Sie sind auf Seite 1von 0

Education and Research Department

Sample Questions for .NET Technology 252


May, 2010








Document No. Authorized By Ver. Rev Signature / Date
ER/CORP/CRS/Technology 252/013
B M Subraya
1.0 May, 2010
Infosys Copyright Notice
__________________________________________________________________________
ER/CORP/CRS/Technology 252/013 Confidential Ver. No 1.0 ii
COPYRIGHT NOTICE

All ideas and information contained in this document are the intellectual property of
Education and Research Department, Infosys Technologies Limited. This document is not
for general distribution and is meant for use only for the person they are specifically issued
to. This document shall not be loaned to anyone, within or outside Infosys, including its
customers. Copying or unauthorized distribution of this document, in any form or means
including electronic, mechanical, photocopying or otherwise is illegal.

Education and Research Department
Infosys Technologies Limited
Electronic City
Hosur Road
Bangalore - 561 229, India.

Tel: 91 80 852 0261-270
Fax: 91 80 852 0362
www.infosys.com
mailto:E&R@infosys.com
Infosys Document Revision History

_______________________________________________________________________
ER/CORP/CRS/Technology 252/013 Confidential Ver. No 1.0 iii
Document Revision History

Ver.
Revision
Date Author(s) Reviewer(s) Description
1.0 20-May-2010 Sachin Kumar -
Initial base lined
version
Infosys Sample Questions for Technology 252
ER/CORP/CRS/ Technology 252/013 Confidential Ver. No 1.0 1

Contents

Sample Questions: Overview of Software Architecture.................................................... 2


Sample Questions: Anti Patterns....................................................................................... 3
Sample Questions: Security in .NET................................................................................. 4
Sample Questions: Advanced .Net Debugging ................................................................. 5
Sample Questions: VSTS Test Management ................................................................. 6

Infosys Sample Questions for Technology 252
ER/CORP/CRS/ Technology 252/013 Confidential Ver. No 1.0 2

Sample Questions for .NET Technology 252
Sample Questions: Overview of Software Architecture

1. Which of the following are the common themes of Software Architecture?
(Choose exactly two options)

a. Architecture defines the rationale behind the components
b. Architecture defines the rationale behind the structure
c. Architecture definitions define what a component is
d. Architecture is always a single structure

Answer: a and b


2. Which of the following necessitates Software Architecture? (Choose exactly two
options)

a. At the enterprise level, Software Architecture provides a reference to
move the enterprise to defined technology goals
b. Software Architecture is the artifact that holds the key to post-deployment
system understanding or mining efforts
c. At the enterprise level, Software Architecture does not establish/enforce
compliance to standards
d. Software Architecture does not support risk and change management

Answer: a and b


3. Fault tolerance and recoverability are the quality attributes of:

a. Functionality
b. Reliability
c. Usability
d. Maintainability

Answer: b


4. Architectural style represents: (Choose exactly two options)

a. Named collection of architectural design decisions in a typical context
b. Recurring organizational patterns and idioms
c. One's own wisdom in system development
d. Unique composition of components

Infosys Sample Questions for Technology 252
ER/CORP/CRS/ Technology 252/013 Confidential Ver. No 1.0 3

Answer: a and b


5. Use of Global data in a programming language represents which of the below
style?

a. Layered style
b. Traditional-language influenced style
c. Interpreter
d. Shared Memory

Answer: d


Sample Questions: Anti Patterns

1. Which of the following anti pattern is useful when we are working with legacy
systems

a. The Blob
b. Spaghetti Code
c. Cut and paste programming
d. Poltergeist

Answer: a


2. While designing software, when we need to use Anti Patterns?

a. When benefits exceed consequences
b. When consequences exceed benefits
c. When we want to offer spontaneous solution

Answer: b


3. In which of the Anti Pattern, the class knows more than that is required?

a. Object Cess Pool
b. YoYo Problem
c. God Object
d. Cut and Paste Programming

Answer: c



Infosys Sample Questions for Technology 252
ER/CORP/CRS/ Technology 252/013 Confidential Ver. No 1.0 4

Sample Questions: Security in .NET

1. Select the true statement about WCS

a. WCS does not use Kerberos tickets as a security token when information
is transmitted on the network.
b. Infocard contains information regarding the identity provider to be
contacted for security tokens.
c. Where users choose their own usernames and passwords, CardSpace
includes a self-issued identity provider.
d. CardSapce allows creation of information cards by self-issued identity
providers too.

Answer: b, c, d


2. Authorization decisions could be made based on

a. Role
b. Principals Identity.
c. Both Role and principals Identity.
d. None of the above.

Answer: c


3. Denial of Service attacks can be counteracted by:

a. Using resource and bandwidth throttling techniques.
b. Use least privileged service accounts to run processes and access
resources.
c. Use digital signatures.
d. Use strong authorization

Answer: a


4. Select true statements on SQL Injection:

a. Results when an application consumes a particular resource, such as
threads or database connections.
b. Results when applications are forced to repeat intensive calculations or
processes.
c. Occurs when a user enters values that alter the original intention of the
SQL statement.
d. It is term used for an attempt to gain access to a system by using a false
identity.

Answer: c


Infosys Sample Questions for Technology 252
ER/CORP/CRS/ Technology 252/013 Confidential Ver. No 1.0 5

5. This code access permission enable your code and downstream callers to perform
actions that your code has permission to do, but its callers might not have
permission to do. This method will also tell the security system not to check the
callers of your code for permission. Select the appropriate one from the list
below:

a. Demands.
b. Overrides.
c. Permit Only
d. Assert

Answer: d.



Sample Questions: Advanced .Net Debugging

1. Which one of the following is TRUE about the CLR profiler?

a) It is not possible to present the data in the graphical format
b) It cannot profile services in .NET
c) Cannot attach to a running application
d) It cannot use .NET profiler APIs for tracking allocations

Answer: c


2. Which one of the following is NOT a reason for ASP .NET application restart that
has dependency assembly in the GAC?

a) Global.asax file is modified
b) Web.config file is modified
c) Physical path of virtual directory is changed
d) New version of a dependency assembly is loaded on to the GAC

Answer: d


3. Which one of the following is FALSE about the METHOD TABLE of .NET runtime
within a process?

a) It contains information about number of modules and its interfaces
b) It is a data structure used to manage access to reference types
c) It has the entry point to the methods of the class
d) It contains the address of the method implementation

Answer: a


4. When an application is not working as expected and is identified as a problem
with the managed memory, which of heaps need to be examined to take action?
Infosys Sample Questions for Technology 252
ER/CORP/CRS/ Technology 252/013 Confidential Ver. No 1.0 6

Choose 3 that apply

a) Managed heap
b) Loader heap
c) Native heap
d) Module heap

Answer: a, b and c



Sample Questions: VSTS Test Management

1. _________________ Property of Visual Studio can be used for each request of
Web Test.

a. Transport method property, GET or POST.
b. Transport method property, GET.
c. Transport method property,POST.
d. None of the options.

Answer: d


2. Which of the following is true about validation rules?
i) It evaluates the existence of text, tags or attributes on the page and help in
determining that a Web application is working correctly.
ii) It also verifies the browser used to place a server request.
iii) It also verifies the existence of form fields and their values.
a. Only i) & ii).
b. Only i) & iii).
c. Only i).
d. All the given options.

Answer: b


3. ________________ access method moves sequentially through the data, row-
by-row, but only one time for each record. It does not loop.

a. Sequential
b. Random Move
c. Unique

Answer: c


4. ______________ rules evaluate the existence of text, tags or attributes on the
page and help in determining that a Web application is working correctly.
Infosys Sample Questions for Technology 252
ER/CORP/CRS/ Technology 252/013 Confidential Ver. No 1.0 7


a. Validation
b. Extraction
c. Both Validation & Extraction

Answer: a
5. ______________ rules store results in the test context as name value pairs.

a. Validation
b. Extraction
c. Both Validation & Extraction
d. None of the options

Answer: b

Das könnte Ihnen auch gefallen