants all permissions, including the permission to skip security checks.

Question 10

Your application includes several ASP.NET components. Which type of authorization should you use to allow these components to use Windows authentication?

  • A. Forms based

  • B. Windows

  • C. Microsoft Passport

  • D. Custom

A10:

Answer B is correct. The Windows method of authorization allows ASP.NET applications to use the built-in Windows authentication available within IIS. Answer A is incorrect because a forms-based authorization method may be used to prompt a user for his credentials but would not function automatically with that user's Windows account. Answer C is incorrect because the Passport service is used for authorization through a centralized service, rather than through integrated Windows authentication. Answer D is incorrect because it is not necessary to create a custom authorization method; the Windows authorization method will suffice.



Developing and Implementing WindowsR-based Applications with Visual BasicR. NET and Visual StudioR. NET Exam CramT 2 (Exam 70-306)
Developing and Implementing WindowsR-based Applications with Visual BasicR. NET and Visual StudioR. NET Exam CramT 2 (Exam 70-306)
ISBN: N/A
EAN: N/A
Year: 2002
Pages: 188

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net