Exam Details

  • Exam Code
    :GSSP-NET-CSHARP
  • Exam Name
    :GIAC Secure Software Programmer - C#.NET
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :491 Q&As
  • Last Updated
    :May 13, 2024

GIAC GIAC Information Security GSSP-NET-CSHARP Questions & Answers

  • Question 481:

    You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You have recently finished development of an ASP.NET Web application using the .NET Framework 3.5. You host the application on a Web farm that consists of three Web servers. You should configure the ASP.NET application for session state to meet the following requirements:

    l Session state data should not be lost if a server fails.

    l Session state must be maintained across browser requests by the same user.

    You are required to configure the Web.config file to meet these requirements. Which of the following configurations will you use?

    A.

    B.

    C.

    D.

  • Question 482:

    You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create an ASP.NET Web application using .NET Framework 3.5. You create a Web form in the application that permits users to provide personal information. You add a DropDownList control to the Web form to retrieve the residential status of users. The default item that the DropDownList control displays is the "Select Country" option. You have to ensure that users select a country other than the default option. Which of the following validation controls should you use to accomplish this task?

    A. RangeValidator

    B. RequiredFieldValidator

    C. CustomValidator

    D. RegularExpressionValidator

  • Question 483:

    You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You create an application for the company. You need to validate the phone number passed to a class as a parameter in the application. Which of the following is the most effective way to verify that the format of the data matches a phone number?

    A. Regular expressions

    B. Nested If statements

    C. Use the String.Length property

    D. A try/catch block

  • Question 484:

    You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You have recently finished development of a Windows application using .NET Framework. Users report that

    the application is not running properly. When the users try to complete a particular action, the following error message comes out:

    Unable to find assembly 'myservices, Version=1.0.0.0, Culture=neutral, PublicKeyToken=29b5ad26c9de9b95'.

    You notice that the error occurs as soon as the application tries to call functionality in a serviced component that was registered by using the following command:

    regsvcs.exe myservices.dll

    You must make sure that the application can call the functionality in the serviced component with no exceptions being thrown. What will you do to accomplish this task?

    A. Run the command line tool: regasm.exe myservices.dll.

    B. Copy the serviced component assembly into the C:\Program Files\ComPlus Applications fold er.

    C. Run the command line tool: gacutil.exe /i myservices.dll.

    D. Copy the serviced component assembly into the C:\WINDOWS\system32\Com folder.

  • Question 485:

    Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework. He wants to encrypt all his e-mails that he sends to anyone. Which of the following will he use to accomplish the task?

    A. PPP

    B. FTP

    C. PPTP

    D. PGP

  • Question 486:

    You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You have recently finished the development of an application using .NET Framework 2.0. The application can be used only for cryptography. Therefore, you have implemented the application on a computer. What will you call the computer that implemented cryptography?

    A. Cryptographic toolkit

    B. Cryptosystem

    C. Cryptographer

    D. Cryptanalyst

  • Question 487:

    You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a class library using the .NET Framework. The library will be used to open the NSCs of computers.

    Later, you will set up the class library to the GAC and provide it Full Trust permission. You write down the following code segments for the socket connections:

    SocketPermission permission = new SocketPermission(PermissionState.Unrestricted);

    permission.Assert();

    A number of the applications that use the class library may not have the necessary permissions to open the network socket connections. Therefore, you are required to withdraw the assertion. Which of the following code segments will you

    use to accomplish the task?

    A. permission.PermitOnly();

    B. CodeAccessPermission.RevertDeny();

    C. permission.Deny();

    D. CodeAccessPermission.RevertAssert();

    E. permission.Demand();

  • Question 488:

    You work as an Application Developer for ABC Inc. You are assigned with developing a Web site that will handle information related to monthly sales of the company. You wish to secure the Web site so that only employees of the Accounts department can view the Web pages. You need to create roles for the employees of this department. The user account information will be stored in a SQL Server database named Database. You decide to do all this by using the Web Site Administration Tool. Which of the following types of security will you use to accomplish the task?

    A. Forms-based authentication

    B. Integrated Microsoft Windows authentication

    C. Basic authentication

    D. Digest authentication

  • Question 489:

    You work as a Software Developer for ManSoft Inc. The company uses Visual Studio.NET 2005 as its application development platform. You have recently created an application that includes the code shown below.

    string str1 = "ABC";

    string str2 = "u";

    str2 += "Certify";

    Console.WriteLine(str1 == str2);

    Console.WriteLine((Object) str1 == (Object) str2);

    Console.WriteLine(str1.Equals(str2));

    What will be the output of the above code?

    A. False False

    False

    B. False True False

    C. True True True

    D. True False True

  • Question 490:

    You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You create an ASP.NET Web application using the .NET Framework 3.5. You want to use a HTTP module called on each and every request made by the application. It is called as part of the ASP.NET request pipeline. It has right to access life-cycle events throughout the request. You also want to ensure that the HTTP module allows a user to inspect incoming and outgoing requests and take appropriate action based on the request. What will be the correct order to create the HTTP module?

    A.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GSSP-NET-CSHARP exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.