Sie sind auf Seite 1von 13

1

Encryption should be used :


A. To validate critical data. B. To store large amount of data. C. To store sensitive data.

2 To override the external stylesheet(s) used by the HTML or ASPX page, use the __________ property.

A. LinkedStylesheets B. StyleSheet C. Metadata

3 ____________ allows you to retrieve content in master pages dynamically from locations other than the file systems.

A. PathProvider B. Virtual Path C. VirtualFile D. VirtualDirectory

4 The _________ tool is used to install an assembly in the GAC.

A. gacpub.exe

B. gacutil.exe C. gacinst.exe

5 _________ can be shared across multiple applications on a web server.

A. Public assemblies B. Private assemblies C. Global assemblies

6 Which one of the following attributes specifies that the profile data should be stored for the anonymous users?

A. type B. serializeAs C. allowAnonymous D. defaultValue

7 The IIS manager is displayed when you type ________ in the Run dialog box.

A. iexpress B. icwonn1 C. inetmgr

D. inetwiz

8 ______________ is used to verify the identity of a user before allowing or denying a request.

A. Authentication B. Authorization C. Impersonation D. Security

9 The ________________ option provides a set of predefined templates that enable you to set the display of the Login control
A. Auto Format B. Complete C. SignUp D. View as Template

10 In _____________, the application acts on behalf of a user whose identity is authenticated using IIS.
A. Authentication

B. Authorization C. Impersonation D. Security

11 In __________ authentication, HTML forms are used to collect authentication information.

A. Custom B. Forms-based C. Passport D. Windows

12 In __________ authentication, encrypted cookies are used to identify and validate users.

A. Custom B. Forms-based C. Passport D. Windows

13 In __________ authentication, the IIS is configured to allow only users on a Windows domain to log on to the application.

A. Custom B. Forms-based C. Passport D. Windows

14 Which of the following statements about web.config and machine.config files are true?
A. The machine.config file overrides default settings provided by the web.config file. B. The machine.config file contains XML elements to define the session state. C. The web.config file overrides default settings provided by the machine.config file. D. The web.config file contains XML elements to define the session state.

1. A, B 2. B, C 3. C, D 4. D, A

15 Which are the additional settings, other than the configuration settings, defined by the Microsoft ASP.NET Web Site Administration Tool?
A. application B. debugging C. section D. security

16 Which of the following tags contain configuration elements related to session state, custom errors, authentication, database connection string, file path and so on?

A. appSettings B. System.config C. namespaces D. system.Web

17 Which of the following statements about ASP.NET configuration settings are correct?
A. Application settings help you to configure the SMTP server, define default error

pages and change the status of an application. B. C. Provider settings help you to configure the behavior of the ASP.NET application. Security settings help you to create and manage users, define and assign roles

and rules to users.

1. A, B

2. A, C 3. B, C 4. A, B, C

18 Which of the following statements about Microsoft ASP.net Web Site Administration Tool's tabs are incorrect?

A. B. C. D.

The Home tab displays information about the host machine. The Security tab allows you to debug and trace related settings. The Application tab allows you to define and assign roles to users. The Provider tab helps you to define a database provider.

1. A, B 2. B, C 3. C, D 4. D, A

19

Which one of the following code will help to deny access to files through browser having .xls as file name extension? A. <httpHandlers> <add file="*.xls" verb="*" type="System.Web.HttpForbiddenHandler"/> </httpHandlers>

B. <httpHandlers> <add pathname="*.xls" verb="*" type="System.Web.HttpForbiddenHandler"/>

</httpHandlers>

C. <httpHandlers> <deny path="*.xls" verb="*" type="System.Web.HttpForbiddenHandler"/> </httpHandlers>

D. <httpHandlers> <add path="*.xls" verb="*" &nb

1. A 2. B 3. C 4. D

20 Suppose you want to display a message "Welcome Guest" when a user visits the login.aspx page of the Web site for the first time. Which one of the following code will help you to achieve this task?

A. <asp:LoginView id="login" runat="server"> <AnonymousTemplate> Welcome Guest </AnonymousTemplate> </asp:LoginView>

B. <asp:LoginView id="login" runat="server"> <LoggedInTemplate> Welcome Guest </LoggedInTemplate> </asp:LoginView>

C. <asp:LoginView id="login" runat="server"> <Template> Welcome Guest <Template> </asp:LoginView>

D. <asp:LoginView id="login" runat="server"> Welcome Guest </asp:LoginView>

1. A 2. B 3. C

4. D

21 The _____________ method in the ProviderBase class is used by the objects of the ProviderBase class to release the resources allocated to them

A. ProviderBase() B. Delete() C. Finalize()

22 The ________ class is an abstract class that defines role-management functionality which custom roleproviders can implement.

A. RoleProvider B. MembershipProvider C. ManagementProvider

23 To prevent hacking in ASP.NET, the variables are suffixed with ______ before passing them to the database.

A. $ B. # C. @

24 In __________ type of attack, the hacker attacks the application by introducing some scripts in the application, mainly through input controls such as TextBox.

A. Cross Site Scripting B. SQL Injection C. Cookie

25 In the _______________ type of algorithm, a pair of public and private keys is used to encrypt or decrypt.

A. Symmetric B. Asymmetric C. Skew

Das könnte Ihnen auch gefallen