GIAC GSSP-.NET GIAC Secure Software Programmer – C#.NET Online Training
GIAC GSSP-.NET Online Training
The questions for GSSP-.NET were last updated at Sep 14,2025.
- Exam Code: GSSP-.NET
- Exam Name: GIAC Secure Software Programmer - C#.NET
- Certification Provider: GIAC
- Latest update: Sep 14,2025
Allen works as a Software Developer for ABC Inc. The company uses Visual Studio .NET 2005 as its application development platform. Allen creates an application that will be used to handle security information related to the company. He wants to secure the application by using the most secure authentication method. The method should have a strong key for encryption and send the encrypted password across the network.
Which of the following authentication methods will Allen use to accomplish the task?
- A . Integrated Windows authentication
- B . Basic authentication
- C . Certificate-based authentication
- D . Digest authentication
Which of the following is a restriction operator in LINQ?
- A . GROUPBY
- B . WHERE
- C . THENBY
- D . SELECTMANY
Which of the following options is not a primary objective of the WS-Security 1.1 specification?
- A . Integrity
- B . Confidentiality
- C . Authentication
- D . Validation
Allen works as a Software Developer for ABC Inc. The company uses Visual Studio.NET as its application development platform. He creates an application using .NET Framework. He wants to encrypt all his e-mails that he sends to anyone.
Which of the following will he use to accomplish the task?
- A . PPP
- B . FTP
- C . PPTP
- D . PGP
Andrew works as a Software Developer for Mansoft Inc. The company’s network has a Web server that hosts the company’s Web site. Andrew wants to enhance the security of the Web site by implementing Secure Sockets Layer (SSL).
Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two.
- A . Symmetric
- B . Secret
- C . IPSec
- D . Asymmetric
Which class allows checks against the active principal using the language constructs defined for the declarative and imperative security actions?
- A . IPrincipal
- B . CodeAccessPermission
- C . PrincipalPermission
- D . SecurityPermission
Which of the following APIs is used to collect information about any running state and any errors that occur within an ASP.NET application?
- A . Profile API
- B . Health Monitoring API
- C . Error Handling API
- D . Personalization API
You work as a Software Developer for ABC Inc. The company uses Visual Studio .NET as its application development platform. You create a class library using the .NET Framework. The library will be used to open the NSCs of computers. Later, you will set up the class library to the GAC and provide it Full Trust permission.
You write down the following code segments for the socket connections:
SocketPermission permission = new SocketPermission(PermissionState.Unrestricted);
permission.Assert();
A number of the applications that use the class library may not have the necessary permissions to open the network socket connections. Therefore, you are required to withdraw the assertion.
Which of the following code segments will you use to accomplish the task?
- A . permission.PermitOnly();
- B . CodeAccessPermission.RevertDeny();
- C . permission.Deny();
- D . CodeAccessPermission.RevertAssert();
- E . permission.Demand();
You work as a Software Developer for Hi-Tech Inc. You develop an application using Visual Studio .NET 2005. You create an unregistered COM DLL file named Com1.dll. You want to use this Com1.dll file in your application code. However, Com1.dll needs to be registered in the Windows Registry before it is used by the application.
Which of the following tools will you use to accomplish the task?
- A . Wsdl.exe
- B . Regsvr32.exe
- C . Tlbimp.exe
- D . Disco.exe
Allen works as a Software Developer for ABC Inc. He creates an application using Visual Studio .NET 2005. He wants to ensure that the application must manage state effectively. State is how data is moved and persisted throughout the layers of the application. There are number of factors to validate state management.
Which of the following factors will he consider to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.
- A . State persistence
- B . Saving state
- C . Caching
- D . Shared state
- E . View state