1. Question: You must restrict access to a method that is called by a Windows event based on a user’s group memberships in the local user database. If the user lacks sufficient access, you want to log an event and display a message to the user. You want to use the most secure method possible. Which technique will you use?

    A
    WindowsPrincipal.IsInRole

    B
    WindowsIdentity.IsInRole

    C
    Imperative RBS demands

    D
    Declarative RBS demands

    Note: Not available
    1. Report
  2. Question: You are writing a method for a Console application that lists options available to a user based on the user’s group memberships. Which technique should you use?

    A
    WindowsPrincipal.IsInRole

    B
    WindowsIdentity.IsInRole

    C
    Imperative RBS demands

    D
    Declarative RBS demands

    Note: Not available
    1. Report
  3. Question: You are creating a front-end interface to a back-end database that stores usernames and groups within the database itself. The user database is very simple, storing only usernames and group memberships. You want to be able to use imperative and declarative RBS demands within your application based on the custom user database. Which of the following classes meets your requirements and would be most efficient to implement? (Choose all that apply.)

    A
    GenericIdentity

    B
    GenericPrincipal

    C
    IIdentity

    D
    IPrincipal

    Note: Not available
    1. Report
  4. Question: Which of the following resources can you control access to using the .NET Framework? (Choose all that apply.)

    A
    Files

    B
    Registry keys

    C
    Printers

    D
    Network shares

    Note: Not available
    1. Report
  5. Question: Given the following code sample, which line correctly finalizes the ACL changes?
    Dim dir As String = "C:\MyApp"
    Dim ds As DirectorySecurity = Directory.GetAccessControl(dir)
    ds.AddAccessRule(New FileSystemAccessRule("Administrator", _
    FileSystemRights.FullControl, AccessControlType.Allow))
    Directory.SetAccessControl(dir, ds)

    A
    Directory.SetAccessControl(dir, ds)

    B
    Directory.CreateDirectory(dir, ds)

    C
    Directory.SetAccessControl(ds)

    D
    Directory.CreateDirectory(ds)

    Note: Not available
    1. Report
  6. Question: Which of the following classes describes an SACL for a registry key?

    A
    RegistryAccessRule

    B
    RegistryAuditRule

    C
    AccessRule

    D
    AuditRule

    Note: Not available
    1. Report
  7. Question: Which of the following is returned by the DirectorySecurity.GetAccessRules method?

    A
    A generic Collection object containing AccessRule objects

    B
    A generic Collection object containing FileSystemAccessRule objects

    C
    An instance of AuthorizationRuleCollection containing FileSystemAccessRule objects

    D
    An instance of AuthorizationRuleCollection containing AuthorizationRule objects

    Note: Not available
    1. Report
  8. Question: Which of the following classes requires both the encryptor and decryptor to have the same key? (Choose all that apply.)

    A
    RSACryptoServiceProvider

    B
    RijndaelManaged

    C
    TripleDES

    D
    DSACryptoServiceProvider

    E
    DES

    F
    RC2

    Note: Not available
    1. Report
  9. Question: Which of the following must be synchronized between the encryptor and decryptor when using symmetric encryption? (Choose all that apply.)

    A
    SymmetricAlgorithm.Key

    B
    SymmetricAlgorithm.Salt

    C
    SymmetricAlgorithm.IV

    D
    SymmetricAlgorithm.Mode

    Note: Not available
    1. Report
  10. Question: Under which circumstances should you export the private key from an asymmetric encryption algorithm?

    A
    When transferring data across a network for a single session

    B
    When a remote computer will be sending you a private file that you must be able to decrypt

    C
    When you are encrypting a file that needs to be read later

    D
    When you are sending a remote computer a private file that the remote computer must be able to decrypt

    Note: Not available
    1. Report
Copyright © 2024. Powered by Intellect Software Ltd