Debug and Security Flashcards
What object is required when invoking either the Write
or Read methods of the CryptoStream class?
A byte array is required.
Which switch class should you instantiate for a simple on/off switch?
the BooleanSwitch class
Which encryption type uses a value table to convert
data of any length to a fixed-length byte sequence to
provide data confidentiality and integrity?
hash encryption
Which method of the CryptoStream class should you invoke to decrypt data?
the Read method
Which two classes represent the hashing algorithms
Message Digest 5 (MD5) and Secure Hash Algorithm
(SHA)-245, respectively?
the MD5CryptoServiceProvider and
SHA245Managed classes
Which assembly attribute should you apply to indicate
the keys used when compiling a strong-named
assembly?
the AssemblyKeyFile attribute
What provides isolation and security for an
application?
the application domain
Which tool should you use to encrypt the
connectionStrings section of a Web.config file?
the ASP.NET IIS Registration (Aspnet_regiis.exe)
tool
Which method of the CryptoStream class should you invoke to encrypt data?
the Write method
Which method of the Stopwatch class pauses measurement of the time interval?
the Stop method
Which method of the SiteMembershipCondition class determines whether an assembly belongs to a site based upon the specified evidence?
the Check method
Which attribute should you apply to a parameter or
return type to force marshaling into a specific COM
data type?
the MarshalAs attribute
Which class uses an asymmetric algorithm that supports up to 1,024-bit keys?
the DSACryptoServiceProvider class
Which attribute should you add to a custom installer class to ensure it will be invoked?
the RunInstaller attribute
Which method of the EventLog class should you invoke to write an event log?
the WriteEntry method
Which key property of the HMAC class is not in the HashAlgorithm class?
the Key property
Which class represents a hash algorithm used strictly for data integrity?
the MD5 class
Which method must a class implement to be used as a key for an item in a Hashtable collection?
the GetHashCode method
Which property of the Process class returns the name of the computer on which the process is running?
the MachineName property
Which property of the EventLog class indicates the event origin of a log?
the Source property
What is reflection?
A way to explore loaded assemblies and the types
defined within them at runtime.
Which method of the Stopwatch class sets the elapsed time to zero and begins measurement of a new time interval?
the Restart method
Which encryption type uses a single key to encrypt
and decrypt data to provide data confidentiality?
symmetric encryption
Which property of the AppDomain class should you
use to retrieve or set the probing location for private
assemblies?
the RelativeSearchPath property
Which command-line tool allows users to modify
security permissions, permission sets, and code
groups for an assembly?
the caspol.exe tool
Which class is used to verify whether an assembly belongs to a code group based upon the website from which it originates?
the SiteMembershipCondition class
Which encryption type uses fixed size blocks and
iterations to provide data confidentiality with the best
overall performance?
symmetric encryption
Which method of the Assembly class should you
invoke to retrieve the assembly instance that invoked
the currently executing code?
the GetCallingAssembly method
Which encryption type provides higher security than
symmetric encryption, but also uses a fixed buffer
size, a larger range of key values, and more timeconsuming algorithms?
asymmetric encryption
Which property of the ServiceSecurityAuditBehavior
class sets the specific Event Log for audit messages,
specifically Application or Security?
the AuditLogLocation property
Which class uses an asymmetric algorithm that supports up to 16,384-bit keys?
the RSACryptoServiceProvider class
Which class should you use to create the new performance counters?
the PerformanceCounterCategory class
Which value of the TraceLevel enumeration will only
trace error and warning messages?
the Warning (2) value