logo

CuriousTab

CuriousTab

Discussion


Home Certification Microsoft Certification See What Others Are Saying!
  • Question
  • You create an assembly by using Visual Studio .NET. The assembly is responsible for writing and reading order entry information to and from an XML data file. The assembly also writes and reads values to and from the Windows registry while it is being consumed. The assembly will be distributed to client computers by using your company, XYZ, intranet. All client computers are configured to implement the default .NET security policy. You need to implement security in the assembly. What should you do?


  • Options
  • A. Implement declarative security and execute the permission demand to allow access to the file system and Windows registry.
  • B. Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.
  • C. Implement imperative security and execute the permission demand to allow access to the file system and Windows registry.
  • D. Implement imperative security and execute the minimum permission request to allow access to the file system and Windows registry.

  • Correct Answer
  • Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry. 

    Explanation

    You can use declarative code access security to request permissions for the entire assembly. SecurityAction flags that can be specified in an assembly-wide directive. When SecurityAction.RequestMinimum is specified, it makes a request to the common language runtime to be granted the requested permission. If the requested permission is not granted by the security policy, the assembly will not execute. A  Security Action.RequestOptional is similar, but the assembly will still run even if the requested permission is not granted. Specifying security Action. RequestRefuse requests that the assembly be denied the specified permission.

     

    You must use the Assembly (assembly) directive when specifying these actions as follows: 

     

    Option A:

    There are only three Security actionAttributes targets for an assembly: RequestMinimumAssembly, RequestOptionalAssembly, and RequestRefuseAssembly. 

     

     Option C, D:

    Imperative security does not work well to configure security for an entire assembly. In imperative security, permission to execute is demanded at run time.


  • More questions

    • 1. Which two descriptions are correct about characteristics of IPv6 unicast addressing? (Choose two) A. Global addresses start with 2000::/3. B. Link-local addresses start with FF00::/10. C. Link-local addresses start with FE00:/12. D. There is only one loopback address and it is ::1.
    • Discuss
    • 2. What are the six OSPF route types?
    • Discuss
    • 3. How many non- overlapping channels are available with 802.11b?

    • Options
    • A. 3
    • B. 12
    • C. 23
    • D. 40
    • Discuss
    • 4. Which IEEE committee has been sanctioned by WAP and is called WPA2?
    • Discuss
    • 5. When a station sends a transmission to the MAC address ff : ff : ff : ff : ff : ff, what type of transmission is it?

    • Options
    • A. Unicast
    • B. Multicast
    • C. Anycast
    • D. Broadcast
    • Discuss
    • 6. In the operation of CSMA/CD, which host(s) have priority after the expiration of the backoff algorithm?

    • Options
    • A. All hosts have equal priority
    • B. The two hosts that caused the collision will have equal priority
    • C. The host that sent the jam signal after the collision
    • D. The host with the highest MAC address
    • Discuss
    • 7. What is the Classs A Private IP address space?
    • Discuss
    • 8. What is the Class C private IP address space?
    • Discuss
    • 9. To use VLSM, what capability must the routing protocols in use possess?

    • Options
    • A. Support for multicast
    • B. Multi-protocol support
    • C. Transmission of subnet mask information
    • D. Support for unequal load balancing
    • Discuss
    • 10. If you wanted administrators to see a message when logging into the router, which command would you use?

    • Options
    • A. message banner motd
    • B. banner message motd
    • C. banner motd
    • D. message motd
    • Discuss


    Comments

    There are no comments.

Enter a new Comment