0

ASP .NET web services

Description: ASP .NET web services Unix/Linux and WindowsInformation TechnologyIT Certificate Programs
Number of Questions: 15
Created by:
Tags: ASP DOT NET web services Unix/Linux and Windows Information Technology IT Certificate Programs
Attempted 0/15 Correct 0 Score 0

Which of the following techniques acts as an abstraction layer, separating the platform and programming language specific details of how the application code is actually invoked?

  1. Window form

  2. Web form

  3. Web service

  4. The execution support

  5. Bandwidth throttling


Correct Option: C
Explanation:

This technique acts as an abstraction layer, separating the platform and programming language specific details of how the application code is actually invoked.

Which of the following encryption-decryption classes of .NET technology provides the ability to switch through an AsnEncodedDataCollection object?

  1. AsnEncodedData

  2. AsnEncodedDataCollection

  3. CryptographicAttributeObjectEnumerator

  4. ProtectedMemory

  5. AsnEncodedDataEnumerator


Correct Option: E
Explanation:

This encryption-decryption class of .NET technology provides the ability to switch through an AsnEncodedDataCollection object.

Which of the following encryption-decryption classes of .NET technology performs asymmetric encryption and decryption using the CAPI implementation of the advanced encryption standard algorithm?

  1. AesManaged

  2. AesCryptoServiceProvider

  3. Aes

  4. AsnEncodedData

  5. ProtectedData


Correct Option: B
Explanation:

This encryption decryption class of .NET technology performs asymmetric encryption and decryption, using the CAPI implementation of the advanced encryption standard algorithm.

Which of the following protocols is an XML-based protocol for sending and receiving data to and from a web services?

  1. SOAP

  2. TCP

  3. UDP

  4. FTP

  5. UDDI


Correct Option: A
Explanation:

This protocol is an XML-based protocol for sending and receiving data to and from a web service.

Which of the following techniques is a front end to a massive database of satellite images, aerial photographs and topo maps of much of earth's surface?

  1. FTP service

  2. TerraService

  3. NNTP service

  4. SMTP service

  5. WWW service


Correct Option: B
Explanation:

This technique is a front end to a massive database of satellite images, aerial photographs and topo maps of much of earth's surface.

Which of the following techniques insulates the user from the low level details of the web service and of the protocols that it uses?

  1. WWW service

  2. UDDI

  3. NNTP service

  4. Web service proxy

  5. FTP service


Correct Option: D
Explanation:

This technique insulates the user from the low level details of the web service and of the protocols that it uses.

Which of the following encryption-decryption classes of the .NET technology represents the base class, from which all the asymmetric key exchange deformatters derive?

  1. AsymmetricKeyExchangeDeformatter

  2. AsymmetricKeyExchangeFormatter

  3. AsymmetricSignatureDeformatter

  4. AsnEncodedData

  5. ProtectedData


Correct Option: A
Explanation:

This encryption-decryption class of .NET technology represents the base class, from which all the asymmetric key exchange deformatters derive.

Which of the following encryption-decryption classes of the .NET technology represents the base class, from which all implementations of asymmetric signature formatters derive?

  1. SignatureDescription

  2. AsymmetricSignatureDeformatter

  3. AsymmetricSignatureFormatter

  4. AsymmetricKeyExchangeFormatter

  5. ProtectedMemory


Correct Option: C
Explanation:

This encryption-decryption class represents the base class, from which all implementations of asymmetric signature formatters derive.

Which of the following techniques allows us to use only the command Console. WriteLine() instead of the entire command System.Console.WriteLine()?

  1. The @ import directive

  2. The @ assembly directive

  3. Web form

  4. The using directive

  5. The execution support


Correct Option: D
Explanation:

This technique allows us to use only the command Console.WriteLine() instead of the entire command System.Console.WriteLine().

Which of the following encryption-decryption classes of the .NET technology defines the core functionality for keys that are used with cryptography next generation objects?

  1. CngAlgorithm

  2. CngKey

  3. CngKeyCreationParameters

  4. AsymmetricKeyExchangeFormatter

  5. ProtectedMemory


Correct Option: B
Explanation:

This encryption-decryption class of the .NET technology defines the core functionality for keys that are used with cryptography next generation objects.

Which of the following encryption-decryption classes of the .NET technology specifies a key binary large object format for use with Microsoft cryptography next generation objects?

  1. CngKeyCreationParameters

  2. AsymmetricKeyExchangeFormatter

  3. CngAlgorithm

  4. ProtectedData

  5. CngKeyBlobFormat


Correct Option: E
Explanation:

This encryption-decryption class of the .NET technology specifies a key binary large object format for use with Microsoft cryptography next generation objects.

Which of the following files is partitioned into two sections, such as appSettings section and system.web section?

  1. Web.config file

  2. ASPX file

  3. ASCX file

  4. The parameter file

  5. The archive file


Correct Option: A
Explanation:

This file is partitioned into two sections, such as appSettings section and system. web section.

Which of the following files is a text file that houses application level event handlers, declarations that pertains to all parts of the application and other global application elements?

  1. ASCX file

  2. ASPX file

  3. Global.asax file

  4. The archive file

  5. The parameter file


Correct Option: C
Explanation:

This file is a text file that houses application level event handlers declarations that pertain to all parts of the application and other global application elements.

Which of the following directives supports the inherits attribute that enables code to be removed from Global.asax and packaged in a separate DLL?

  1. The @ application directive

  2. The @ import directive

  3. The @ assembly directive

  4. ASPX

  5. Web form


Correct Option: A
Explanation:

This directive supports the inherits attribute that enables code to be removed from Global.asax and packaged in separate DLL.

Which of the following encryption-decryption classes of the .NET technology provides a strongly typed set of cryptography next generation properties?

  1. CngKeyCreationParameters

  2. CngPropertyCollection

  3. CngAlgorithm

  4. CryptographicAttributeObjectEnumerator

  5. ProtectedMemory


Correct Option: B
Explanation:

This encryption-decryption class of the .NET technology provides a strongly typed set of cryptography next generation properties.

- Hide questions