Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

GSSP-NET-CSHARP Exam Questions Tutorials

GIAC GIAC Secure Software Programmer - C#.NET Questions and Answers

Question 57

George works as a Software Developer for GenTech Inc. He creates an application named App1 using Visual Studio .NET. App1 uses the version 2.0.0.0 of an assembly named Assembly1. However, he wants App1 to use a new version i.e. 2.1.0.0 of Assembly1. Therefore, he needs to specify Assembly1's location so that App1 can use version 2.1.0.0 of Assembly1. What will George use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The element.

B.

A managed code.

C.

The element.

D.

An unmanaged code.

Question 58

ASP.NET version 2.0 health monitoring supports an __________.

Options:

A.

Event driven model

B.

Event provider model

C.

Event log model

D.

Event API model

Question 59

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an ASP.NET Web application using .NET Framework 3.5. The application will be deployed on an intranet server of the company. You require that the application meets the following requirements:

l Users can log on to the application by using their Active Directory credentials.

l Each Web page in the application must display user name and password controls for an unauthenticated user.

What will you do to accomplish this?

Options:

A.

Use Forms authentication and use the SqlMembershipProvider class.

B.

Use Forms authentication and use the ActiveDirectoryMembershipProvider class.

C.

Use Windows authentication and enable impersonation.

D.

Use Windows authentication and disable impersonation.

Question 60

You work as an Application Developer for ABC Inc. You are assigned with developing a Web site that will handle information related to monthly sales of the company. You wish to secure the Web site so that only employees of the Accounts department can view the Web pages. You need to create roles for the employees of this department. The user account information will be stored in a SQL Server database named Database. You decide to do all this by using the Web Site Administration Tool. Which of the following types of security will you use to accomplish the task?

Options:

A.

Forms-based authentication

B.

Integrated Microsoft Windows authentication

C.

Basic authentication

D.

Digest authentication