1. Which of the following are included in a Static assembly?

Answers:

  1. Modules
  2. Type metadata
  3. MSIL code
  4. Assembly manifest

2. Which of the following are the main goals behind ADO .NET?

Answers:

  1. To provide seamless support for XML
  2. To support COM directly
  3. To provide an expandable and scalable data access architecture for the revolutionary n-tier programming model
  4. To extend the current capabilities of ADO

3. Application domains are created by:

Answers:

  1. Windows shell
  2. ASP.Net
  3. IE
  4. None of the above

4. Which of the following are correct about delegates?

Answers:

  1. A delegate is an object that refers to a subroutine, function or other method
  2. A delegate variable acts as a pointer to a subroutine or function
  3. A delegate can not hold the address of a class’s shared method
  4. Delegate variables are sometimes called type-safe function pointers

5. Which of the following protocols can be used for .Net Remoting?

Answers:

  1. TCP
  2. HTTP
  3. SMTP
  4. All of the above

6. Which of the following is correct for value and reference types in .NET?

Answers:

  1. Value types directly contain their data
  2. Reference types store a reference to the value’s memory address
  3. Value types can be built-in but can’t be user-defined
  4. All of the above

7. Which of these are runtime hosts in .Net Framework?

Answers:

  1. CLR
  2. IE
  3. IIS
  4. ASP.NET

8. Which of the following run In-Process?

Answers:

  1. EXE file
  2. Resx file
  3. DLL file
  4. OCX file

9. A manifest includes the following data about the assembly

Answers:

  1. File list
  2. None
  3. Referenced assemblies
  4. MSIL information

10. The Process of automatic memory management involves the following tasks:

Answers:

  1. Allocating memory
  2. Registering memory
  3. Implementing finalizers
  4. Using destroy

11. A standard Windows PE file is divided into a number of sections. Which of the following are not valid native image sections?

Answers:

  1. .textdata
  2. .data
  3. .rpdata
  4. .rsrc

12. Which of the following statements is true?

Answers:

  1. You can access managed data from managed code
  2. You can access managed data from managed and unmanaged code
  3. Managed code can access both managed and unmanaged data
  4. Managed code cannot access both managed and unmanaged data

13. Which of the following methods are used to stop a thread?

Answers:

  1. Thread.Interrupt()
  2. Thread.Suspend()
  3. Thread.Sleep()
  4. Thread.Abort()

14. ___________ class grants the permission to manipulate files located in the code assemblies, to code assemblies that match the membership condition.

Answers:

  1. FileCodeGroup
  2. FirstMatchCodeGroup
  3. CodeFileGroup
  4. CodeGroup

15. Which of the following statements is correct with regard to .NET framework managed web pages?

Answers:

  1. They interact directly with the runtime
  2. They do not execute in the native code language
  3. They are interpreted and scripted
  4. All of the above

16. Which of the following protocols can be used for ASP.Net Web Services?

Answers:

  1. TCP
  2. HTTP
  3. SMTP
  4. All of the above

17. When are AssemblyHash values used?

Answers:

  1. They are used throughout the common language runtime to detect a change in assembly contents
  2. They are used in the Common type system for type safety
  3. They are used to change the metadata information in assemblies

18. In.NET generics, the type parameter:

Answers:

  1. Needs to be constrained in container classes
  2. Needs to be constrained in all the classes
  3. Cannot be constrained in container classes
  4. Cannot be constrained in any class

19. How many classes can a single .NET DLL contain?

Answers:

  1. 10
  2. 20
  3. Unlimited
  4. 5

20. Where is the Shared assembly generally stored?

Answers:

  1. Application’s directory
  2. Global assembly cache
  3. C drive
  4. None of the above

21. Which of the following is not correct with regard to shared assembly?

Answers:

  1. Its version can be controlled by the author only
  2. It can be shared by many applications
  3. It must get registered with the machine registry
  4. It is installed in the global assembly cache

22. Which Portable Executable (PE) file does not contain the assembly manifest?

Answers:

  1. Executable
  2. DLL
  3. Module
  4. ALL

23. In .NET framework, what are the options available for packaging?

Answers:

  1. CAB
  2. EXE
  3. MSI
  4. All of the above

24. Which of the following are public methods of System.Object?

Answers:

  1. GetHashCode()
  2. GetType()
  3. Equals()
  4. All of the above

25. Which of the following helps expose COM components to the .NET framework?

Answers:

  1. RCW
  2. CCA
  3. CWA
  4. CCW

26. Which of the following tools can be used to get the metadata information about the assembly and view IL code?

Answers:

  1. soapsuds.exe
  2. lldasm.exe
  3. al.exe
  4. PerfMon.exe
  5. SN.exe

27. Which of the following tools assists Assembly Signing?

Answers:

  1. CASPol.exe
  2. PerfMon.exe
  3. SN.exe
  4. soapsuds.exe

28. In which file can you define the “Process Model” attribute?

Answers:

  1. Web.config
  2. Machine.config
  3. In both files
  4. In neither file

29. C# has a keyword called int. Which .NET type does this map to?

Answers:

  1. System.Int16
  2. System.Int32
  3. System.Int64
  4. System.Int128

30. Which of the options is being referred to in the following statement:

“All incoming requests are processed by a single server object”

Answers:

  1. SingleCall
  2. Client-activated object
  3. Singleton
  4. None of these

31. A user application-domain can be created:

Answers:

  1. Automatically
  2. By using a static method “CreateAppDomain”
  3. By using a static method “CreateDomain”
  4. By using a non static method “CreateAppDomain”

32. The global assembly cache:

Answers:

  1. Can store two dll files with the same name
  2. Can store two dll files with the same name, but different version
  3. Can store two dll files with the same name and same version
  4. Can not store dll files with the same name

33. What does Managed Data refer to?

Answers:

  1. The data stored by CLR
  2. The data allocated by CLR GC
  3. The data de-allocated by CLR GC
  4. The data allocated and de-allocated by CLR GC

34. Which tool can you use to register managed types with the Windows registry?

Answers:

  1. SN.exe
  2. Regasm.exe
  3. lldasm.exe
  4. none

35. Which of the following files is used to implement application and session level events?

Answers:

  1. Global.asax
  2. Web.config
  3. Machine.config
  4. None of the above

36. Which of these classes are used for loading an assembly into an application domain?

Answers:

  1. System.Configuration.Assemblies
  2. system.componentModel
  3. System.Resources
  4. System.AppDomain

37. Which of the following tools can be used to modify and grant permissions to code groups?

Answers:

  1. Soapsuds.exe
  2. Lldasm.exe
  3. CASPol.exe
  4. PerfMon.exe
  5. SN.exe

38. Which of the following does not use metadata?

Answers:

  1. CLR
  2. CTS
  3. JIT compilers
  4. Class loader
  5. None of the above

39. Which of the following functionalities does System.Diagnostics class provide?

Answers:

  1. Reflection
  2. Trace
  3. Manage code
  4. Remoting

40. An application can have any number of modules and files. Which of the following is used to link them together into a single assembly?

Answers:

  1. al.exe
  2. ac.exe
  3. bl.exe
  4. ad.exe

41. What is the command “caspol -lg” used for?

Answers:

  1. To see the private assemblies
  2. To see the assemblies in GAC
  3. To see the code groups defined on your system
  4. To see the metadata information

42. Which of the following is a must for a private assembly?

Answers:

  1. Cryptographically strong name
  2. Unique name
  3. Cryptographically Light name
  4. Global assembly cache

43. Code Manager is a the part of:

Answers:

  1. CTS
  2. CLI
  3. CLS
  4. CLR

44. Why doesn’t .Net runtime offer deterministic destruction?

Answers:

  1. Due to CTS
  2. Due to Finalize class
  3. Due to garbage collection algorithm
  4. Due to the JIT

45. Consider the following two statements and choose the most appropriate option:

Statement 1: Value types are allocated on a stack
Statement 2: Reference types are allocated on a managed CLR Heap

Answers:

  1. Statement 1 is true and statement 2 is false
  2. Statement 2 is true and statement 1 is false
  3. Both statements 1 and 2 are true
  4. Both statements 1 and 2 are false

46. Which of the following is used to notify all waiting threads of a change in the object’s state?

Answers:

  1. The system.Threading.Monitor.ReferenceEquals method
  2. The system.Threading.Monitor.Enter method
  3. The system.Threading.Monitor.PulseAll method
  4. The system.Threading.Monitor.TryEnter method

47. Which of the following manages the code during execution?

Answers:

  1. Coding Manager
  2. JIT
  3. COde Manager
  4. Coder Manager

48. Which type of parameter is passed in subroutines by default?

Answers:

  1. ByRef
  2. ByVal

49. Which of the following is not a member of the Exception class?

Answers:

  1. StackTraceID
  2. Message
  3. InnerException
  4. TargetSite

50. Which transport protocol is used to call a Web Service?

Answers:

  1. SOAP
  2. HTTP
  3. SMTP
  4. ALL

51. How many application domains can exist inside a Win32 process?

Answers:

  1. 1
  2. 2
  3. Any number
  4. 4

52. Which of the following helps Assemblies become self describing?:

Answers:

  1. JIT
  2. Manifest
  3. CTS
  4. Application Domain

53. How will you use the thread pool?

Answers:

  1. By calling the ThreadPool.UserQueueWorkItem() method directly
  2. By passing an instance of WaitCallback delegate to the ThreadPool.QueueUserWorkItem() method
  3. By passing an instance of WaitCallback delegate to the ThreadPool.UserQueueWorkItem() method
  4. By passing an instance of StayCallback delegate to the ThreadPool.QueueUserWorkItem() method

54. The runtime is started automatically by ______________ when the .exe is run.

Answers:

  1. mscore.dll
  2. mscoree.dll
  3. mscor.dll
  4. mscoren.dll

55. Because .NET treats all languages as equal, a class written in C# should be equivalent to a class written in VB.NET, and an interface defined in Managed C++ should be exactly the same as one that is specified in Managed COBOL. Languages must agree on the meanings of these concepts before they can integrate with one another.

Which of the following provides the specifications for this?

Answers:

  1. CLS
  2. CTS
  3. MSIL
  4. CLI

56. .Net assembly stores both data and IL code. A tool is available along with the .NET framework to view within the PE. Which of the following is that tool?

Answers:

  1. ildasm.exe
  2. disasm.exe
  3. deassmbler.exe
  4. deasm.exe

57. Which of the following services are provided by CLR?

Answers:

  1. Application memory isolation
  2. Code Management
  3. Verification of type safety
  4. Conversion of IL to native code
  5. All of the above

58. Which of these files is used for debugging an application?

Answers:

  1. demo.dll
  2. demo.pdb
  3. demo.res
  4. Any of these can be used

59. Compilers of CLS compliant language generate:

Answers:

  1. MSIL code and Metadata
  2. MSIL code
  3. Metadata
  4. Machine code

60. Which of these is used to allow managed code to interoperate with unmanaged code?

Answers:

  1. COM
  2. COM Marshaler
  3. XML
  4. SOAP

61. Which of the following statements is correct.

(a)A Try block must include Catch or Finally sections.
(b)Using an empty Finally section is illegal.

Answers:

  1. Only (a) is true
  2. Only (b) is true
  3. Both (a) and (b) are false
  4. Both (a) and (b) are true

62. The _________________ methods are primarily meant for COM Interoperability use.

Answers:

  1. System.AppDomain.ApplyPolicy
  2. System.AppDomain.CreateComInstanceFrom
  3. System.AppDomain.Load
  4. System.AppDomain.GetAssemblies

63. How does CLR allow multiple applications to be run in a single process?

Answers:

  1. By running them in a special application domain
  2. By making sub process for each process
  3. By loading them in separate application domains
  4. None of the above

64. _____________ helped overcome the DLL conflict (faced by the versions prior to .NET).

Answers:

  1. Strong-named assemblies
  2. Version-aware code storage
  3. Components executing in isolation
  4. All of the above

65. __________ is used to generate the assembly from modules.

Answers:

  1. soapsuds.exe
  2. lldasm.exe
  3. al.exe
  4. PerfMon.exe
  5. SN.exe

66. Which of the following is used as a Serializer for the web services?

Answers:

  1. XmlSerializer
  2. SoapSerializer
  3. BinaryFormatter
  4. SoapFormatter

67. The IL to native code compilation is done by:

Answers:

  1. Code Manager
  2. CTS
  3. JIT
  4. CLS

68. ____ is a subset of the CTS.

Answers:

  1. CLI
  2. cLS
  3. CLR
  4. None of these

69. Which of the following is valid and is included in the type definition?

Answers:

  1. Any attribute that is defined in the type
  2. The name of the type
  3. The visibility of the type
  4. The base types of the type
  5. All of the above
  6. None of the above

70. Which of the following statements is correct?

Answers:

  1. For in-process communication between contexts within a single application domain, Serialization is used as an interception mechanism.
  2. For in-process communication between contexts within a single application domain, Marshaling is used as an interception mechanism.
  3. For in-process communication between contexts within a single application domain, Proxies are used as an interception mechanism.
  4. All of the above

71. Which of the following are used in combination to create the identity of an assembly?

Answers:

  1. Assembly name
  2. Version
  3. Culture
  4. Public key
  5. All of the above

72. Which of these Assemblies is used for doing Localization?

Answers:

  1. Private
  2. Public
  3. Satellite
  4. Both Public and Private

73. Which of the following is not a feature of .NET 2.0?

Answers:

  1. Partial classes
  2. Generics
  3. Multiple Inheritance
  4. Partial Methods

74. ___________ namespace is not defined in the base class library.

Answers:

  1. System
  2. System.CodeDom
  3. System.IO
  4. System.Threading
  5. System.Text

75. Since .NET assemblies contain IL code, your proprietary algorithms can be seen by anyone. Which of the following tools protects your intellectual properties?

Answers:

  1. Obfuscator
  2. Befprotector
  3. Obadministrator
  4. Befmanager

76. For MSIL code to be executed in PE file, it is necessary to have:

Answers:

  1. Assembly manifest
  2. Modules
  3. Files
  4. Types

77. __________ assembly can be used to deploy language-specific resources for an application.

Answers:

  1. Shared
  2. Private
  3. Satellite
  4. Public

78. Which of the following can you use to resolve assemblies, types, and resources?

Answers:

  1. System.AppDomain.CreateDomain
  2. System.AppDomainSetup.ApplicationBase
  3. System.AppDomainSetup.CreateComInstanceFrom
  4. System.AppDomain.ApplyPolicy

79. .NET components are accessed from COM via a?

Answers:

  1. RCW
  2. CCA
  3. CWA
  4. CCW

80. How will you prevent concurrent access to your data?

Answers:

  1. By using System.Threading.ThreadStart
  2. By using System.Threading.Monitor.Enter/Exit methods
  3. By using System.Threading.Monitor.start/End methods
  4. By using System.Threading.ThreadEnter

81. Which of the following is correct for CTS?

Answers:

  1. It establishes a framework that helps enable cross-language integration, type safety, and high performance code execution
  2. It provides an object-oriented model that supports the complete implementation of many programming languages
  3. It defines rules that languages must follow, which helps ensure that objects written in different languages can interact with each other
  4. All of the above

82. Delay signing allows a shared assembly to be signed with:

Answers:

  1. Private key at the initial stage
  2. Private and Public key at the initial stage
  3. Private key at a later stage
  4. Public key at a later stage

83. What happens when enough memory is not available to be allocated to an object?

Answers:

  1. MemoryFull exception is thrown
  2. Garbage collector is automatically run to free up memory
  3. OutOfMemory exception is thrown
  4. The .Net worker process is restarted

84. You can create the remote application domain using:

Answers:

  1. AppDomain.BuldDomain
  2. AppDomain.MakeDomain
  3. AppDomain.CreateDomain
  4. AppDomain.GenerateDomain

85. Which base class do all web forms inherit from?

Answers:

  1. System.Web.UI.Page
  2. System.Web.UI.HtmlControls
  3. System.Web.UI.WebControls
  4. None of the above

86. Where is the application domain created?

Answers:

  1. Outside a Process
  2. Inside a Process
  3. Can be created in both the places
  4. None of the above

87. Microsoft .NET supports value types for performance reasons, but everything in .NET is ultimately an object. Value types are allocated on the stack by default, but they can always be converted into a heap-based, reference-type object.
What is this conversion called?

Answers:

  1. Conving
  2. Boxing
  3. TypeModification
  4. None of the above

88. A hashtable is serialized by using:

Answers:

  1. XmlSerializer or SoapFormatter
  2. XmlSerializer
  3. SoapFormatter
  4. XmlSerializer and SoapFormatter

89. The .NET framework comes with a few CLR hosts. Which of the following is a CLR host?

Answers:

  1. ASP.NET
  2. IE
  3. Shell Executables
  4. All of the above

90. Which of the following code is not ‘managed’ by default in .NET framework?

Answers:

  1. Visual Basic
  2. C#
  3. C++
  4. Jscript

91. .NET provides a distributed process framework. Which of the following technologies are used for similar function?

Answers:

  1. Java Remote Method Invocation
  2. Microsoft Distributed Component Object Model
  3. Common Object Request Broker Architecture
  4. Remote Procedure Calls

92. Which of the following is used to do garbage collection?

Answers:

  1. gc.Collect
  2. gc.KeepAlive
  3. gc.SuppressFinalize

93. How many bits does the int datatype use in .NET?

Answers:

  1. 16 bits
  2. 32 bits
  3. 64 bits
  4. None of the above

94. Which of the following tools can be used to configure assemblies located in the GAC?

Answers:

  1. Soapsuds.exe
  2. Lldasm.exe
  3. CASPol.exe
  4. Mscorcfg.msc
  5. SN.exe

95. You assigned the version number – 5.3.1.0 to your assembly.

The four digits stand for:

Answers:

  1. Revision, Built, Major Version, and Minor version
  2. Revision, Built, Minor Version, and Major version
  3. Built, Major version, Minor Version, and Revision
  4. Major version, Minor Version, Built, and Revision

96. Which of the following is not correct about parameter arrays?

Answers:

  1. A subroutine can have any numbers of parameter arrays
  2. A parameter array must come last in the parameter list
  3. All parameter lists are declared as ByVal
  4. Parameter array values are implicitly optional

97. Which of the following is incorrect about Structures?

Answers:

  1. Structures are value types
  2. A structure can provide a constructor
  3. Structures can implement inheritance
  4. Structures support events

98. Which of the following is not a valid inheritance_mode?

Answers:

  1. Overloads
  2. Overrides
  3. Overridable
  4. MustOverridable
  5. None of the above

99. In .NET framework, Reflection is used to:

Answers:

  1. Create metadata of the modules/assemblies
  2. Get metadata of the modules/assemblies
  3. Reengineer the corrupted assemblies
  4. Destroy the corrupted assemblies

100. Xcopy method is not sufficient for deployment:

Answers:

  1. When application relies on shared assemblies
  2. When application is downloaded on demand
  3. When the number of assemblies is too large
  4. None of the above

101. Dot Net Framework consists of :

Answers:

  1. Common language runtime
  2. Set of class libraries
  3. Common language runtime and set of class libraries
  4. Common language runtime, set of class Libraries, and ADO.NET

102. Which of the following statements is not correct with regard to .NET assemblies?

Answers:

  1. Static assemblies can include classes, JPEG files, resource files etc.
  2. Static assemblies are stored on disk in PE files.
  3. The .NET Framework can create dynamic assemblies
  4. Dynamic assemblies are automatically saved to disk before execution

103. Which of the following statements is correct with regard to Windows process memory allocation?

Answers:

  1. Each process (instance of an application) gets its own RAM and prevents the OS from crashing when the process crashes
  2. RAM is shared between the processes and saves OS crash with the process crash
  3. Each process gets its own RAM and causes OS to crash with the process crash
  4. RAM is shared between the processes and causes OS to crash with the process crash

104. The code written to target common language runtime services is called :

Answers:

  1. Generated Code
  2. Managed Code
  3. Unmanaged Code
  4. CLR Code
  5. Service Code

105. Which of the following should you use to serialize instances of a class?

Answers:

  1. XMlSerializer
  2. It depends on the situtaion
  3. SoapFormatter
  4. BinaryFormatter

106. What are the core components of .NET framework data provider model?

Answers:

  1. DataAdapter and DataReader
  2. Connection and Command
  3. DataAdapter, Connection, and Command
  4. DataAdapter , DataReader, Connection, and Command

107. Which of the following can not be used with files?

Answers:

  1. FileClose
  2. FileInput
  3. LineInput
  4. LOF
  5. PrintLine

108. ____________ class defines the set of information that constitutes input to security policy decisions in System.Security.Policy namespace.

Answers:

  1. FileCodeGroup
  2. ApplicationTrust
  3. Evidence
  4. PolicyLevel
  5. PolicyStatement

1,328 total views, 6 views today