logo

CuriousTab

CuriousTab

Discussion


Home Certification Microsoft Certification Comments

  • Question
  • You create an assembly by using Visual Studio .NET. The assembly is responsible for writing and reading order entry information to and from an XML data file. The assembly also writes and reads values to and from the Windows registry while it is being consumed. The assembly will be distributed to client computers by using your company, XYZ, intranet. All client computers are configured to implement the default .NET security policy. You need to implement security in the assembly. What should you do?


  • Options
  • A. Implement declarative security and execute the permission demand to allow access to the file system and Windows registry.
  • B. Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry.
  • C. Implement imperative security and execute the permission demand to allow access to the file system and Windows registry.
  • D. Implement imperative security and execute the minimum permission request to allow access to the file system and Windows registry.

  • Correct Answer
  • Implement declarative security and execute the minimum permission request to allow access to the file system and Windows registry. 

    Explanation

    You can use declarative code access security to request permissions for the entire assembly. SecurityAction flags that can be specified in an assembly-wide directive. When SecurityAction.RequestMinimum is specified, it makes a request to the common language runtime to be granted the requested permission. If the requested permission is not granted by the security policy, the assembly will not execute. A  Security Action.RequestOptional is similar, but the assembly will still run even if the requested permission is not granted. Specifying security Action. RequestRefuse requests that the assembly be denied the specified permission.

     

    You must use the Assembly (assembly) directive when specifying these actions as follows: 

     

    Option A:

    There are only three Security actionAttributes targets for an assembly: RequestMinimumAssembly, RequestOptionalAssembly, and RequestRefuseAssembly. 

     

     Option C, D:

    Imperative security does not work well to configure security for an entire assembly. In imperative security, permission to execute is demanded at run time.


  • Microsoft Certification problems


    Search Results


    • 1. You use Visual Studio .NET to create a Windows-based application. The application includes a form named XYZProcedures (EXP). EXP allows users to enter very lengthy text into a database. When users click the Print button located on EXP, this text must be printed by the default printer. You implement the printing functionality by using the native .NET System Class Libraries with all default settings. Users report that only the first page of the text is being printed. How should you correct this problem?

    • Options
    • A. In the BeginPrint event, set the HasMorePages property of the PrintEventArgs object to True.
    • B. In the EndPrint event, set the HasMorePages property of the PrintEventArgs object to True.
    • C. In the PrintPage event, set the HasMorePages property of the PrintPageEventArgs object to True.
    • D. In the QueryPageSettings event, set the HasMorePages property of the QueryPageSettingEventArgs object to True.
    • Discuss
    • 2. You responsible for maintaining an application that was written by a former colleague at XYZ. The application reads from and writes to log files located on the local network. The original author included the following debugging code to facilitate maintenance: try { Debug.WriteLine(?Inside Try?); throw(new IOException());} catch (IOException e) { Debug.WriteLine (?IOException Caught?);} catch (Exception e) { Debug.WriteLine(?Exception Caught?);}. finally { Debug.WriteLine (?Inside Finally?);} Debug.WriteLine (?After End Try?); Which output is produced by thus code?

    • Options
    • A. Inside Try Exception Caught IOException Caught Inside Finally After End Try
    • B. Inside Try Exception Caught Inside Finally After End Try
    • C. Inside Try IOException Caught Inside Finally After End Try
    • D. Inside Try IOException Caught Inside Finally
    • Discuss
    • 3. You develop a Windows-based application that enables to enter product sales. You add a subroutine named XYZ. You discover that XYZ sometimes raises an IOException during execution. To address this problem you create two additional subroutines named LogError and CleanUp. These subroutines are governed by the following rules: ? LogError must be called only when XYZ raises an exception. ? CleanUp must be called whenever XYZ is complete. You must ensure that your application adheres to these rules. Which code segment should you use?

    • Options
    • A. try { XYZ(); LogError(); } catch (Exception e) { CleanUp(e); }
    • B. try { XYZ(); } catch (Exception e) { LogError(e); CleanUp(); }
    • C. try { XYZ(); } catch (Exception e) { LogError(e); } finally { CleanUp(); }
    • D. try { XYZ(); } catch (Exception e) { CleanUp(e); } finally { LogError(); }
    • Discuss
    • 4. You work as software developer at XYZ inc. You need to develop a Windows form that provides online help for users. You want the help functionality to be available when users press the F1 key. Help text will be displayed in a pop-up window for the text box that has focus. To implement this functionality, you need to call a method of the HelpProvider control and pass the text box and the help text. What should you do?

    • Options
    • A. SetShowHelp
    • B. SetHelpString
    • C. SetHelpKeyword
    • D. ToString
    • Discuss
    • 5. You are a developer for a XYZ Inc that provides free software over the Internet. You are developing en e-mail application that users all over the world can download. The application displays text strings in the user interface. At run time, these text strings must appear in the language that is appropriate to the locale setting of the computer running the application. You have resources to develop versions of the application for only four different cultures.You must ensure that your application will also be usable by people of other cultures. How should you prepare the application for deployment?

    • Options
    • A. Package a different assembly for each culture.
    • B. Package a different executable file for each culture.
    • C. Package a main assembly for source code and the default culture. Package satellite assemblies for the other cultures.
    • D. Package a main assembly for source code. Package satellite assemblies for each culture.
    • Discuss
    • 6. You use Visual Studio .NET to create an assembly, called XYZAssembly, that will be used by other applications, including a standard COM client application. You must deploy your assembly on the COM application to a client computer. You must ensure that the COM application can instantiate components within the assembly as COM components. What should you do?

    • Options
    • A. Create a strong name of the assembly by using the Strong Name tool (Sn.exe).
    • B. Generate a type library for the assembly by using the Type Library Importer (Tlbimp.exe). Register the file on the client computer.
    • C. Generate a registry file for the assembly by using the Assembly Registration tool (Regasm.exe) Register the file on the client computer.
    • D. Deploy the assembly to the global assembly cache on the client computer. Add a reference to the assembly in the COM client application.
    • Discuss
    • 7. You develop an enterprise application, called XYZApplication that includes a Windows Form presentation layer, middle-tier components for business logic and data access, and a Microsoft SQL Server database. You are in the process of creating a middle-tier component that will execute the data access routines in your application. When data is passed to this component, the component will call several SQL Server stored procedures to perform database updates. All of these procedure calls run under the control of a single transaction. The code for the middle-tier component will implement the following objects: SqlConnection cn = new SqlConnection(); SqlTransaction tr; If two users try to update the same data concurrently, inconsistencies such as phantom reads will occur. You must now add code to your component to specify the highest possible level of protection against such inconsistencies. Which code segment should you use?

    • Options
    • A. tr = cn.BeginTransaction(?ReadCommitted?);
    • B. tr = cn.BeginTransaction(IsolationLevel.ReadCommitted);
    • C. tr = cn.BeginTransaction(IsolationLevel.Serializable);
    • D. tr = cn.BeginTransaction(?Serializable?);
    • Discuss
    • 8. You develop an inventory management application called XYZManagement that will call a Microsoft SQL Server stored procedure named sp_GetDailyXYZSales. The stored procedure will run a query that returns your daily sales total as an output parameter. This total will be displayed to users in a message box. Your application uses a SqlCommand object to run sp_GetDailyXYZSales. You write the following code to call sp_GetDailyXYZSales: SqlConnection cnn = new SqlConnection(myConnString); SqlCommand cmd = new SqlCommand(?sp_GetDaily XYZ Sales?, cnn); cmd.CommandType = CommandType.StoredProcedure; SqlParameter prm = cmd.Parameters.Add(?@ItemTotal?,SqlDbType.Int); prm.Direction = ParameterDirection.Output; cnn.Open(); cmd.ExecuteNonQuery(); Now you must write additional code to access the output parameter. Which code segment should you use?

    • Options
    • A. MessageBox.Show(?Total is: ? + cmd.Parameters[?@Output?].Value.ToString());
    • B. MessageBox.Show(?Total is: ? + cmd.Parameters[?@Output?].ToString());
    • C. MessageBox.Show(?Total is: ? + cmd.Parameters[?@ItemTotal?
    • D. MessageBox.Show(?Total is: ? + cmd.Parameters[?@ItemTotal?
    • Discuss
    • 9. You have a computer named Computer1 that runs Windows 7. You need to ensure that Computer1 can connect to File Transfer Protocol (FTP) servers only while it is connected to a private network. What should you do?

    • Options
    • A. From Windows Firewall with Advanced Security, create a new rule.
    • B. From the local Group Policy, modify the application control policies.
    • C. From Windows Firewall, modify the Allowed Programs and Features list.
    • D. From Network and Sharing Center, modify the Advanced Sharing settings.
    • Discuss
    • 10. How many-shares of market value RS.25 each can be purchased for Rs.12750, brokerage being 2% ?

    • Options
    • A. Rs.450
    • B. Rs.500
    • C. Rs.550
    • D. Rs.600
    • Discuss


    Comments

    There are no comments.

Enter a new Comment