GIAC GSSP-.NET GIAC Secure Software Programmer – C#.NET Online Training
GIAC GSSP-.NET Online Training
The questions for GSSP-.NET were last updated at Nov 02,2025.
- Exam Code: GSSP-.NET
- Exam Name: GIAC Secure Software Programmer - C#.NET
- Certification Provider: GIAC
- Latest update: Nov 02,2025
What is the main purpose of a try-catch block?
- A . To obtain and use resources that are being caught.
- B . To signal the occurrence of an exception during the program execution.
- C . To catch and handle an exception generated by an executable code.
- D . To ensure that the necessary cleanup of external resources is done immediately.
You work as a Software Developer for ABC Inc. The company uses Visual Studio.NET 2005 as its application development platform. You create a Web service using .NET Framework 2.0. You want the Web service to utilize a two step process to map XML
generated by Web methods to .NET objects.
What will you do to accomplish the task? Each correct answer represents a part of the solution. Choose two.
- A . Use deserialization
- B . Use serialization
- C . Use Marshal-by-ref objects
- D . Use Marshal-by-value objects
Which of the following data structures is used for storing reference data types?
- A . Stack
- B . Queue
- C . Hard disk
- D . Heap
ECMAScript is supported in many applications and is commonly known as __________.
- A . VBScript
- B . AJAX
- C . JavaScript
- D . Script
David works as a Software Developer for GenTech Inc. He creates an XML Web service, named MyWebService, using Visual Studio .NET. MyWebService uses Microsoft Windows authentication. Users of MyWebService are in the GenTech domain.
David wants to configure MyWebService to use the following URL-based authorization rules:
l Anonymous users must not be allowed to access MyWebService.
l All the users except User1 and User2 must be allowed to access MyWebService.
David configures Internet Information Services (IIS) to meet these requirements.
Which of the following code will David use to configure the authorization section of the Web.config file for MyWebService?
- A . <authorization>
<deny users="GenTechUser1, GenTechUser2">
<allow users=”*”>
<deny users="?">
</authorization> - B . <authorization> <allow users="*">
<deny users="GenTechUser1, GenTechUser2"> <deny users="?">
</authorization> - C . <authorization>
<deny users="GenTechUser1, GenTechUser2">
<deny users="?">
<allow users="*">
</authorization> - D . <authorization>
<deny users="GenTechUser1, GenTechUser2">
<allow users="*">
</authorization> - E . <authorization> <allow users="*">
<deny users="GenTechUser1, GenTechUser2"> </authorization>
Which of the following provide simplified access to ASP.NET AJAX login, roles, and profile services from Windows Forms and WPF applications?
- A . Entity Framework
- B . AJAX application services
- C . Client application services
- D . Sync Framework
You work as a Software Developer for InfoTech Inc. You create a Windows form in a Windows-based application named MyWinApp1. You use graphics in the form.
You write the following code in your form:
private void MyMouseEvent1(object sender1, MouseEventArgs event)
{
// Code to handle mouse events
}
You want to implement a property of the MouseEventArgs object. This property will return a Point structure that contains the x-coordinate and y-coordinate of the mouse.
Which of the following properties of the MouseEventArgs object will you use to accomplish this?
- A . Y
- B . Delta
- C . Location
- D . Button
- E . Clicks
- F . X
You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a class library using the .NET Framework. The library will be used to open the NSCs of computers. Later, you will set up the class library to the GAC and provide it Full Trust permission.
You write down the following code segments for the socket connections:
SocketPermission permission = new SocketPermission(PermissionState.Unrestricted);
permission.Assert();
A number of the applications that use the class library may not have the necessary permissions to open the network socket connections. Therefore, you are required to withdraw the assertion.
Which of the following code segments will you use to accomplish the task?
- A . permission.PermitOnly();
- B . CodeAccessPermission.RevertDeny();
- C . permission.Deny();
- D . CodeAccessPermission.RevertAssert();
- E . permission.Demand();
Which of the following classes will you use to specify that a string must be centered when drawn?
- A . StringAlignment
- B . StingFormat
- C . String
- D . LineAlignment
All of the following are benefits for query expressions allowed by Language-integrated query except for which one?
- A . Rich metadata
- B . Compile-time syntax checking
- C . Static typing and IntelliSense
- D . Imperative code