Your new method takes these parameters:
You work as the application developer at Domain.com.
You are developing a new method that must encrypt confidential data.
The method must use the Data Encryption Standard (DES) algorithm. Your new method takes these parameters:
1. A byte array, named message, that must be encrypted by applying the DES algorithm.
2. A key, named key, which will be used to encrypt the data.
3. The initialization vector, named iv.
Once the data is encrypted, it must be added to the MemoryStream object.
Choose the code segment which will encrypt the specified data and add it to the MemoryStream object.
What should you do next to configure Certkiller App11 to execute a series of mathematical computations simulta
You work as the application developer at Domain.com. You are working on an application named Certkiller App11.
Certkiller App11 must be configured to execute a series of mathematical computations simultaneously.
What should you do next to configure Certkiller App11 to execute a series of mathematical computations simultaneously?
How will you accomplish the task?
You work as the application developer at Domain.com.
You are working on an application and want to use platform invoke services to call an unmanaged function from managed code.
How will you accomplish the task?
Which two additional actions should you still perform to enable Certkiller App12 to receive events asynchronou
You work as the application developer at Domain.com.
You are developing a new application named Certkiller App12.
Certkiller App12 must be configured to receive events asynchronously.
You define two instances named Wq1EventQuery and ManagementEventWatcher respectively.
Wq1EventQuery will list those events and event conditions for which Certkiller App12 should respond. ManagementEventWatcher will subscribe to all events matching the query.
Which two additional actions should you still perform to enable Certkiller App12 to receive events asynchronously?
Choose two correct answers. Each answer presents only part of the complete solution.
How will you accomplish the task?
You work as the application developer at Domain.com.
You need to modify the code of an application.
The application uses two threads named thread A and thread B. You want thread B to complete executing before thread A starts executing.
How will you accomplish the task?
Which of the following properties should you call from the myMethod class?
You work as the application developer at Domain.com. To get information on a specific method named myMethod, you use Reflection.
You need to find out if myMethod can be accessed from a derived class.
Which of the following properties should you call from the myMethod class?
What should you do to implement role-based security?
You work as an application developer at Domain.com. You are currently creating an application that requires role-based security.
You are planning to utilize a database to store the user accounts and group membership data. You need to ensure that users are able to log on and off.
You also need to ensure that the application you have created tracks the user accounts of these users, and restrict or allow access to code based on their group membership.
You need to achieve this objective with as little developer effort as possible.
What should you do to implement role-based security?
You are required to additionally configure code access permissions for the TestScrapData classWhat should you
You work as the application developer at Domain.com. Domain.com uses Visual Studio.NET 2005 as its application development platform.
You use a Windwos XP Professional client computer named Certkiller -WS536 as your development computer.
You are developing a .NET Framework 2.0 application on Certkiller -WS536. You write the class named TestScrapData.
You are required to configure the TestScrapData class and limit its access to only the code originating from a specific Web site, www. Domain.com and its subdomains.
The Web sites will be required to be access using HTTP, HTTPS and the FTP protocols.
You are required to additionally configure code access permissions for the TestScrapData class
What should you do?
What classes should you add?
You work as an application developer at Domain.com.
Domain.com has been contracted by a local doctor’s clinic to develop a client application using Microsoft .NET 2.0 that sends patient visit information to a remote server at the clinic’s main office.
This data must be transmitted via a secure network stream because it contains patient protected health information (PHI). The data will be sent from a windows application client on the doctor’s notebook computer to a windows service hosted on a remote server. Both of these applications employ a certificate store for network identification.
You need to create a secure data stream by adding certain classes to the client application.
What classes should you add? (Choose three)
What should you do?
You work as the application developer at Domain.com. Domain.com uses Visual Studio.NET 2005 as its application development platform.
You use a Windwos XP Professional client computer named Certkiller -WS536 as your development computer.
You are developing a .NET Framework 2.0 application on a Certkiller -WS536.
You must add a new code group which adds FullTrust permissions to the code originating from www. Domain.com.
You are required to use the code access security policy tool (Caspol.exe to add the code group whilst you ensure that you only affect the user level policy for the
user running Caspol.exe
What should you do?