Which two defensive coding techniques should you use?
You are creating A5P.NET applications by using the .NET Framework 3.5.
Your company hosts a Web site. The Web site provides an online community and displays personal information of the site members. An e-mail account that is used as the user name is mandatory to register with the online community.
Only registered users of the site can view the personal information of other members.
You need to ensure that unauthorized, automated scripts or bots are not allowed to perform the following tasks:
– Register with the site.
– Access the personal information of the members.
Which two defensive coding techniques should you use? (Each correct answer presents part of the solution. Choose two.)
What should you do?
Users report that a Windows-based application does not run properly.
When users attempt to complete a particular action, the following error message text appears.
Unable to find assembly ‘myservices, Version=1.0.0.0,Culture=neutral, PublicKeyToken=29b5ad26c9de9b95’.
You discover that the error occurs when the Windows-based application attempts to call functionality in a serviced component that was registered by using the following command.
regsvcs.exe myservices.dll
You need to ensure that the application can call the functionality in the serviced component without throwing the exception.
What should you do?
What should you do?
You create a PerformancePoint Add-in for Excel report. Your report contains three matrices that are based on a model. The model contains a dimension named Products. You need to apply a linked filter to the three matrices by using the Products dimension. What should you do?
What should you do?
You are maintaining an ASP.NET application by using the .NET Framework 3.5.
The application uses Forms authentication.
Security testing of the application reveals that users can access the sessions of other users on different computers.
You need to configure the application to eliminate the vulnerability.
What should you do?
What should you do?
You create .NET Framework remoting components that must be deployed on an unattended application server.
IIS is not installed on the application server.
Company policy requires that no changes be made to the application server except the deployment of approved custom code that is written by your development team.
You need to ensure that the components can run on the unattended application server.
What should you do?
What should you do?
You create a PerformancePoint Add-in for Excel report. Your model has a dimension named Products. The Products dimension contains two member sets named Color and ProductCategory. You add a matrix to the report. The matrix displays the number of products in the ProductCategory member set. You need to ensure that the matrix displays the number of products in the ProductCategory member set only if the Color member has a value of either Red or Blue. What should you do?
What should you do?
You are creating an ASP.NET application by using the .NET Framework 3.5.
The application connects to a Web service over the Internet. The application uses and stores authentication cookies
You need to ensure that transmission and storage of cookies is as secure as possible.
What should you do?
What should you do?
A Windows-based application receives messages from a message queue named PriorityQueue.
The client application sets the Priority property on the message before sending it.
However, received Message objects do not have the Priority property assigned.
The following code is used to receive the messages.
(Line numbers are included for reference only.)
01 MessageQueue queue = new MessageQueue(“.\\PriorityQueue”);
02 Message m = queue.Receive();
03 Console.WriteLine(m.Priority);
You need to ensure that the Windows-based application that receives the messages can access the Priority property.
What should you do?
What should you do?
You are the owner of a form assignment. The status of the assignment is Work in Progress. You need to ensure that the status of the form assignment is Ready for Review. What should you do?
What should you do?
You are creating an ASP NET application by using the .NET Framework 3.5.
The application stores HTML content in a database. The HTML content is provided by multiple external information feeds. When a user visits a page they are shown a panel containing the HTML source for one of the information feeds.
You need to ensure that any script code stored in the database cannot be executed when displayed in the client browser.
What should you do?