Which type or types of data access are allowed?
You are configuring a ClickOnce deployment that allows users to install your application from the Internet zone under partial trust permissions. You want the application to access data that resides on the same remote server from which the application is installed. You need to add one or more types of data access that are allowed under partial trust permissions to your application. Which type or types of data access are allowed? (Choose all that apply.)
Which two actions should you perform?
You create a Windows-based application that requires the use of a COM component. You need to create a ClickOnce deployment package to distribute the application from an Internet Web site. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)
Which three actions should you perform?
You are creating an application named App1. You use ClickOnce deployment to distribute App1.exe and multiple assemblies. Some users require only some of the functionality in App1. You need to limit the size of the initial download of the application. You also need to ensure that users can download the assemblies on demand. Which three actions should you perform? (Each correct answer presents part of the solution. Choose three.)
Which code segment should you choose?
You are developing a utility screen for a new client application. The utility screen displays a thermometer that conveys the current status of processes being carried out by the application. You need to draw a rectangle on the screen to serve as the background of the thermometer as shown in the exhibit. The rectangle must be filled with gradient shading. (Click the Exhibit button.) Which code segment should you choose?
Which code segment should you use?
You are using the Microsoft Visual Studio 2005 IDE to examine the output of a method that returns a string. You assign the output of the method to a string variable named fName.
You need to write a code segment that prints the following on a single line
The message: “Test Failed: “
The value of fName if the value of fName does not equal “John”
You also need to ensure that the code segment simultaneously facilitates uninterrupted execution of the application. Which code segment should you use?
Which code segment should you use?
You need to write a code segment that will add a string named strConn to the connection string section of the application configuration file. Which code segment should you use?
Which code segment should you use?
You are developing a method to hash data for later verification by using the MD5 algorithm. The data is passed to your method as a byte array named message. You need to compute the hash of the incoming parameter by using MD5. You also need to place the result into a byte array.
Which code segment should you use?
Which code segment should you use?
You are developing an application that runs by using the credentials of the end user. Only users who are members of the Administrator group get permission to run the application. You write the following security code to protect sensitive data within the application.
Dim blnAdmin As Boolean = False
Dim objRole As WindowsBuiltInRole = _
WindowsBuiltInRole.Administrator
If blnAdmin = False Then
Throw New Exception(“User not permitted”)
End If
You need to add a code segment to this security code to ensure that the application throws an exception if a user is not a member of the Administrator group. Which code segment should you use?
Which code segment should you use?
You are writing code for user authentication and authorization. The username, password, and roles are stored in your application data store. You need to establish a user security context that will be used for authorization checks such as IsInRole. You write the following code segment to authorize the user.
If TestPassword(UserName, Password) = False Then
Throw New Exception(“Could not authenticate user”)
End If
Dim RolesArray() As String = LookUpUserRoles(UserName)
You need to complete this code so that it establishes the user security context. Which code segment should you use?
Which method should you use on the DirectorySecurity object?
You create a DirectorySecurity object for the working directory. You need to identify the user accounts and groups that have read and write permissions. Which method should you use on the DirectorySecurity object?