MCSD.NET - 70-340 Exam Question:
Download Questions PDF

You are developing an application that will
be used both by company users and by contractors. Contractors will install the application on
their own portable computers. A written company policy prohibits contractors from easily
accessing or reviewing the source code of company applications. The file servers that contain the
source code for the application are configured so that only company software developers have
access.
You need to ensure that the contractors cannot easily access the application source code.
What should you do?
A. Run Dotfuctaor Community Edition on each of the application assemblies.
B. Apply a strong name to each of the application assemblies.
C. Run the Code Access Security Policy tool for each of the application assemblies before
distributing the application.
D. Use Encrypting File System (EFS) to encrypt the compiled application assemblies.

MCSD.NET - 70-340 Exam Interview Question
MCSD.NET - 70-340 Exam Interview Question

Answer:

A. Run Dotfuctaor Community Edition on each of the application assemblies.

Download MCSD.NET - 70-340 Exam Interview Questions And Answers PDF

Previous QuestionNext Question
Users who are temporary employees are
members of a group named TemporaryEmployees. You develop a serviced component named
CompanyComponent. CompanyComponent is part of a COM+ application named MyApplication.
CompanyComponent is secured by using the SecurityRole attribute for the Employees role.
You need to ensure that members of the TemporaryEmployees group are assigned to the
Employees role.
You decide to add the TemporaryEmployees group to the existing Employees role.
Which tool should you use?
A. The code Access Security Policy tool.
B. The Permission View tool.
C. The Component Services tool.
D. The Secutil tool.
E. The Microsoft .NET Framework Configuration tool.
Suppose You are developing a Windows-based
payroll application that will be used by all payroll administrators in the company. The application
has a single executable file that uses a separate assembly to modify payroll data.
You need to design security for your application to ensure that the assembly cannot be called by
unauthenticated and unauthorized users.
What should you do?
A. Run the application by using a user account that has access to the application directory.
B. Modify the application to validate all user-entered data.
C. Modify the application to authenticate and authorize user access within each assembly as it is
called.
D. Modify the application to authenticate and authorize user access when each user runs the
executable file.
E. Set the folder-level permissions to the executable file by using directory security.