Know-IT-All Chapter Quiz: Professional VB 2005, Chapter 13: Security in the .NET Framework 2.0

Think you know all there is about using the security features in .NET Framework 2.0? We challenge you to test your skills by taking our latest quiz. Share the results with us and get a chance to win a copy of Professional VB 2005 written by Bill Evjen, Billy Hollis, Rockford Lhotka, Tim McCarthy, Rama Ramachandran, Kent Sharkey, and Bill Sheldon and published by John Wiley & Sons.

Think you know all there is about using the security features in .NET Framework 2.0? We challenge you to test your skills by taking our latest quiz. Share the results with us and get a chance to win a copy of Professional VB 2005 written by Bill Evjen, Billy Hollis, Rockford Lhotka, Tim McCarthy, Rama Ramachandran, Kent Sharkey, and Bill Sheldon and published by John Wiley & Sons.

All answers to this quiz are found in the free excerpt. Good luck!

  1. The .NET environment provides security through what three types of security?
    Your answer:

    See book excerpt for answer

  2. What permission set is associated with the AllCode code group?
    Your answer:

    See book excerpt for answer

  3. What does the GacIdentityPermission namespace do?
    Your answer:

    See book excerpt for answer

  4. If a programmer passes the user and role information during a call as captured from a custom login, the PrincipalPermission class can be used to verify this information True or False?
    Your answer:

    See book excerpt for answer


  5. What command-line tool can be used to understand which permissions your application is going to need in order to run on another machine?
    Your answer:

    See book excerpt for answer

  6. What does the Action property of the SecurityException class do?
    Your answer:

    See book excerpt for answer


  7. Your answer:

    See book excerpt for answer

  8. Secured Hashing Algorithm is a block cipher and operates on a block size of how many bits?
    Your answer:

    See book excerpt for answer

  9. What is Message Digest version 5 (MD5)?
    Your answer:

    See book excerpt for answer

  10. RSA algorithms can be used for what two security mechanisms?
    Your answer:

    See book excerpt for answer




    How'd you do?
    Send us your results for a chance to win a copy of the book Professional VB 2005 written by Bill Evjen, Billy Hollis, Rockford Lhotka, Tim McCarthy, Rama Ramachandran, Kent Sharkey, and Bill Sheldon and published by John Wiley & Sons.





This was first published in April 2006

Dig deeper on Software Security Testing Tools

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

SearchSOA

TheServerSide

SearchCloudApplications

SearchAWS

SearchBusinessAnalytics

SearchFinancialApplications

SearchHealthIT

Close