0

Dot Net Services

Description: Windows application using dot net technology Programming ConceptsProgrammingProgramming
Number of Questions: 25
Created by:
Tags: Windows application using dot net technology Programming Concepts Programming
Attempted 0/25 Correct 0 Score 0

Programming languages on the .Net framework compile into an intermediate language known as ________________.

  1. HTML

  2. MSIL

  3. XML

  4. DHTML

  5. C


Correct Option: B
Explanation:

Programming languages on the .Net framework compile into an intermediate language known as MSIL.

In which of the following assembly manifest content information, information is used by the runtime to map a type reference to the file that contains its declaration and implementation?

  1. Strong name information

  2. Assembly name

  3. Type reference information

  4. Version number

  5. Web form


Correct Option: C
Explanation:

In this assembly manifest content information, information is used by the runtime to map a type reference to the file that contains its declaration and implementation.

Which of the following technologies is a software development technology that focuses on building applications in a very short amount of time?

  1. RAD

  2. CTS

  3. The execution support

  4. .Net framework

  5. Stack walk


Correct Option: A
Explanation:

This technology is a software development technology that focuses on building applications in a very short amount of time.

Which of the following encryption-decryption classes of .Net technology encapsulates optional configuration parameters for the user interface that CNG displays when you access a protected key?

  1. CngPropertyCollection

  2. CngKeyBlobFormat

  3. CngUIPolicy

  4. CngKey

  5. ProtectedMemory


Correct Option: C
Explanation:

This encryption-decryption class of .Net technology encapsulates optional configuration parameters for the user interface that CNG displays when you access a protected key.

Which of the following encryption-decryption classes of .Net technology represents the abstract base class from which all implementations of asymmetric signature deformatters derive?

  1. AsymmetricKeyExchangeDeformatter

  2. AsymmetricSignatureDeformatter

  3. AsymmetricSignatureFormatter

  4. DSASignatureFormatter

  5. ProtectedMemory


Correct Option: B
Explanation:

This encryption-decryption class represents the abstract base class from which all implementations of asymmetric signature deformatters derive.

Which of the encryption-decryption classes of .Net technology encapuslates the name of an encryption algorithm collection?

  1. CngAlgorithmGroup

  2. CngAlgorithm

  3. CngKey

  4. ProtectedData

  5. CngPropertyCollection


Correct Option: A
Explanation:

This encryption-decryption class encapsulates the name of an encryption algorithm collection.

Which of the following encryption-decryption classes of the .Net technology represents a set of AsnEncodedData object?

  1. AsnEncodedData

  2. AsnEncodedDataEnumerator

  3. AsnEncodedDataCollection

  4. AesManaged

  5. ProtecetdMemory


Correct Option: C
Explanation:

This encryptio-decryption class of the .Net technology represents a set of AsnEncodedData object.

Which of the following assembly manifest content's information represents a list of assemblies that are statically referenced by the assembly?

  1. Reference type

  2. Assembly name

  3. Strong name information

  4. Version number

  5. Referenced assemblies


Correct Option: E
Explanation:

This assembly manifest content's information represents a list of other assemblies that are statically referenced by the assembly.

By using which of the following access modifiers, the variables will retain their values, even after the procedure in which these variables are declared?

  1. Public

  2. Private

  3. Attrlist

  4. Name

  5. Static


Correct Option: E
Explanation:

By using this access modifier, the variables will retain their values, even after the procedure in which these variables are declared.

Which of the following encryption-decryption classes of .Net technologies encapsulates the name of a key storage provider used with cryptography next generation objects?

  1. CngAlgorithm

  2. CngKey

  3. ProtectedData

  4. CngProvider

  5. CngPropertyCollection


Correct Option: D
Explanation:

This encryption-decryption class of .Net technology encapsulates the name of a key storage provider for use with cryptography next generation objects.

Which of the following components of .Net architecture provides the appearance of a virtual machine so that programmers need not consider the capabilities of the specific CPU that will execute the program?

  1. Common type system

  2. The execution support

  3. Stack walk

  4. Web form

  5. Common language runtime


Correct Option: E
Explanation:

This component of .Net architecture provides the appearance of an application virtual machine so that programmers need not consider the capabilities of the specific CPU that will execute the program.

Which of the following encryption-decryption classes of .Net technology performs a cryptographic transformation of data?

  1. Formbase64Transform

  2. ToBase64Transform

  3. CryptoConfig

  4. CryptoAPITransform

  5. ProtectedMemory


Correct Option: D
Explanation:

This encryption-decryption class of .Net technology performs a cryptographic transformation of data.

By using which of the following access modifiers, the variables are accessible only from within their own class or from a class derived from that class?

  1. Protected

  2. Public

  3. Private

  4. Get accessor

  5. Type


Correct Option: A
Explanation:

By using this access modifier, the variables are accessible only from within their own class or from a class derived from that class.

Which of the following properties uses an implicit parameter called value whose type is the type of the property?

  1. Get accessor

  2. Set accessor

  3. Public

  4. GET

  5. POST


Correct Option: B
Explanation:

This property uses an implicit parameter called value whose type is the type of the property.

Which of the following encryption-decryption classes of .Net technology represents the abstract base class from which all implementations of the advanced encryption standard must inherit?

  1. AesCryptoServiceProvider

  2. AesManaged

  3. Aes

  4. ProtectedData

  5. AsnEncodedDataEnumerator


Correct Option: C
Explanation:

This encryption-decryption class of .Net technology represents the abstract base class from which all implementations of the advanced encryption standard must inherit.

Which of the following encryption-decryption classes of .Net technology contains a type and a collection of values associated with that type?

  1. CryptoConfig

  2. CryptographicAttributeObject

  3. CryptographicAttributeObjectCollection

  4. ProtectedData

  5. CngAlgorithm


Correct Option: B
Explanation:

This encryption-decryption class of .Net technology contains a type and a collection of values associated with that type.

Which of the following encryption-decryption classes of .Net technology represents the base class from which all asymmetric key exchange formatters derive?

  1. AsymmetricKeyExchangeDeformatter

  2. AsymmetricSignatureFormatter

  3. AsnEncodedData

  4. AsymmetricKeyExchangeFormatter

  5. ProtectedData


Correct Option: D
Explanation:

This encryption-decryption class of .Net technology represents the base class from which all asymmetric key exchange formatters derive.

Which of the following encryption-decryption classes of .Net technology defines a wrapper object to access the CSP implementation of the digital signature algorithm?

  1. DSA

  2. DSASignatureFormatter

  3. DSACryptoServeiceProvider

  4. DESCryptoServiceProvider

  5. ProtectedData


Correct Option: C
Explanation:

This encryption-decryption class of .Net technology defines a wrapper object to access the CSP implementation of the digital signature algorithm.

By using which of the following access modifiers, the variables can be used by code in the same assembly as well as by code in derived classes?

  1. Public

  2. Private

  3. ProtectedFriend

  4. Name

  5. Get accessor


Correct Option: C
Explanation:

By using this access modifier, the variables can be used by code in the same assembly as well as by code in derived classes.

By using which of the following statements, control is passed to the statement that follows the terminated statement?

  1. Continue

  2. Break

  3. Return

  4. Boxed

  5. Private


Correct Option: B
Explanation:

By using this statement, control is passed to the statement that follows the terminated statement.

Which of the following encryption-decryption classes represents the base class for the data encryption standard algorithm from which all data encryption standard implementations must derive?

  1. DES

  2. DESCryptoServiceProvider

  3. DSA

  4. ProtectedData

  5. CngKey


Correct Option: A
Explanation:

This encryption-decryption class of .Net technology represents the base class for the data encryption standard algorithm from which all data encryption standard implementations must derive.

Which of the following encryption-decryption classes verifies a digital signature algorithm PKCS#1 version 1.5 signature?

  1. DSASignatureFormatter

  2. DSASignatureDeformatter

  3. DSA

  4. ProtectedData

  5. AsymmetricSignatureFormatter


Correct Option: B
Explanation:

This encryption-decryption class of .Net technology verifies a digital signature algorithm PKCS#1 version 1.5 signature.

By using which of the following access modifiers, the variables are accessible from within the program that contains their declaration as well as from anywhere else in the same assembly?

  1. Public

  2. Private

  3. Name

  4. Attrlist

  5. Friend


Correct Option: E
Explanation:

By using this access modifier, variables are accessible from within the program that contains their declaration as well as from anywhere else in the same assembly.

Which of the following encryption-decryption classes of .Net technology provides enumeration functionality for the CryptographicAttibuteObjectCollection collection?

  1. CryptographicAttributeObjectCollection

  2. CryptoConfig

  3. ProtectedMemory

  4. CryptographicAttributeObjectEnumerator

  5. AsnEncodedDataEnumerator


Correct Option: D
Explanation:

This encryption-decryption class of .Net technology provides enumeration functionality for the CryptographicAttributeObjectCollection collection.

Which of the following is used to declare a reference type that can be used to encapsulate a named or an anonymous method?

  1. Public

  2. Private

  3. Delegate

  4. Array

  5. String


Correct Option: C
Explanation:

It is used to declare a reference type that can be used to encapsulate a named or an anonymous method.

- Hide questions