98-372 Latest Exam (May 2018)

[Free] 2018(June) Ensurepass Microsoft 98-372 Dumps with VCE and PDF 51-60

May 31, 2018

Ensurepass.com : Ensure you pass the IT Exams
2018 May Microsoft Official New Released 98-372
100% Free Download! 100% Pass Guaranteed!

Microsoft .NET Fundamentals

Question No: 51 – (Topic 1)

You need to force an immediate garbage collection of all unused memory.

Which method should you use?

  1. WaitForFullGCComplete

  2. SuppressFinalize

  3. CollectionCount

  4. Collect

Answer: D

Question No: 52 – (Topic 1)

Which application domain host manages security for web applications?

  1. Browser

  2. Custom-designed

  3. Server

  4. Shell

Answer: A

Question No: 53 – (Topic 1)

A type-safe language prevents:

  1. Access to arbitrary memory locations.

  2. Memory leaks.

  3. Null reference exceptions.

  4. Division by zero exceptions.

Answer: A

Explanation: Type-safe code accesses only the memory locations it is authorized to access.

Question No: 54 – (Topic 1)

You want to substitute values in a string that is displayed on the console. Which code fragment will display quot;Hello, Worldquot;?

  1. Console.WriteLine(quot;Hello, {0}quot;, quot;Worldquot;);

  2. Console.WriteLine(quot;Hello, (0)quot;, quot;Worldquot;);

  3. Console.WriteLine(quot;Hello, lt;0gt;quot;, quot;Worldquot;);

  4. Console.WriteLine(quot;Hello, [0]quot;, quot;Worldquot;);

Answer: A

Question No: 55 – (Topic 1)

You create a class that uses unmanaged resources.

You need to ensure that users of the class can explicitly release resources when the instance of the class is no longer required.

Which two actions should you perform? (Each correct answer presents part of the solution. Choose two.)

  1. Use a class destructor that is called from within the Dispose method.

  2. Implement the IDisposable interface.

  3. Inherit from the WeakReference class.

  4. Use a class destructor that calls the Kill method.

Answer: A,B

Explanation: To properly dispose of unmanaged resources, it is recommended that you implement a public Dispose or Close method that executes the necessary cleanup code for the object. The IDisposable interface provides the Dispose method for resource classes that implement the interface. Because it is public, users of your application can call the Dispose method directly to free memory used by unmanaged resources. When you properly implement a Dispose method, the Finalize method becomes a safeguard to clean up resources in the event that the Dispose method is not called.

Reference: Cleaning Up Unmanaged Resources

Question No: 56 – (Topic 1)

Where is dynamic memory allocated?

  1. Text segment

  2. Code segment

  3. Stack

  4. Heap

Answer: D

Question No: 57 – (Topic 1)

In which file does a .NET Windows application store information that has been customized for a particular instance of the application?

  1. App.config

  2. User.config

  3. Machine.config

  4. Web.config

Answer: B

Question No: 58 – (Topic 1)

Which two goals can you achieve by using cryptography? (Choose two.)

  1. Prevent data from being modified.

  2. Find out which users can access data.

  3. Ensure that data originates from a particular party.

  4. Ensure that data arrives at its destination.

Answer: A,D

Question No: 59 – (Topic 1)

Which two types of actions can trigger an event? (Each correct answer presents a

complete solution. Choose two.)

  1. User intervention, such as a mouse click.

  2. Some other program logic, such as a call to the program module.

  3. Declaring the signature of the delegate.

  4. Adding a delegate keyword.

Answer: A,C

Explanation: * A delegate is a type that holds a reference to a method. A delegate is declared with a signature that shows the return type and parameters for the methods it references, and can hold references only to methods that match its signature.

  • Events in the .NET Framework are based on the delegate model. The delegate model follows the observer design pattern, which enables a subscriber to register with, and receive notifications from, a provider. An event sender pushes a notification that an event has happened, and an event receiver receives that notification and defines a response to it.

    Question No: 60 – (Topic 1)

    Which feature protects computers from running untrusted applications?

    1. Code Access security

    2. Role-based security

    3. Evidence-based security

    4. Cryptography

    Answer: B

    Explanation: Role-Based Security

    Business applications often provide access to data or resources based on credentials supplied by the user. Typically, such applications check the role of a user and provide access to resources based on that role. The common language runtime provides support for role-based authorization based on a Windows account or a custom identity.

    100% Ensurepass Free Download!
    Download Free Demo:98-372 Demo PDF
    100% Ensurepass Free Guaranteed!
    98-372 Dumps

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No