Beruflich Dokumente
Kultur Dokumente
Sample Questions: Anti Patterns
1. Which of the following anti pattern is useful when we are working with legacy
systems
a. The Blob
b. Spaghetti Code
c. Cut and paste programming
d. Poltergeist
Answer: a
2. While designing software, when we need to use Anti Patterns?
a. When benefits exceed consequences
b. When consequences exceed benefits
c. When we want to offer spontaneous solution
Answer: b
3. In which of the Anti Pattern, the class knows more than that is required?
a. Object Cess Pool
b. YoYo Problem
c. God Object
d. Cut and Paste Programming
Answer: c
Infosys Sample Questions for Technology 252
ER/CORP/CRS/ Technology 252/013 Confidential Ver. No 1.0 4
Sample Questions: Security in .NET
1. Select the true statement about WCS
a. WCS does not use Kerberos tickets as a security token when information
is transmitted on the network.
b. Infocard contains information regarding the identity provider to be
contacted for security tokens.
c. Where users choose their own usernames and passwords, CardSpace
includes a self-issued identity provider.
d. CardSapce allows creation of information cards by self-issued identity
providers too.
Answer: b, c, d
2. Authorization decisions could be made based on
a. Role
b. Principals Identity.
c. Both Role and principals Identity.
d. None of the above.
Answer: c
3. Denial of Service attacks can be counteracted by:
a. Using resource and bandwidth throttling techniques.
b. Use least privileged service accounts to run processes and access
resources.
c. Use digital signatures.
d. Use strong authorization
Answer: a
4. Select true statements on SQL Injection:
a. Results when an application consumes a particular resource, such as
threads or database connections.
b. Results when applications are forced to repeat intensive calculations or
processes.
c. Occurs when a user enters values that alter the original intention of the
SQL statement.
d. It is term used for an attempt to gain access to a system by using a false
identity.
Answer: c
Infosys Sample Questions for Technology 252
ER/CORP/CRS/ Technology 252/013 Confidential Ver. No 1.0 5
5. This code access permission enable your code and downstream callers to perform
actions that your code has permission to do, but its callers might not have
permission to do. This method will also tell the security system not to check the
callers of your code for permission. Select the appropriate one from the list
below:
a. Demands.
b. Overrides.
c. Permit Only
d. Assert
Answer: d.
Sample Questions: Advanced .Net Debugging
1. Which one of the following is TRUE about the CLR profiler?
a) It is not possible to present the data in the graphical format
b) It cannot profile services in .NET
c) Cannot attach to a running application
d) It cannot use .NET profiler APIs for tracking allocations
Answer: c
2. Which one of the following is NOT a reason for ASP .NET application restart that
has dependency assembly in the GAC?
a) Global.asax file is modified
b) Web.config file is modified
c) Physical path of virtual directory is changed
d) New version of a dependency assembly is loaded on to the GAC
Answer: d
3. Which one of the following is FALSE about the METHOD TABLE of .NET runtime
within a process?
a) It contains information about number of modules and its interfaces
b) It is a data structure used to manage access to reference types
c) It has the entry point to the methods of the class
d) It contains the address of the method implementation
Answer: a
4. When an application is not working as expected and is identified as a problem
with the managed memory, which of heaps need to be examined to take action?
Infosys Sample Questions for Technology 252
ER/CORP/CRS/ Technology 252/013 Confidential Ver. No 1.0 6
Choose 3 that apply
a) Managed heap
b) Loader heap
c) Native heap
d) Module heap
Answer: a, b and c
Sample Questions: VSTS Test Management
1. _________________ Property of Visual Studio can be used for each request of
Web Test.
a. Transport method property, GET or POST.
b. Transport method property, GET.
c. Transport method property,POST.
d. None of the options.
Answer: d
2. Which of the following is true about validation rules?
i) It evaluates the existence of text, tags or attributes on the page and help in
determining that a Web application is working correctly.
ii) It also verifies the browser used to place a server request.
iii) It also verifies the existence of form fields and their values.
a. Only i) & ii).
b. Only i) & iii).
c. Only i).
d. All the given options.
Answer: b
3. ________________ access method moves sequentially through the data, row-
by-row, but only one time for each record. It does not loop.
a. Sequential
b. Random Move
c. Unique
Answer: c
4. ______________ rules evaluate the existence of text, tags or attributes on the
page and help in determining that a Web application is working correctly.
Infosys Sample Questions for Technology 252
ER/CORP/CRS/ Technology 252/013 Confidential Ver. No 1.0 7
a. Validation
b. Extraction
c. Both Validation & Extraction
Answer: a
5. ______________ rules store results in the test context as name value pairs.
a. Validation
b. Extraction
c. Both Validation & Extraction
d. None of the options
Answer: b