How To 100% Pass 98-372 Exam: Exam 98-372 have been changed with many new questions, if you want to pass 98-372 exam easily, you should take the new exam questions into your heart, and we PassLeader now are offering the latest and updated 98-372 braindumps with VCE and PDF format, we have added all the new eaxm questions into our files and will help you 100% passing 98-372 exam.
Vendor: Microsoft
Exam Code: 98-372
Exam Name: Microsoft .NET Fundamentals
QUESTION 1
Consider the following scenario. Allen has created a Windows Presentation Foundation (WPF) database application using .NET Framework 4.0. The application helps users keep track of their e-Book collection. He identifies that some computers might have many users, such as two roommates might share a computer, with both individuals using the same application on the same computer to manage their e-Book collections. Allen sets up a database to handle many users without mixing up the collections. Allen has implemented a very trendy system that allows users to alter the colors, fonts, and graphics in the application, giving it a personalized look and feel. What is the file name of the configuration file created by Visual Studio for Allen’s application?
A. Machine.config
B. Setting.config
C. App.config
D. Web.config
Answer: C
QUESTION 2
What is the major advantage of using class libraries?
A. They secure code with a basic encryption system.
B. They deploy quicker than full applications.
C. Easy to organize and maintain your project.
D. They provide easy access to classes, interfaces, and value types.
Answer: C
QUESTION 3
You are creating an application using .NET Framework 4.0. You need to run numerous lines of code after the application runs, regardless of whether or not an exception occurred. Which type of block can you use to implement this?
A. Try
B. Catch
C. Managed handler
D. Finally
Answer: D
QUESTION 4
Which method is used to initiate a cleanup of a heap?
A. Collect
B. GCCollectionMode
C. KeepAlive
D. WaitForPendingFinalizers
Answer: A
QUESTION 5
How is an XmlWriter object useful when writing an XML data to XML documents? Each correct answer represents a complete solution. Choose all that apply.
A. It ensures that an XML document is well-formed.
B. It allows multiple XML documents to be written to one output stream.
C. It allows XML values to be passed as reference by using CLR.
D. It avoids value conversions automatically.
Answer: AB
QUESTION 6
Which of the following is a means of keeping information a secret and thus protecting the confidentiality, authenticity, and integrity of information?
A. Authentication
B. Authorization
C. Access control
D. Cryptography
Answer: D
QUESTION 7
What are the steps required to use the BufferedStream class?
QUESTION 8
Consider the following scenario. Allen has created a Windows Presentation Foundation (WPF) database application using .NET Framework 4.0. The application helps users keep track of their e-Book collection. He identifies that some computers might have many users, such as two roommates might share a computer, with both individuals using the same application on the same computer to manage their e-Book collections. Allen sets up a database to handle many users without mixing up the collections. Allen has implemented a very trendy system that allows users to alter the colors, fonts, and graphics in the application, giving it a personalized look and feel. How will Allen’s WPF database application store the users’ color choices?
A. As a setting with user scope
B. As a string in the source code
C. As a setting with machine scope
D. As a setting with application scope
Answer: A
http://www.passleader.com/98-372.html
QUESTION 9
Which of the following terms are used in cryptography? Each correct answer represents a complete solution. Choose all that apply.
A. Ciphertext
B. Value
C. Plaintext
D. Cipher
E. Key
Answer: ACDE
QUESTION 10
Applications are overridden by explicit version policy in the configuration files. What are those configuration files? Each correct answer represents a complete solution. Choose all that apply.
A. Computer’s administrator configuration file
B. Application configuration file
C. Computer’s security configuration file
D. Publisher policy file
Answer: ABD
QUESTION 11
What are the benefits of a strong-named assembly? Each correct answer represents a complete solution. Choose all that apply.
A. It guarantees the uniqueness of a name.
B. It ensures that subsequent versions cannot be produced.
C. It describes the identity permission for strong names.
D. It provides versioning and naming protection.
Answer: AB
QUESTION 12
Allen is creating an application using .NET Framework 4.0. He needs a tool to sign assemblies with strong names and also to provide signature generation, signature verification, and key management. What will he use?
A. Sn.exe tool
B. Strname.exe tool
C. ILasm.exe tool
D. Asm.exe tool
Answer: A
QUESTION 13
You are creating an application using .NET Framework 4.0. The application uses an instance of the ushort type. Which of the following values can be stored in the instance of the ushort type? Each correct answer represents a complete solution. Choose all that apply.
A. -127,236
B. 16,633
C. -48,000
D. -76,234
E. 127,236
F. 34,210
Answer: BF
QUESTION 14
You are creating a new collection type that must be sorted using Array.Sort by using .NET Framework 4.0. Which of the following interfaces will you use?
A. ICollection
B. IEqualityComparer
C. IList
D. IComparer
Answer: D
QUESTION 15
Which is a type of encryption that uses two keys, i.e., a public key and a private key pair for data encryption?
A. Asymmetric encryption
B. SEAL
C. Encrypt command
D. Symmetric encryption
Answer: A