Beruflich Dokumente
Kultur Dokumente
2 To override the external stylesheet(s) used by the HTML or ASPX page, use the __________ property.
3 ____________ allows you to retrieve content in master pages dynamically from locations other than the file systems.
A. gacpub.exe
B. gacutil.exe C. gacinst.exe
6 Which one of the following attributes specifies that the profile data should be stored for the anonymous users?
7 The IIS manager is displayed when you type ________ in the Run dialog box.
D. inetwiz
8 ______________ is used to verify the identity of a user before allowing or denying a request.
9 The ________________ option provides a set of predefined templates that enable you to set the display of the Login control
A. Auto Format B. Complete C. SignUp D. View as Template
10 In _____________, the application acts on behalf of a user whose identity is authenticated using IIS.
A. Authentication
12 In __________ authentication, encrypted cookies are used to identify and validate users.
13 In __________ authentication, the IIS is configured to allow only users on a Windows domain to log on to the application.
14 Which of the following statements about web.config and machine.config files are true?
A. The machine.config file overrides default settings provided by the web.config file. B. The machine.config file contains XML elements to define the session state. C. The web.config file overrides default settings provided by the machine.config file. D. The web.config file contains XML elements to define the session state.
1. A, B 2. B, C 3. C, D 4. D, A
15 Which are the additional settings, other than the configuration settings, defined by the Microsoft ASP.NET Web Site Administration Tool?
A. application B. debugging C. section D. security
16 Which of the following tags contain configuration elements related to session state, custom errors, authentication, database connection string, file path and so on?
17 Which of the following statements about ASP.NET configuration settings are correct?
A. Application settings help you to configure the SMTP server, define default error
pages and change the status of an application. B. C. Provider settings help you to configure the behavior of the ASP.NET application. Security settings help you to create and manage users, define and assign roles
1. A, B
2. A, C 3. B, C 4. A, B, C
18 Which of the following statements about Microsoft ASP.net Web Site Administration Tool's tabs are incorrect?
A. B. C. D.
The Home tab displays information about the host machine. The Security tab allows you to debug and trace related settings. The Application tab allows you to define and assign roles to users. The Provider tab helps you to define a database provider.
1. A, B 2. B, C 3. C, D 4. D, A
19
Which one of the following code will help to deny access to files through browser having .xls as file name extension? A. <httpHandlers> <add file="*.xls" verb="*" type="System.Web.HttpForbiddenHandler"/> </httpHandlers>
</httpHandlers>
1. A 2. B 3. C 4. D
20 Suppose you want to display a message "Welcome Guest" when a user visits the login.aspx page of the Web site for the first time. Which one of the following code will help you to achieve this task?
1. A 2. B 3. C
4. D
21 The _____________ method in the ProviderBase class is used by the objects of the ProviderBase class to release the resources allocated to them
22 The ________ class is an abstract class that defines role-management functionality which custom roleproviders can implement.
23 To prevent hacking in ASP.NET, the variables are suffixed with ______ before passing them to the database.
A. $ B. # C. @
24 In __________ type of attack, the hacker attacks the application by introducing some scripts in the application, mainly through input controls such as TextBox.
25 In the _______________ type of algorithm, a pair of public and private keys is used to encrypt or decrypt.