This page was exported from New Real Practice Test With VCE And PDF For Free Download [ http://www.actualtest.info ] Export date:Thu Mar 28 13:21:15 2024 / +0000 GMT ___________________________________________________ Title: (New Updated) Do Not Missed The New Published Microsoft 98-372 Study Materails With New Added Questions (1-15) --------------------------------------------------- How To 100% Pass 98-372 Exam: Exam 98-372 have been changed with many new questions, if you want to pass 98-372 exam easily, you should take the new exam questions into your heart, and we PassLeader now are offering the latest and updated 98-372 braindumps with VCE and PDF format, we have added all the new eaxm questions into our files and will help you 100% passing 98-372 exam. Vendor: MicrosoftExam Code: 98-372Exam Name: Microsoft .NET Fundamentals QUESTION 1Consider the following scenario. Allen has created a Windows Presentation Foundation (WPF) database application using .NET Framework 4.0. The application helps users keep track of their e-Book collection. He identifies that some computers might have many users, such as two roommates might share a computer, with both individuals using the same application on the same computer to manage their e-Book collections. Allen sets up a database to handle many users without mixing up the collections. Allen has implemented a very trendy system that allows users to alter the colors, fonts, and graphics in the application, giving it a personalized look and feel. What is the file name of the configuration file created by Visual Studio for Allen's application? A.    Machine.configB.    Setting.configC.    App.configD.    Web.config Answer: C QUESTION 2What is the major advantage of using class libraries? A.    They secure code with a basic encryption system.B.    They deploy quicker than full applications.C.    Easy to organize and maintain your project.D.    They provide easy access to classes, interfaces, and value types. Answer: C QUESTION 3You are creating an application using .NET Framework 4.0. You need to run numerous lines of code after the application runs, regardless of whether or not an exception occurred. Which type of block can you use to implement this? A.    TryB.    CatchC.    Managed handlerD.    Finally Answer: D QUESTION 4Which method is used to initiate a cleanup of a heap? A.    CollectB.    GCCollectionModeC.    KeepAliveD.    WaitForPendingFinalizers Answer: A QUESTION 5How is an XmlWriter object useful when writing an XML data to XML documents? Each correct answer represents a complete solution. Choose all that apply. A.    It ensures that an XML document is well-formed.B.    It allows multiple XML documents to be written to one output stream.C.    It allows XML values to be passed as reference by using CLR.D.    It avoids value conversions automatically. Answer: AB QUESTION 6Which of the following is a means of keeping information a secret and thus protecting the confidentiality, authenticity, and integrity of information? A.    AuthenticationB.    AuthorizationC.    Access controlD.    Cryptography Answer: D QUESTION 7What are the steps required to use the BufferedStream class? Answer: QUESTION 8Consider the following scenario. Allen has created a Windows Presentation Foundation (WPF) database application using .NET Framework 4.0. The application helps users keep track of their e-Book collection. He identifies that some computers might have many users, such as two roommates might share a computer, with both individuals using the same application on the same computer to manage their e-Book collections. Allen sets up a database to handle many users without mixing up the collections. Allen has implemented a very trendy system that allows users to alter the colors, fonts, and graphics in the application, giving it a personalized look and feel. How will Allen's WPF database application store the users' color choices? A.    As a setting with user scopeB.    As a string in the source codeC.    As a setting with machine scopeD.    As a setting with application scope Answer: A http://www.passleader.com/98-372.html QUESTION 9Which of the following terms are used in cryptography? Each correct answer represents a complete solution. Choose all that apply. A.    CiphertextB.    ValueC.    PlaintextD.    CipherE.    Key Answer: ACDE QUESTION 10Applications are overridden by explicit version policy in the configuration files. What are those configuration files? Each correct answer represents a complete solution. Choose all that apply. A.    Computer's administrator configuration fileB.    Application configuration fileC.    Computer's security configuration fileD.    Publisher policy file Answer: ABD QUESTION 11What are the benefits of a strong-named assembly? Each correct answer represents a complete solution. Choose all that apply. A.    It guarantees the uniqueness of a name.B.    It ensures that subsequent versions cannot be produced.C.    It describes the identity permission for strong names.D.    It provides versioning and naming protection. Answer: AB QUESTION 12Allen is creating an application using .NET Framework 4.0. He needs a tool to sign assemblies with strong names and also to provide signature generation, signature verification, and key management. What will he use? A.    Sn.exe toolB.    Strname.exe toolC.    ILasm.exe toolD.    Asm.exe tool Answer: A QUESTION 13You are creating an application using .NET Framework 4.0. The application uses an instance of the ushort type. Which of the following values can be stored in the instance of the ushort type? Each correct answer represents a complete solution. Choose all that apply. A.    -127,236B.    16,633C.    -48,000D.    -76,234E.    127,236F.     34,210 Answer: BF QUESTION 14You are creating a new collection type that must be sorted using Array.Sort by using .NET Framework 4.0. Which of the following interfaces will you use? A.    ICollectionB.    IEqualityComparerC.    IListD.    IComparer Answer: D QUESTION 15Which is a type of encryption that uses two keys, i.e., a public key and a private key pair for data encryption? A.    Asymmetric encryptionB.    SEALC.    Encrypt commandD.    Symmetric encryption Answer: A http://www.passleader.com/98-372.html --------------------------------------------------- Images: http://www.itexamquiz.com/passleader/plimages/4648bef5e42b_D341/PassLeader-98-372-Exam-Questions16.jpg http://www.itexamquiz.com/passleader/plimages/4648bef5e42b_D341/71_thumb1_thumb.jpg http://www.itexamquiz.com/passleader/plimages/4648bef5e42b_D341/72_thumb1_thumb.jpg http://www.itexamquiz.com/passleader/plimages/4648bef5e42b_D341/PassLeader-98-372-Exam-Questions24.jpg http://www.itexamquiz.com/passleader/plimages/4648bef5e42b_D341/PassLeader-98-372-Exam-Questions7.jpg --------------------------------------------------- --------------------------------------------------- Post date: 2015-01-08 07:16:05 Post date GMT: 2015-01-08 07:16:05 Post modified date: 2015-01-08 07:16:05 Post modified date GMT: 2015-01-08 07:16:05 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com