Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

DISM 1

Internal Test T3 Enrollment :____________________


Student Name:____________________

Modules:
 Core Foundation of Ms.Net Framework
 Advanced Foudation of .Net Framework

1. Arrange the steps in sequence to create a 3. Which of the following value-types are
category and a set of counters supported by CLR? (Choose all that apply)
programmatically:
a. Create a collection of type  Built-in value-types
CounterCreationDataCollection.  Enumerations
b. Call the Add method of the  Structures
collection to add the counters to it.  User-defined value-types
c. Call the Create method of the
PerformanceCounterCategory class 4. Match the Caspol Switch with Purpose.
and pass the collection to the
method.
d. Create the counters as objects of S.No Left Right Column
type CounterCreationData . Column
1 -ag List code group names
 A,d,b,c
and descriptions. (3)
 C,a,d,b 2 -cg Alter code group with
 B,d,c,a the specified name or
 D,c,b,a index (2)
3 -ld Add code group to a
2. Arrange the steps in sequence to deserialize parent (1)
an object from an XML stream: 4 -lg List code groups (4)
a. Implement the ReadXml method
5. What does DLL stand for?
of the IXmlSerializable interface
 Dynamic Language Library
to customize the XML
 Data Language Library
deserialization process
b. Call the Deserialize method and  Data Link Library
read data from the TextReader or  Dynamic Link Library
XmlReader object
c. Catch deserialization events to 6. Which of the following are the advantages
handle unexpected data of static method? (Choose all that apply)
d. Create and XmlSerializer object  Static methods can be invoked
and specify the type of object to by using the class name
be serialized directly.
 A,b,c,d  Static methods can be re-
 C,a,d,b defined in instances.
 B,d,c,a  Static methods can be only
 D,b,c,a hidden.
DISM 2

 Three threads
7. Which of the following can a structure type  Four threads
contain? (Choose all that apply) 13. Which of these methods would you use if
 Variables you want a method to be called repeatedly.
 Methods  WaitHandle
 Properties  Semaphore
 Parameterized constructors  ThreadPool
 Timer
8. Match the keyword description. 14. A .Net framework assembly is a __________
file.
S.N Left Column Right Column  Windows portable executable
o
 Code Access Security
1 Enum Define an
interface. 4  Access Control List
2 Class Define a class 2  Intermediate language
3 Struct Define an 15. In CAS, permissions are granted to :
enumeration 1  Assembly
4 Interface Define a structure  Library classes
3
 Users
 Code
9. _________ is a running application and
16. In .Net framework, what does SDK stand
consists of virtual memory space, code,
for?
data, and system resources.
 Software development kit
 Process
 System development kit
 Thread
 Service development kit
 Application
 System developer’s kit
 Module
17. Which action will take place when a call is
10. You can modify the way in which the
made to a method that in turn calls the
interop marshaler transforms data by
Assert method?
specifying the attribute.
a. The requested permissions are
 StructLayoutAttribute
granted
 MarshalAsAttribute
b. Uses the CAs permissions checks
 FiledOffsetAttribute
c. The code calls the demand method
 DllImportAttribute
d. The stack walk stops
11. What does a PE format file define?
 A
 Information about other data
 B
 Interface Definition Files
 C
 The structure of an executable
 D
file on windows platform
 Types and members that are
18. What does CASPOL stand for?
defined within the module.
 Code access security policy
12. A computer has a fixed number of
 Console access security
processors, and each processor can run only
prompt
________ at a time.
 Command access security
 One thread
prompt
 Two threads
 Code assert security policy
DISM 3

zA-Z0-9] (2)
22. __________indicates that the heap space
they occupy needs to be recycled so that
19. Match the Quantifier Character Regular the space is available for subsequent new
Expression with description objects.
 Garbage collection
S.No Left Right Column  Object creation
Column
 Recycle bin
1 * Specifying that the
preceding character  Recycle heap
matches one or more
times. (2) 23. Which of the following regular expressions
2 {n,} Specifying that the will match the string ‘abc’ at the beginning
preceding character or end of an input string?
matches exactly n times.  (^[abc] | [abc]$)
(4)
 (^abc && $abc)
3 ? Specifies 0 or 1 matches.
Equivalent to {0,1}(3)  (^abc | $abc)
4 {n} Specifies 0 or more  (^abc | abc$)
matches equivalent to
{0} (1) 24. Concurrent programming is a process of
running several tasks at a time.
20. Which of the following programming  True
elements can be annotated with attributes  False
using a CLR? (Choose all that apply)
 Types 25. The _______ method of the string class
 Methods returns the index of the first occurrence of
 Fields the specified character or string within a
 Properties string.
 Concat()
 CharAt()
21. Match the Character Regular Expression  indexOf()
with description
26. Which of the following options are used
S.N Left Right Column with exceptions? (Choose all that apply)
o. Column  Try
1 \w Matches any decimal  Throw
digit; equivalent to[0-9]
 Catch
(3)
2 \W Matches any word  New
character equivalent to
the character group [a- 27. Which of the following are public methods
ZA-Z0-9] (1) of the IList generic Interface?
3 \d Matches any non-  IndexOf
decimal digit;
 RemoveAt
equivalent to[^0-9] (4)
 Insert
4 \D Matches and non-word
character equivalent to  Delete
the character group[^a-
DISM 4

28. Which of the following collection interfaces  Type independent abstract


are implemented by the LinkedList Generic algorithms can be used with
class? (Choose all that apply) generic types.
 IEnumerable generic interface 33. Arrange the steps involved in invoking a
 IEnumerablenon generic method synchronously by using a delegate
interface instance.
 ICollection generic interface a) Include the arguments to be
 ICollection nongeneric passed in a paraenthesis
interface b) Return a value
29. Select the permissions required by an c) Use the name of the delegate
application to access the event log (Choose instance
all that apply) d) Retrieve the value
 Read  A,b,c,d
 Write  B,a,c,d
 Clear  B,d,c,a
 Full control  C,a,b,d
30. Which of the following statements are true 34. Symmetric encryption is also known as
about WriteLineIf method? (Choose all that _______
apply)  Secret-key Encryption
 Writes the output if the  Encryption Algorithms
specified condition returns  Block Ciphers
true  Decryption
 Writes the output if the 35. Which of these is a pair of mathematically
specified condition returns linked keys that is used by Asymmetric
false encryption? (Choose all that apply)
 Executes the output if the  Secret Key
specified condition returns  Data key
true.  Private key
 Appends a carriage return to  Public key
the end of the output 36. Match the class with description.
31. The ________ method computes the
signature for the specified hash value by S Left Column Right Column
encrypting it by using the private key 1 FileIOPermissio Indicates that the calling code
n must have the specified
 VerifySignature
permissions to access the
 VerifyData clipboard. (3)
 SignHash 2 RegistryPermiss Indicates that the calling code
 VerifyHash ion must have the specified read and
32. Which of the following are the advantages write permissions to access the
of generic types? (Choose all that apply) specified files and folders. (1)
3 UIPermission Indicates that some types in the
 Generic types enforce
assembly may request the
compile-time type checking specified permissions, but the
 The code in a generic type has assembly must still be loaded even
to be defined only once. if policy doesn’t grant permission.
 Generic types do not have to (4)
box and unbox data.
DISM 5

4 RequestOption Indicates that the calling code directly from the


al must have the specified read/write System.ValueType type
or create permissions to access the  A Structure is a system default
specified keys. (2)
value-type that inherits
directly from the
37. Identify the tasks for which the .Net
System.ValueType type
framework Configuration tool Mscorcfg.msc
40. Which of the following keywords define a
can be used. (Choose all that apply)
structure type? (Choose all that apply)
 Manage the assembly cache
 Delegate
 Manage configured assemblies
 Struct
 Configure code access security
 Class
 Adjust remoting services
 Enum

38. Match the Performance Counters in


System.Diagnostics class with the
-----------------------------------------------
description.

S. Left Right Column


No Column
.
1 Perform Retrieves multiple
anceCo instances of a counter (4)
unter
2 Perform Creates or removes
anceCo custom categories (2)
unterCa
tegory
3 Counter Evaluates feedback from
Creatio existing counters (3)
nData
4 Instanc Creates multiple
eData Counters in a category
and specifies their
types(3)

39. Which of the following is true about


Structures?
 A Structure is an enumerated
value-type that inherits
directly from the
System.ValueType type
 A Structure is a user-defined
value-type that inherits
directly from the
System.ValueType type
 A Structure is structured
value-type that inherits

You might also like