0

Introduction to ASP.NET

Description: Introduction to ASP DOT NET Information TechnologyIT Certificate Programs
Number of Questions: 15
Created by:
Tags: Introduction to ASP DOT NET Information Technology IT Certificate Programs
Attempted 0/15 Correct 0 Score 0

Which of the following techniques provides an analog of component object model and distributing component object model for object brokering and interfacing?

  1. Process affinity

  2. World Wide Web

  3. Web services

  4. Web forms

  5. Window forms


Correct Option: C
Explanation:

They provide an analog of component object model and distributed component object model for object brokering and interfacing.

Which of the following .NET cryptographic classes provides a CNG implementation of the secure hash algorithm for 384-bit hash values?

  1. SHA384

  2. SHA1Cng

  3. SHA256Cng

  4. SHA384Cng

  5. ProtectedData


Correct Option: D
Explanation:

This .NET cryptographic class provides a CNG implementation of the secure hash algorithm for 384-bit hash values.

Which of the following is an environment in which the programs are executed?

  1. Common language runtime

  2. The execution support

  3. Web forms

  4. NNTP service

  5. IP address restrictions


Correct Option: A
Explanation:

It is an environment in which the programs are executed.

Which of the following assembly manifest contents should be used only to designate an assembly as a satellite assembly containing language-specific information?

  1. SMTP service

  2. Culture

  3. Assembly name

  4. Lost of all files in the assembly

  5. Windows form


Correct Option: B
Explanation:

This assembly manifest contents should be used only to designate an assembly as a satellite assembly containing language-specific information.

Which of the following features of IIS 6.0 enables remote authors to create, move or delete files, directories on your server?

  1. Window form

  2. WWW service

  3. Bandwidth throttling

  4. News and mails

  5. Web distributed authoring and versioning


Correct Option: E
Explanation:

This feature of IIS 6.0 enables remote authors to create, move or delete files, directories on your server.

Which of the following components of CLR must perform a heap in order to free some memory?

  1. Garbage collector

  2. The execution support

  3. Web forms

  4. The IP address restrictions

  5. Automatic debugging


Correct Option: A
Explanation:

This component of the CLR must perform a heap in order to free some memory.

Which of the following internet service provided by IIS 6.0 is used for hosting sites where users can upload and download files?

  1. Web forms

  2. Reliability

  3. FTP service

  4. WWW service

  5. SMTP service


Correct Option: C
Explanation:

This internet service provided by IIS 6.0 is used for hosting sites where users can upload and download files.

Which of the following properties of IIS 6.0 limits IIS to support host-header routing only?

  1. Random Number Generator

  2. WWW service

  3. IP address restrictions

  4. ServerBindings metabase

  5. Bandwidth throttling


Correct Option: D
Explanation:

This property of IIS 6.0 limits IIS to support host-header routing only.

Which of the following assembly manifest contents represents the public key from the publisher?

  1. Reliability

  2. Strong name

  3. Assembly name

  4. List of all files in the assembly

  5. Windows forms


Correct Option: B
Explanation:

This assembly manifest content represents the public key from the publisher.

Which of the following .NET cryptographic classes defines a wrapper object to access the CSP implementation of the SHA384 algorithm?

  1. ProtectedMemory

  2. SHA1CryptoServiceProvider

  3. SHA256CryptoServiceProvider

  4. SHA384

  5. SHA384CryptoServiceProvider


Correct Option: E
Explanation:

This .NET cryptographic class defines a wrapper object to access the CSP implementation of the SHA384 algorithm.

Which of the following features of IIS 6.0 enables controlling the amount of central processing unit resources?

  1. CPU limiting

  2. Process affinity

  3. Automated debugging

  4. Bandwidth throttling

  5. SMTP service


Correct Option: A
Explanation:

This feature of IIS 6.0 enables controlling the amount of central processing unit resources.

Which of the following features of IIS 6.0 represents the number of sites a single IIS 6.0 server can host?

  1. Process affinity

  2. Scalability

  3. Reliability

  4. IP address restrictions

  5. NNTP service


Correct Option: B
Explanation:

This feature of IIS 6.0 represents the number of sites a single IIS 6.0 server can host.

By using which of the following components of CLR, you can program your profiler to walk managed stacks in the common language runtime?

  1. Process affinity

  2. NNTP service

  3. Stack walk

  4. The execution support

  5. Web forms


Correct Option: C
Explanation:

By using this component of CLR, you can program your profiler to walk managed stacks in the common language runtime.

Which of the following .NET cryptographic classes computes the secure hash algorithm 384 hash for the input data using the managed library?

  1. SHA384Managed

  2. SHA384

  3. SHA256Managed

  4. SHA1Managed

  5. ProtectedData


Correct Option: A
Explanation:

This .NET cryptographic class computes the secure hash algorithm 384 hash for the input data using the managed library.

The common language runtime uses which of the following assembly manifest contents to enforce version policy?

  1. SMTP services

  2. Version number

  3. Assembly name

  4. List of all files in the assembly

  5. Bandwidth throttling


Correct Option: B
Explanation:

The common language runtime uses this assembly manifest content to enforce version policy.

- Hide questions