Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GSSP-NET-CSHARP GIAC GIAC Secure Software Programmer - C#.NET Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GSSP-NET-CSHARP GIAC GIAC Secure Software Programmer - C#.NET certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 8
Total 491 questions

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a Web service application using .NET Framework. The Web service provides confidential data of employees to applications that manage access to company facilities. The Web service is accessible by using TCP and is sheltered by using WSE 3.0. The company has implemented fingerprint readers to grant employees access to the facilities. All the captured images of the employees' fingerprints are retained by the Web service application. You must make certain that the existing WSE encryption policy can be applied to the fingerprint image. You are required to provide the solution that must reduce the size of the Web service message.

What will you do to accomplish this task?

A.

Configure the Web service to use base64 encoding to pass the binary fingerprint image.

B.

Configure the Web service to use Message Transmission Optimization Mechanism to pass the binary fingerprint image.

C.

Create a SOAP filter to manage encryption for the message.

D.

Create a SOAP extension to manage encryption for the message.

You work as an Enterprise Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a logging utility class using .NET Framework 3.5. The utility class writes logs to event log services. You are required to ensure that the client applications that use the utility class can create an instance of the utility class only if they have access rights to write to the event log services.

What will you do?

A.

Use role based security in the class constructor.

B.

Use declarative security check on the assembly.

C.

Use role based security on the class.

D.

Use code access security on the class.

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows Forms application using .NET Framework 3.5. You use LINQ expressions to read a list of employees from the following XML file:

Sam Paul

Kelly Smith

Joe Healy

Matt Hardy

Tom Altar

Jeff Hay

Kim Shane

Mike Ray

Allen Ryan

Jackline Beneath

Adam Ford

Mike Tyson

You are required to obtain a list of names of employees who are 23 years or older. Which of the following code segments will you use?

A.

XDocument employees = XDocument.Load("Employees.xml");

var results = from c in employees Descendants() where ((DateTime)c.Attribute

("birthDate")).AddYears(23) < DateTime.Now

select new { FullName = c.Value };

B.

XDocument employees = XDocument.Load("Employees.xml");

var results = from c in employees Descendants("employee") where ((DateTime)c.Attribute

("birthDate")).AddYears(23) < DateTime.Now

select c Attribute("Name");

C.

XDocument employees = XDocument.Load("Employees.xml");

var results = from c in employees Descendants("employee") where ((DateTime)c.Attribute

("birthDate")).AddYears(23) < DateTime.Now

select c Element("employee");

D.

XDocument employees = XDocument.Load("Employees.xml");

var results = from c in employees Descendants("employee") where ((DateTime)c.Attribute

("birthDate")).AddYears(23) < DateTime.Now

select new { FullName = c.Value };

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a class library using the .NET Framework. The library will be used to open the NSCs of computers. Later, you will set up the class library to the GAC and provide it Full Trust permission. You write down the following code segments for the socket connections:

SocketPermission permission = new SocketPermission(PermissionState.Unrestricted); permission.Assert();

A number of the applications that use the class library may not have the necessary permissions to open the network socket connections. Therefore, you are required to withdraw the assertion. Which of the following code segments will you use to accomplish the task?

A.

CodeAccessPermission.RevertDeny();

B.

permission.Demand();

C.

permission.Deny();

D.

permission.PermitOnly();

E.

CodeAccessPermission.RevertAssert();

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. You create an application using the .NET Framework. You need to use the regular expressions to provide a concise and flexible means for identifying strings of text of interest, such as particular characters, words, or patterns of characters. Which operation will you use to construct the regular expressions?

Each correct answer represents a complete solution. Choose all that apply.

A.

Quantification

B.

Grouping

C.

Alternation

D.

Phishing

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows Forms

application using .NET Framework 3.5. You need to execute a method named ProcAmount in the background of the application. The method requires that an integer value 101 is passed to it. You are required to pass an integer value 101 to start a background thread. Which of the following code segments should you use?

Each correct answer represents a part of the solution. Choose two.

A.

ParameterizedThreadStart tStart;

tStart = new ParameterizedThreadStart(ProcAmount);

Thread thd = new Thread(tStart);

B.

thd.Start(101);

C.

ThreadStart tStart = new ThreadStart(ProcAmount);

Thread thd = new Thread(tStart, 101);

D.

thd.Start();

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2008 as its application development platform. You create an ASP.NET Web application using the .NET Framework 3.5. The application uses Session objects. You are changing the application to run on a Web farm. You want to make sure that the application can access the Session objects from all the servers in the Web farm. You also make sure that when any server in the Web farm restarts or stops responding, the Session objects are not lost. What will you do?

A.

Use InProc Session Management mode to store session data in the ASP.NET worker process

B.

Use StateServer Session Management mode to store session data in a common State Server process on a Web server in the Web farm

C.

Use SQLServer Session Management mode to store session data in an individual database for each Web server in the Web farm

D.

Use SQLServer Session Management mode to store session data in a common Microsoft SQL Server 2005 database

Lewis works as a Web Developer for TechNet Inc. He develops an ASP.NET application named App1 by using Visual Studio .NET. Lewis wants to allow everyone access to the application. However, he does not want to implement any type of Windows authentication. Which of the following authentication methods will he use to accomplish this task?

A.

Basic authentication

B.

Anonymous authentication

C.

Digest authentication

D.

Integrated Windows authentication

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a remoting application that provides stock information to customers using .NET Framework. The server component raises an event on the client computer when certain conditions are met. You must ensure that the server raises exactly one event for each client application that is registered for the event. What will you do to accomplish this task?

A.

Configure the server class as a SingleCall Activated Object (SAO) and check for duplicate client delegate methods before raising the event.

B.

Configure the server class as a Singleton Activated Object (SAO) and check for duplicate client delegate methods before raising the event.

C.

Configure the server class as a Client Activated Object (CAO) and override the CreateObjRef method to check for duplicate client delegate methods before raising the event.

D.

Configure the server class as a Client Activated Object (CAO) and check for duplicate client delegate methods before raising the event.

Dilton works as a Software Developer for GREC Research Center (Central). This research center has its subsidiaries in several different cities. Dilton wants to retrieve a Soil Test Report for the Geological Survey Department. He wants the test report to be available to all the members of the department over the Internet. He creates an XML Web service named SampleReport. SampleReport contains a Web method named SoilTestDetails that requires additional security.

Dilton decides to use generic role-based security to secure the SoilTestDetails method from unauthorized users. Dilton writes code to ensure that once a user is authenticated, a user identity named Generic is created. The Generic user identity has a group membership named GeoSurvey to allow the authenticated users access to the SoilTestDetails Web method. Which of the following code segments should Dilton use to accomplish the task?

A.

GenericIdentity GenIdentity = new GenericIdentity("Generic", "Custom");

string[] GeoRoles = {"GeoSurvey"};

GenericPrincipal GeoPrincipal = new GenericPrincipal(GenIdentity, GeoRoles);

Thread.CurrentPrincipal = GeoPrincipal;

B.

IIdentity GeoIdentity = new GenericIdentity("Generic", "Custom");

WindowsIdentity WinGeoIdentity = (WindowsIdentity) GeoIdentity;

string[] GeoRoles = {"GeoSurvey"};

GenericPrincipal GenGeoPrincipal = new GenericPrincipal(WinGeoIdentity, GeoRoles );

WindowsIdentity.Impersonate(WinGeoIdentity.Token);

C.

IIdentity GeoIdentity = new GenericIdentity("Generic", "GeoSurvey");

IPrincipal GeoPrincipal = new WindowsPrincipal((WindowsIdentity) GeoIdentity);

Thread.CurrentPrincipal = GeoPrincipal;

D.

System.Security.Principal.IIdentity MyGenericIdentity = new GenericIdentity("Generic",

"Custom");

string[] GeoRoles = {"GeoSurvey"};

GenericPrincipal GenGeoPrincipal = new GenericPrincipal(MyGenericIdentity, GeoRoles);

MyGenericIdentity = WindowsIdentity.GetCurrent();

Ryan works as a Software Developer for Mansoft Inc. He creates an ASP.NET Web application named MyWebApplication using Visual Studio .NET 2005. MyWebApplication performs validation on XML files in a directory. Whenever a new XML file appears in the directory, MyWebApplication opens the file, checks it for validation, and updates it accordingly. Ryan wants to ensure that each update performed on XML files is logged in the Web application log. He creates a String object named Var1, to store the message to be logged. Which of the following will he use to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

A.

The EventLog.Source property

B.

The EventLog.WriteEntry method

C.

The Trace.WriteLine method

D.

The EventLog.EventLogSource property

David works as a Software Developer for GenTech Inc. He defines an interface, named Interface1.

Interface1 contains the following code:

public interface Interface1

{

// Code goes here.

}

David creates a serviced component, named Component1, which implements Interface1. Which of the following code will he add to Component1 to ensure that it is built properly?

A.

[ClassInterface(ClassInterfaceType.AutoDual)]

public class Component1 : ServicedComponent, Interface1

{

// Code goes here.

}

B.

[GuidAttribute("9ED54F84-A89D-4fcd-A854-44251E925F09")]

public class Component1 : ServicedComponent, Interface1

{

// Code goes here.

}

C.

[ClassInterface(ClassInterfaceType.AutoDispatch)]

public class Component1 : ServicedComponent, Interface1

{

// Code goes here.

}

D.

public class Component1 : ServicedComponent, Interface1

{

// Code goes here.

}

Peter works as a Software Developer for PatSoluTech Inc. He develops a Web application using Visual Studio .NET. The application contains an online ordering Web form named WebForm1. WebForm1 contains several Web server controls that include a TextBox control named TextBox1 and an ImageButton control named ImageButton1. He wants data entered in TextBox1 to be validated whenever ImageButton1 is clicked. Which of the following will Peter use to accomplish the task?

A.

ImageButton1.CausesValidation

B.

ImageButton1.OnClientClick

C.

ImageButton1.ValidationGroup

D.

ImageButton1.Enabled

You work as a Software Developer for ABC Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. The application will be used by all the branches of the company. You sometimes require a variable number of arguments to be passed to a method. For example, you may require a sum method, which calculates the total of the numbers passed to it no matter how many numbers are passed. What will you do to accomplish the task?

A.

Use the out keyword.

B.

Use the base keyword.

C.

Use the volatile keyword.

D.

Use the params keyword.

E.

Use the ref keyword.

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application using .NET Framework 2.0. You are using regular expression in the application to validate email, phone number, etc. You are required to match any single character except "\n". Which of the following wildcard characters will you use to accomplish the task?

A.

x/y

B.

+

C.

?

D.

.

What is the difference between Data Encryption Standard (DES) and Data Encryption Algorithm (DEA)?

A.

DES is the modified Lucifer algorithm and DEA is the original.

B.

DES itself is referred to as DEA.

C.

DES is insecure, whereas DEA is secure.

D.

DES is a standard and DEA is an algorithm.

Which of the following options is not a primary objective of the WS-Security 1.1 specification?

A.

Integrity

B.

Confidentiality

C.

Authentication

D.

Validation

You work as a Web Administrator for BlueWell Inc. The company's sales employees access the Web server from remote locations via the Internet using Netscape Navigator or Internet Explorer. You want to secure the Web server. To secure the Web server, you want to use cookieless forms authentication. Which of the following properties will you use to accomplish the task?

A.

FormsCookiePath

B.

CookieDomain

C.

CookieMode

D.

FormsCookieName

Which of the following is the best encryption algorithm to encrypt and decrypt messages?

A.

AES

B.

TripleDES

C.

DES

D.

RSA

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. You have recently finished development of a Windows application using .NET Framework. Users report that the application is not running properly. When the users try to complete a particular action, the following error message comes out:

Unable to find assembly 'myservices, Version=1.0.0.0, Culture=neutral,

PublicKeyToken=29b5ad26c9de9b95'.

You notice that the error occurs as soon as the application tries to call functionality in a serviced component that was registered by using the following command:

regsvcs.exe myservices.dll

You must make sure that the application can call the functionality in the serviced component with no exceptions being thrown. What will you do to accomplish this task?

A.

Run the command line tool: regasm.exe myservices.dll.

B.

Copy the serviced component assembly into the C:\Program Files\ComPlus Applications fold er.

C.

Run the command line tool: gacutil.exe /i myservices.dll.

D.

Copy the serviced component assembly into the C:\WINDOWS\system32\Com folder.

Page: 2 / 8
Total 491 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved