Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GSSP-.NET GIAC GIAC Secure Software Programmer - C#.NET Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GSSP-.NET GIAC GIAC Secure Software Programmer - C#.NET certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 7 / 8
Total 491 questions

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows application using .NET Framework 3.5. The application will process one million records in a production environment. Therefore, you need to test the application by using 7,500 records in a limited test environment to identify potential problems that might arise when the application is moved to the production environment. What will you do?

Each correct answer represents a part of the solution. Choose two.

A.

Test the resource files.

B.

Test the thread pool pattern usage.

C.

Test the collection type usage.

D.

Test the number of MSI files used for deployment.

Martin works as a Software Developer for BlueWell Inc. He creates an ASP.NET application, named App1. During beta testing of App1, he ensures that the actual ASP.NET error messages are displayed whenever errors are encountered. He also ensures that both developers and beta testers see the actual text of the error messages.

During beta testing of App1, Martin performs beta testing of other applications also on the same test server. All the other applications display the ASP.NET error messages. After completing beta testing, Martin promotes the beta test server to a production server. He wants all the applications to display a single, user-friendly error message. Martin also wants to configure App1 and the production server to meet these goals. He removes the customErrors element from the Web.config file for App1. What else will he do to accomplish the required task with minimum administrative effort?

A.

In the Web.config file for App1, add the following element:

B.

In the App1.config file, add the following element:

C.

In the App1.config file, add the following element:

D.

In the Machine.config file, add the following element:

E.

In the Machine.config file, add the following element:

F.

In the Web.config file for App1, add the following element:

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows application using .NET Framework 3.5. The application captures account information. The account number has the following specifications:

l It holds literal and input characters of the alphanumeric type.

l It has a predefined format.

You must ensure that the account number is in the correct format. You must also ensure that only input characters are accepted from users. What will you do?

A.

Use a RichTextBox control and create a regular expression to validate the format.

B.

Use a TextBox control and bind it to a string that has the required format.

C.

Use a MaskedTextBox control and create a mask to validate the format.

D.

Use a TextBox control and create a regular expression to validate the format.

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You are creating an application that reads data from and writes data to a file using the .NET Framework 2.0. You want to restrict users to read characters from a byte stream and write characters to a stream. Which of the following classes will you use to accomplish the task?

Each correct answer represents a part of the solution. Choose two.

A.

StringReader

B.

StringWriter

C.

StreamReader

D.

StreamWriter

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating an assembly. The assembly contains a public method. The Global Assembly Cache contains a second assembly. You require that the public method is only called from the second assembly. Which of the following permission classes will you use to accomplish this task?

A.

DataProtectionPermission

B.

DBDataPermission

C.

StrongNameIdentityPermission

D.

GacIdentityPermission

E.

PublisherIdentityPermission

Mark works as a Software Developer for BlueWell Inc. He develops four Windows-based applications using Visual Studio .NET. All the applications use an assembly, named Assembly1. Mark deploys the applications on the company's intranet. Later, he modifies Assembly1 and wants to ensure that all the applications use the latest version of Assembly1. Which of the following files will Mark use to accomplish this?

A.

Publisher policy configuration file

B.

Security configuration file

C.

Machine configuration file

D.

Application configuration file

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. You create a Windows service application using the .NET Framework. You are required to synchronize execution of some resources across multiple processes.

What will you do to accomplish this task?

A.

Use the Mutex class.

B.

Use the Monitor class.

C.

Use the ThreadPool class.

D.

Use the Interlocked class.

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an ASP.NET Web application using .NET Framework 3.5. The application can be run only by a specific set of user credentials. Therefore, other applications are not permitted to employ these user credentials. The ASP.NET application uses asymmetric encryption to encrypt and decrypt messages to other servers. You are required to shield the private key that is used to encrypt and decrypt messages that are accessed by other users or applications on the same server. What will you do to accomplish the task?

A.

Use the Triple Data Encryption Standard algorithm to encrypt the key.

B.

Use the Secure Sockets Layer protocol.

C.

Use the DataProtectionPermission class.

D.

Use the ProtectedData class.

E.

Store the private key in the App_Data directory.

You work as a Windows Application Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You create a Windows Forms application using .NET Framework 3.5. You need to execute a method named ProcAmount in the background of the application. The method requires that an integer value 101 is passed to it. You are required to pass an integer value 101 to start a background thread. Which of the following code segments should you use?

Each correct answer represents a part of the solution. Choose two.

A.

thd.Start(101);

B.

ParameterizedThreadStart tStart; tStart = new ParameterizedThreadStart(ProcAmount);

Thread thd = new Thread(tStart);

C.

thd.Start();

D.

ThreadStart tStart = new ThreadStart(ProcAmount);

Thread thd = new Thread(tStart, 101);

You work as a Software Developer for Mansoft Inc. You create an application. You want to use the application to encrypt data. You use the HashAlgorithmType enumeration to specify the algorithm used for generating Message Authentication Code (MAC) in Secure Sockets Layer (SSL) communications. Which of the following are valid values for HashAlgorithmType enumeration?

Each correct answer represents a part of the solution. Choose all that apply.

A.

RSA

B.

None

C.

DES

D.

MD5

E.

SHA1

F.

3DES

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2008 as its application development platform. You are creating an ASP.NET Web application using .NET Framework 3.5. The application will be accessed by users from remote locations over the Internet. You need to use ASP.NET role management. You must ensure that any authorization information cached on remote client computers is as secure as possible. What will you do?

A.

Use the RsaProtectedConfigurationProvider class.

B.

Use the DpapiProtectedConfigurationProvider class.

C.

Set the cookieProtection attribute to Validation in the roleManager element of the Web.conf ig file.

D.

Set the cookieProtection attribute to Encryption in the roleManager element of the Web.con fig file.

You work as a Software Developer for ManSoft Inc. The company uses Visual Studio.NET as its application development platform. You create an application using the .NET Framework. You use ManSoft's intranet to deploy the application to client computers. You use the security configuration of the .NET Framework to configure security for the application at the enterprise policy level. Virus attacks caused the IT manager at ManSoft Inc. to tighten the security at the machine level. Users reported that they could no longer execute the application. Which of the following options will you use to resolve this issue?

A.

Include the LevelFinal attribute in the intranet code group policy at the enterprise level by using the Code Access Security Policy tool (Caspol.exe).

B.

Include the Exclusive attributes in the intranet code group policy at the enterprise level by using the Code Access Security Policy tool (Caspol.exe).

C.

Include the LevelFinal attribute in the intranet code group policy at the enterprise level by using the Permission View tool (Permview.exe).

D.

Include the Exclusive attribute in the intranet code group policy at the enterprise level by using the Permission View tool (Permview.exe).

You work as a Software Developer for ManSoft Inc. The company has several branches worldwide. The company uses Visual Studio.NET 2005 as its application development platform. You create an application that will be used by all the branches of the company. You want to use declarative attributes that configure security for a serviced component of the application. Which of the following attributes will you use in order to support component, interface, or method level role checks?

A.

SecureMethod

B.

ComponentAccessControl

C.

SecurityRole

D.

ApplicationAccessControl

You work as a Software Developer for ABC Inc. The Company uses .NET Framework as its application development platform. You are writing a method that might throw an exception at several points during its execution. You need to run several lines of code after the method runs, whether or not an exception occurs. Which of the following blocks will you use to accomplish this task?

A.

Catch

B.

Finally

C.

Try

D.

Throw

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You need to write a code segment that transfers the contents of a byte array named ToSend by using a NetworkStream object named NetStr. You want to use a cache of size only 8,192 bytes. Which of the following code segments will you use to accomplish the task?

A.

MemoryStream MStream = new MemoryStream(8192); NetStr.Write(ToSend, 0, (int) MStream.Length);

B.

BufferedStream BStream = new BufferedStream(NetStr); BStream.Write(ToSend, 0, 8192);

C.

BufferedStream BStream = new BufferedStream(NetStr, 8192); BStream.Write(ToSend, 0, ToSend.Length);

D.

MemoryStream MStream = new MemoryStream(8192); MStream.Write(ToSend, 0, (int) NetStr.Length);

You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a remoting application that provides stock information to customers using .NET Framework. The server component raises an event on the client computer when certain conditions are met. You must ensure that the server raises exactly one event for each client application that is registered for the event. What will you do to accomplish this task?

A.

Configure the server class as a Singleton Activated Object (SAO) and check for duplicate client delegate methods before raising the event.

B.

Configure the server class as a Client Activated Object (CAO) and override the CreateObjRef method to check for duplicate client delegate methods before raising the event.

C.

Configure the server class as a SingleCall Activated Object (SAO) and check for duplicate client delegate methods before raising the event.

D.

Configure the server class as a Client Activated Object (CAO) and check for duplicate client delegate methods before raising the event.

You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a method to hash data with the Secure Hash Algorithm (SHA) using .NET Framework. The hash data is passed to the method as a byte array named msg. You are required to calculate the hash of the msg array by using the SHA1. It is also mandatory to place the result into a byte array named Myhash. Which of the following code segments should you use to accomplish the task?

A.

SHA1 Mysha1 = new SHA1CryptoServiceProvider();

Mysha1.GetHashCode();

byte[] Myhash = Mysha1.Hash;

B.

SHA1 Mysha1 = new SHA1CryptoServiceProvider();

byte[] Myhash = null;

Mysha1.TransformBlock(msg, 0, msg.Length, Myhash, 0);

C.

SHA1 Mysha1 = new SHA1CryptoServiceProvider();

byte[] Myhash = BitConverter.GetBytes(Mysha1.GetHashCode());

D.

SHA1 Mysha1 = new SHA1CryptoServiceProvider();

byte[] Myhash = Mysha1.ComputeHash(msg);

You work as a Web Application Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You are creating a Web application using .NET Framework 2.0. The application will be used in Local Area Network (LAN). The Web application reads comma enclosed text files. The text files exist in a subdirectory under the Web application's root directory. You must ensure that users never directly navigate to these files in a Web browser if they are not members of the Accounting role. You are required to write an ASP.NET HTTP handler that will use the FileAuthorizationModule class. Which of the following forms of authentications will you use?

A.

Forms

B.

Mutual

C.

Microsoft Windows Integrated Security

D.

Anonymous

Peter works as a Software Developer for GenTech Inc. He develops an application named App1 using Visual Studio .NET. App1 uses an assembly named Assembly1. Peter installs App1 and Assembly1 to the C:\Program Files\App1 and C:\Program Files\Assembly1 folders respectively. While executing App1, Peter finds that App1 fails to execute with TypeLoadException. What will he do to resolve this issue.

Each correct answer represents a part of the solution. Choose all that apply.

A.

Uninstall Assembly from the C:\Program Files\Assembly1 folder.

B.

Reinstall Assembly1 to the C:\Windows\Microsoft .NET Framework\Assembly1 folder.

C.

Reinstall Assembly1 to the C:\Program Files\App1 folder.

D.

Change the system path to C:\Program Files\Assembly1.

Sandra works as a Software Developer for ABC Inc. She develops a Windows form named MyForm1. She wants to add a Button control named button1 to a Panel control named panel1 at runtime. Therefore, she writes the following code:

1. private void MyForm1_Load(object sender, EventArgs e)

2. {

3. Button button1 = new Button();

4. button1.Location = new Point(50,50);

5. button1.Size = new Size(100, 30);

6. button1.Text = "My First button";

7. Panel panel1 = new Panel();

8. panel1.Location = new Point(10, 100);

9. // Write code here

10. // Write code here

11. }

Which of the following code statements will Sandra write in line numbers 9 and 10? (Line numbers are for reference only.)

Each correct answer represents a part of the solution. Choose two.

A.

She will write the following code statement in line number 9:

Form1.Controls.Add(button1);

B.

She will write the following code statement in line number 9:

this.Controls.Add(button1);

C.

She will write the following code statement in line number 9:

this.Controls.Add(panel1);

D.

She will write the following code statement in line number 10:

button1.Controls.Add(panel1);

E.

She will write the following code statement in line number 10:

panel1.Controls.Add(button1);

Page: 7 / 8
Total 491 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved