Programming in C# 70-483 Real Questions V14.02 | Killtest
You are developing an application that will transmit large amounts of data between a client computer and a server. You need to ensure the validity of the data by using a cryptographic hashing algorithm. Which algorithm should you use? A. ECDsa B. RNGCryptoServiceProvider C. Rfc2898DeriveBytes D. HMACSHA512
D. HMACSHA512
You are developing an application that will transmit large amounts of data between a client computer and a server. You need to ensure the validity of the data by using a cryptographic hashing algorithm. Which algorithm should you use? A. HMACSHA256 B. RNGCryptoServiceProvider C. DES D. Aes
A. HMACSHA256
You are developing an application by using C#. You have the following requirements: • Support 32-bit and 64-bit system configurations. • Include pre-processor directives that are specific to the system configuration. • Deploy an application version that includes both system configurations to testers. • Ensure that stack traces include accurate line numbers. You need to configure the project to avoid changing individual configuration settings every time you deploy the application to testers. Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.) A. Update the platform target and conditional compilation symbols for each application configuration. B. Create two application configurations based on the default Release configuration. C. Optimize the application through address rebasing in the 64-bit configuration. D. Create two application configurations based on the default Debug configuration.
A. Update the platform target and conditional compilation symbols for each application configuration. D. Create two application configurations based on the default Debug configuration.
You are developing an application. The application includes a method named ReadFile that reads data from a file. The ReadFile() method must meet the following requirements: • It must not make changes to the data file. • It must allow other processes to access the data file. • It must not throw an exception if the application attempts to open a data file that does not exist. You need to implement the ReadFile() method. Which code segment should you use? A. var fs = File.Open(Filename, FileMode.OpenOrCreate, FileAccess.Read,FileShare.ReadWrite); B. var fs = File.Open(Filename, FileMode.Open, FileAccess.Read,FileShare.ReadWrite); C. var fs = File.Open(Filename, FileMode.OpenOrCreate, FileAccess.Read,FileShare.Write); D. var fs = File.ReadAllLines(Filename); E. var fs = File.ReadAllBytes(Filename);
A. var fs = File.Open(Filename, FileMode.OpenOrCreate, FileAccess.Read,FileShare.ReadWrite);
You are developing an application by using C#. You provide a public key to the development team during development. You need to specify that the assembly is not fully signed when it is built. Which two assembly attributes should you include in the source code? (Each correct answer presents part of the solution. Choose two.) A. AssemblyFlagsAttribute B. AssemblyKeyFileAttribute C. AssemblyConfigurationAttribute D. AssemblyDelaySignAttribute
B. AssemblyKeyFileAttribute D. AssemblyDelaySignAttribute
You use the Task.Run() method to launch a long-running data processing operation. The data processing operation often fails in times of heavy network congestion. If the data processing operation fails, a second operation must clean up any results of the first operation. You need to ensure that the second operation is invoked only if the data processing operation throws an unhandled exception. What should you do? A. Create a TaskCompletionSource<T> object and call the TrySetException() method of the object. B. Create a task by calling the Task.ContinueWith() method. C. Examine the Task.Status property immediately after the call to the Task.Run() method. D. Create a task inside the existing Task.Run() method by using the AttachedToParent option.
B. Create a task by calling the Task.ContinueWith() method.
You are developing an application that will transmit large amounts of data between a client computer and a server. You need to ensure the validity of the data by using a cryptographic hashing algorithm. Which algorithm should you use? A. RSA B. HMACSHA256 C. Aes D. RNGCryptoServiceProvider
B. HMACSHA256
An application includes a class named Person. The Person class includes a method named GetData. You need to ensure that the GetData() from the Person class. Which access modifier should you use for the GetData() method? A. Internal B. Protected C. Private D. Protected internal E. Public
B. Protected
An application includes a class named Person. The Person class includes a method named GetData. You need to ensure that the GetData() method can be used only by the Person class and not by any class derived from the Person class. Which access modifier should you use for the GetData() method? A. Public B. Protected internal C. Internal D. Private E. Protected
B. Protected internal
You are developing an application by using C#. The application includes an object that performs a long running process. You need to ensure that the garbage collector does not release the object's resources until the process completes. Which garbage collector method should you use? A. ReRegisterForFinalize() B. SuppressFinalize() C. Collect() D. WaitForFullGCApproach()
B. SuppressFinalize()
You are developing an application by using C#. The application includes an object that performs a long running process. You need to ensure that the garbage collector does not release the object's resources until the process completes. Which garbage collector method should you use? A. WaitForFullGCComplete() B. SuppressFinalize() C. WaitForFullGCApproach() D. WaitForPendingFinalizers()
B. SuppressFinalize()
You are developing an application by using C#. The application includes an object that performs a long running process. You need to ensure that the garbage collector does not release the object's resources until the process completes. Which garbage collector method should you use? A. WaitForFullGCComplete() B. SuppressFinalize() C. collect() D. RemoveMemoryPressure()
B. SuppressFinalize()
You are developing an application by using C#. You provide a public key to the development team during development. You need to specify that the assembly is not fully signed when it is built. Which two assembly attributes should you include in the source code? (Each correct answer presents part of the solution. Choose two.) A. AssemblyKeyNameAttribute B. ObfuscateAssemblyAttribute C. AssemblyDelaySignAttribute D. AssemblyKeyFileAttribute
C. AssemblyDelaySignAttribute D. AssemblyKeyFileAttribute
You use the Task.Run() method to launch a long-running data processing operation. The data processing operation often fails in times of heavy network congestion. If the data processing operation fails, a second operation must clean up any results of the first operation. You need to ensure that the second operation is invoked only if the data processing operation throws an unhandled exception. What should you do? A. Create a task within the operation, and set the Task.StartOnError property to true. B. Create a TaskFactory object and call the ContinueWhenAll() method of the object. C. Create a task by calling the Task.ContinueWith() method. D. Use the TaskScheduler class to create a task and call the TryExecuteTask() method on the class.
C. Create a task by calling the Task.ContinueWith() method.
You are developing an application that will transmit large amounts of data between a client computer and a server. You need to ensure the validity of the data by using a cryptographic hashing algorithm. Which algorithm should you use? A. RSA B. Aes C. HMACSHA256 D. DES
C. HMACSHA256
You are developing an application by using C#. The application includes an object that performs a long running process. You need to ensure that the garbage collector does not release the object's resources until the process completes. Which garbage collector method should you use? A. WaitForFullGCComplete() B. WaitForFullGCApproach() C. KeepAlive() D. WaitForPendingFinalizers()
C. KeepAlive()
You are creating a console application by using C#. You need to access the application assembly. Which code segment should you use? A. Assembly.GetAssembly(this); B. this.GetType(); C. Assembly.Load(); D. Assembly.GetExecutingAssembly();
D. Assembly.GetExecutingAssembly();
You are developing an application by using C#. The application includes an object that performs a long running process. You need to ensure that the garbage collector does not release the object's resources until the process completes. Which garbage collector method should you use? A. RemoveMemoryPressure() B. ReRegisterForFinalize() C. WaitForFullGCComplete() D. KeepAlive()
D. KeepAlive()
You are developing an assembly that will be used by multiple applications. You need to install the assembly in the Global Assembly Cache (GAC). Which two actions can you perform to achieve this goal? (Each correct answer presents a complete solution. Choose two.) A. Use the Assembly Registration tool (regasm.exe) to register the assembly and to copy the assembly to the GAC. B. Use the Strong Name tool (sn.exe) to copy the assembly into the GAC. C. Use Microsoft Register Server (regsvr32.exe) to add the assembly to the GAC. D. Use the Global Assembly Cache tool (gacutil.exe) to add the assembly to the GAC. E. Use Windows Installer 2.0 to add the assembly to the GAC.
D. Use the Global Assembly Cache tool (gacutil.exe) to add the assembly to the GAC. E. Use Windows Installer 2.0 to add the assembly to the GAC.
You are developing an application that includes a class named Order. The application will store a collection of Order objects. The collection must meet the following requirements: • Internally store a key and a value for each collection item. • Provide objects to iterators in ascending order based on the key. • Ensure that item are accessible by zero-based index or by key. You need to use a collection type that meets the requirements. Which collection type should you use? A. LinkedList B. Queue C. Array D. HashTable E. SortedList
E. SortedList