Which algorithm should you use?

You are developing an application that will transmit large amounts of data between a client computer and a server. You need to ensure the validity of the data by using a cryptographic hashing algorithm. Which algorithm should you use?A . HMACSHA256B . RNGCryptoServiceProviderC . DESD . AesView AnswerAnswer: A Explanation:...

November 17, 2018 No Comments READ MORE +

Which access modifier should you use for the GetData() method?

An application includes a class named Person. The Person class includes a method named GetData. You need to ensure that the GetData() method can be used only by the Person class and not by any class derived from the Person class. Which access modifier should you use for the GetData()...

November 17, 2018 No Comments READ MORE +

Which code segment should you insert at line 16?

You are developing a method named CreateCounters that will create performance counters for an application. The method includes the following code. (Line numbers are included for reference only.) You need to ensure that Counter1 is available for use in Windows Performance Monitor (PerfMon). Which code segment should you insert at...

November 16, 2018 No Comments READ MORE +

How should you complete the relevant code?

DRAG DROP You develop an application that displays information from log files when errors occur. The application will prompt the user to create an error report that sends details about the error and the session to the administrator. When a user opens a log file by using the application, the...

November 15, 2018 No Comments READ MORE +

Which code segment should you insert at line 20?

You are developing an application. The application converts a Location object to a string by using a method named WriteObject. The WriteObject() method accepts two parameters, a Location object and an XmlObjectSerializer object. The application includes the following code. (Line numbers are included for reference only.) You need to serialize...

November 14, 2018 No Comments READ MORE +

Which algorithm should you use?

You are developing an application that will transmit large amounts of data between a client computer and a server. You need to ensure the validity of the data by using a cryptographic hashing algorithm. Which algorithm should you use?A . ECDsaB . RNGCryptoServiceProviderC . Rfc2898DeriveBytesD . HMACSHA512View AnswerAnswer: D

November 14, 2018 No Comments READ MORE +

How should you complete the relevant code?

DRAG DROP You are testing an application. The application includes methods named CalculateInterest and LogLine. The CalculateInterest() method calculates loan interest. The LogLine() method sends diagnostic messages to a console window. You have the following requirements: • The CalculateInterest() method must run for all build configurations. • The LogLine() method...

November 14, 2018 No Comments READ MORE +

How should you complete the relevant code?

DRAG DROP An application serializes and deserializes XML from streams. The XML streams are in the following format: The application reads the XML streams by using a DataContractSerializer object that is declared by the following code segment: var ser = new DataContractSerializer(typeof(Name)); You need to ensure that the application preserves...

November 13, 2018 No Comments READ MORE +

Which four code segments should you use in sequence?

DRAG DROP You are developing an application by using C#. The application will output the text string "First Line" followed by the text string "Second Line". You need to ensure that an empty line separates the text strings. Which four code segments should you use in sequence? (To answer, move...

November 13, 2018 No Comments READ MORE +

How should you complete the relevant code?

DRAG DROP You are developing an application that implements a set of custom exception types. You declare the custom exception types by using the following code segments: The application includes a function named DoWork that throws .NET Framework exceptions and custom exceptions. The application contains only the following logging methods:...

November 9, 2018 No Comments READ MORE +