Quiz

Know-IT-All Chapter Quiz: Professional VB 2005, Chapter 13: Security in the .NET Framework 2.0

Think you know all there is about using the security features in .NET Framework 2.0? We challenge you to test your skills by taking our latest quiz. Share the results with us and get a chance to win a copy of Professional VB 2005 written by Bill Evjen, Billy Hollis, Rockford Lhotka, Tim McCarthy, Rama Ramachandran, Kent Sharkey, and Bill Sheldon and published by John Wiley & Sons.

All answers to this quiz are found in the free excerpt. Good luck!

  1. The .NET environment provides security through what three types of security?
    Your answer:

    See book excerpt for answer

  2. What permission set is associated with the AllCode code group?
    Your answer:

    See book excerpt for answer

  3. What does the GacIdentityPermission namespace do?
    Your answer:

    See book excerpt for answer

  4. If a programmer passes the user and role information during a call as captured from a custom login, the PrincipalPermission class can be used to verify this information True or False?
    Your answer:

    See book excerpt for answer


  5. What command-line tool can be used to understand which permissions your application is going to need in order to run on another machine?
    Your answer:

    See book excerpt for answer

  6. What does the Action property of the SecurityException class do?
    Your answer:

    See book excerpt for answer


  7. Your answer:

    See book excerpt for answer

  8. Secured Hashing Algorithm is a block cipher and operates on a block size of how many bits?
    Your answer:

    See book excerpt for answer

  9. What is Message Digest version 5 (MD5)?
    Your answer:

    See book excerpt for answer

  10. RSA algorithms can be used for what two security mechanisms?
    Your answer:

    See book excerpt for answer




    How'd you do?
    Send us your results for a chance to win a copy of the book Professional VB 2005 written by Bill Evjen, Billy Hollis, Rockford Lhotka, Tim McCarthy, Rama Ramachandran, Kent Sharkey, and Bill Sheldon and published by John Wiley & Sons.





    This was first published in April 2006

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: