Skip to content

(New Updated) Saving Money And Time With New Microsoft 98-372 Exam Braindumps For 100 Percent Exam Pass (1-15)

How To 100% Pass 98-372 Exam: Exam 98-372 have been changed with many new questions, if you want to pass 98-372 exam easily, you should take the new exam questions into your heart, and we PassLeader now are offering the latest and updated 98-372 braindumps with VCE and PDF format, we have added all the new eaxm questions into our files and will help you 100% passing 98-372 exam.

PassLeader 98-372 Exam Questions[16]

Vendor: Microsoft
Exam Code: 98-372
Exam Name: Microsoft .NET Fundamentals

QUESTION 1
Consider the following scenario. Allen has created a Windows Presentation Foundation (WPF) database application using .NET Framework 4.0. The application helps users keep track of their e-Book collection. He identifies that some computers might have many users, such as two roommates might share a computer, with both individuals using the same application on the same computer to manage their e-Book collections. Allen sets up a database to handle many users without mixing up the collections. Allen has implemented a very trendy system that allows users to alter the colors, fonts, and graphics in the application, giving it a personalized look and feel. What is the file name of the configuration file created by Visual Studio for Allen’s application?

A.    Machine.config
B.    Setting.config
C.    App.config
D.    Web.config

Answer: C

QUESTION 2
What is the major advantage of using class libraries?

A.    They secure code with a basic encryption system.
B.    They deploy quicker than full applications.
C.    Easy to organize and maintain your project.
D.    They provide easy access to classes, interfaces, and value types.

Answer: C

QUESTION 3
You are creating an application using .NET Framework 4.0. You need to run numerous lines of code after the application runs, regardless of whether or not an exception occurred. Which type of block can you use to implement this?

A.    Try
B.    Catch
C.    Managed handler
D.    Finally

Answer: D

QUESTION 4
Which method is used to initiate a cleanup of a heap?

A.    Collect
B.    GCCollectionMode
C.    KeepAlive
D.    WaitForPendingFinalizers

Answer: A

QUESTION 5
How is an XmlWriter object useful when writing an XML data to XML documents? Each correct answer represents a complete solution. Choose all that apply.

A.    It ensures that an XML document is well-formed.
B.    It allows multiple XML documents to be written to one output stream.
C.    It allows XML values to be passed as reference by using CLR.
D.    It avoids value conversions automatically.

Answer: AB

QUESTION 6
Which of the following is a means of keeping information a secret and thus protecting the confidentiality, authenticity, and integrity of information?

A.    Authentication
B.    Authorization
C.    Access control
D.    Cryptography

Answer: D

QUESTION 7
What are the steps required to use the BufferedStream class?
71_thumb[1]

Answer:
72_thumb[1]

QUESTION 8
Consider the following scenario. Allen has created a Windows Presentation Foundation (WPF) database application using .NET Framework 4.0. The application helps users keep track of their e-Book collection. He identifies that some computers might have many users, such as two roommates might share a computer, with both individuals using the same application on the same computer to manage their e-Book collections. Allen sets up a database to handle many users without mixing up the collections. Allen has implemented a very trendy system that allows users to alter the colors, fonts, and graphics in the application, giving it a personalized look and feel. How will Allen’s WPF database application store the users’ color choices?

A.    As a setting with user scope
B.    As a string in the source code
C.    As a setting with machine scope
D.    As a setting with application scope

Answer: A


PassLeader 98-372 Exam Questions[24]

http://www.passleader.com/98-372.html

QUESTION 9
Which of the following terms are used in cryptography? Each correct answer represents a complete solution. Choose all that apply.

A.    Ciphertext
B.    Value
C.    Plaintext
D.    Cipher
E.    Key

Answer: ACDE

QUESTION 10
Applications are overridden by explicit version policy in the configuration files. What are those configuration files? Each correct answer represents a complete solution. Choose all that apply.

A.    Computer’s administrator configuration file
B.    Application configuration file
C.    Computer’s security configuration file
D.    Publisher policy file

Answer: ABD

QUESTION 11
What are the benefits of a strong-named assembly? Each correct answer represents a complete solution. Choose all that apply.

A.    It guarantees the uniqueness of a name.
B.    It ensures that subsequent versions cannot be produced.
C.    It describes the identity permission for strong names.
D.    It provides versioning and naming protection.

Answer: AB

QUESTION 12
Allen is creating an application using .NET Framework 4.0. He needs a tool to sign assemblies with strong names and also to provide signature generation, signature verification, and key management. What will he use?

A.    Sn.exe tool
B.    Strname.exe tool
C.    ILasm.exe tool
D.    Asm.exe tool

Answer: A

QUESTION 13
You are creating an application using .NET Framework 4.0. The application uses an instance of the ushort type. Which of the following values can be stored in the instance of the ushort type? Each correct answer represents a complete solution. Choose all that apply.

A.    -127,236
B.    16,633
C.    -48,000
D.    -76,234
E.    127,236
F.     34,210

Answer: BF

QUESTION 14
You are creating a new collection type that must be sorted using Array.Sort by using .NET Framework 4.0. Which of the following interfaces will you use?

A.    ICollection
B.    IEqualityComparer
C.    IList
D.    IComparer

Answer: D

QUESTION 15
Which is a type of encryption that uses two keys, i.e., a public key and a private key pair for data encryption?

A.    Asymmetric encryption
B.    SEAL
C.    Encrypt command
D.    Symmetric encryption

Answer: A


PassLeader 98-372 Exam Questions[7]

http://www.passleader.com/98-372.html