MCSD.NET - 70-330 Exam Interview Preparation Guide Download PDF
MCSD.NET - 70-330 Exam guideline for job interview preparation. Explore list of MCSD.NET - 70-330 Exam frequently asked questions(FAQs) asked in number of MCSD.NET - 70-330 Exam interviews. Post your comments as your suggestions, questions and answers on any MCSD.NET - 70-330 Exam Interview Question or answer. Ask MCSD.NET - 70-330 Exam Question, your question will be answered by our fellow friends.
9 MCSD.NET - 70-330 Exam Questions and Answers:
1 :: Suppose You develop an ASP.NET Web application
for Company?s intranet. The application accesses data that is stored in a Microsoft SQL Server
database. The application authenticates users by using Windows authentication, and it has
impersonation enabled. You configure database object permissions based on the identity of the
user of the application. You need to provide the user?s identity to the SQL Server database. What
should you do?
A. Connect to the database by using the following connection string
?Persists Security Info=False;Integrated Security=SSPI;
database=ApplicationDB;server=DataServer;?
B. Connect to the database by using the following connection string
?User ID=ASPNET;Persist Security Info=False;Integrated Security=False;
database=ApplicationDB;server=DataServer;?
C. Develop a serviced component that wraps all database operations.
Use COM+ role-based security to restrict access to database operations based on user
identity.
D. Disable impersonation.
A. Connect to the database by using the following connection string
?Persists Security Info=False;Integrated Security=SSPI;
database=ApplicationDB;server=DataServer;?
?Persists Security Info=False;Integrated Security=SSPI;
database=ApplicationDB;server=DataServer;?
2 :: Suppose You are an application developer for your company. You develop library assemblies that are
called by your main applications. These library assemblies access confidential data in the
applications. To ensure that this data is not accessed in an unauthorized and unsafe manner,
users must not be allowed to call the library assemblies from their own applications. You apply a
strong name to all assemblies to support versioning. You need to prevent users from writing
managed applications that make calls to your library assemblies. You need to achieve this goal
while minimizing the impact on response times for applications. What should you do?
A. Use the internal access modifier to declare all classes and structs in each library.
B. Use the protected internal access modifier to declare all classes and structs in each library.
C. Add the following attribute to each class and struct in each library assembly.
<StrongNameIdentityPermission(SecurityAction.Demand, PublicKey:="002400..bda4")>
D. Add the following attribute to each class and struct in each library assembly.
<StrongNameIdentityPermission(SecurityAction.LinkDemand, PublicKey:="002400..bda4")>
D. Add the following attribute to each class and struct in each library assembly.
<StrongNameIdentityPermission(SecurityAction.LinkDemand, PublicKey:="002400..bda4")>
<StrongNameIdentityPermission(SecurityAction.LinkDemand, PublicKey:="002400..bda4")>
3 :: Suppose You are an application developer for Company.com. You are developing an application that can
be extended by using custom components. The application uses reflection to dynamically load
and invoke these custom components. In some cases, custom components will originate from a
source that is not fully trusted, such as the Internet.
You need to programmatically restrict the code access security policy under which custom
components run so that custom components do not run with an elevated permission grant.
What are two possible ways to achieve this goal? (Each correct answer presents a complete
solution. Choose two)
A. Create a new application domain and set the security policy level. Run custom components in
this application domain.
B. Use permission class operations to modify the security policy.
C. Implement custom permission classes to protect custom component resources.
D. Programmatically modify the machine-level security policy file after loading a custom
component.
A. Create a new application domain and set the security policy level. Run custom components in
this application domain.
B. Use permission class operations to modify the security policy.
this application domain.
B. Use permission class operations to modify the security policy.
6 :: Suppose You create an ASP.NET Web application
that all authenticated network users will access. The authentication mode in the Web.config file is
currently set to None. Due to recent security threats, the network administrator requires that all
connections to the application?s Web server use the network credentials of the authenticated
user. You need to configure the application to use the network credentials of the authenticated
user as HTTPContext.Current.User. Which action or actions should you perform? (Choose all that
apply)
A. Ask the network administrator to configure the IIS directory security to Anonymous
authentication.
B. Ask the network administrator to configure the IIS directory security to Integrated Windows
authentication.
C. Set the authentication mode in the Web.config file to Forms.
D. Set the authentication mode in the Web.config file to Windows.
E. Set the impersonation attribute of the identity element in the Web.config file to true.
D. Set the authentication mode in the Web.config file to Windows.
E. Set the impersonation attribute of the identity element in the Web.config file to true.
E. Set the impersonation attribute of the identity element in the Web.config file to true.