Welcome to www.programmer2programmer.net tips for IT Interview Questions of .NET Assemblies, Configuration, and Security


 Microsoft Certification
 Final Year Project Idea
 Connection Strings
 Password Recovery
 SQL Injection
 Encryption & Decryption
 LIVE Academic Project
 Project #1 - VB6, Access
  Project #2 - VB.Net, SQL
 Project #3 - ASP, Access
 Project #4 - ASP.NET, C#
 Project #5 - VB6, SQL
 Project #6 - Stegano
 Project #7 - C
 Project #8 - C++
 Project #9 - JAVA, MySQL
 Project #10- PHP, MySQL
 Project #11- JSP, Oracle
 Project #12- C# Face Exp
 Project #13- Mobile Bank
 Download MBA Project
 MBA Project Topic
 Project Viva Question
  2018 New Projects
 Project Synopsis Download
 University Question Paper, Assignment and Projects
 SMU - Question Paper
 SMU - Assignment
 SMU - Synopsis Projects
 SCDL - Assignment
 IGNOU - Synopsis Projects
 Welingkar - Projects
 Project Report Formats
 Interview Question Answer
 General & HR Round
 Visual Basic 6
 VB.Net & C#
 SQL Server
  Oracle and DBA

100% Tested
Ready Academic IT Projects


 Interview questions and Answers for .NET Assemblies, Configuration, Security, Permission, Strng name

Home Personal Member Forum Source Project Tips Contact

Interview Question - VB.NE and C# - .NET Assemblies, Configuration, and Security interview questions and answers

Interview questions and answers for .NET Assemblies, Configuration, and Security

NET Framework, Assemblies, Configuration, and Security, Metadata, manifest, Satellite assembly, Permission, Strong Name

.NET Framework C#, VB.NET Configuration Interview Question and Answers for .NET Framework Version 2.0, 3.0, 3.5, 4.0

Interview Question, Answer
1.  Programming General
2.  Web General
3.  Database General
4.  Visual Basic 6
5.  ASP
6.  Visual Basic .NET and C#
7.  ASP .NET
9.  MS SqlServer
10. MySql


Describe how to sign your assembly with a strong name. Why would you want to do this?


To sign your assembly with a strong name, you must have access to a key file or create one with the strong name utility (sn.exe). You then specify the key file in the AssemblyInfo file and verify that the version number is correct. The assembly will be signed with a strong name when built. In addition to identifying your assembly and ensuring version identity, a strong name is required if you want to install your assembly to the Global Assembly Cache.


Describe how to use code to retrieve resources at run time.


You must first create an instance of the ResourceManager class that is associated with the assembly that contains the desired resource. You can then use the GetString method to retrieve string resources or the GetObject method to retrieve object resources.


Explain how to retrieve information from the configuration file at run time. How would you store information in the configuration file at design time?


You must first create an instance of AppSettingsReader to read the configuration file. You can then call the GetValue method to read values represented in the configuration file. To add configuration file entries, you should create <add> elements in the <appSettings> node of the configuration file. In the <add> element, you should specify a value for the entry and a key that can be used to retrieve the entry. The value can be changed between executions of the application.


You are creating a solution that must be accessed by members of a group called Developers and Administrators on the local machine. Describe a plan to implement this security scheme.


Create one PrincipalPermission that represents the Developers group and another PrincipalPermission that represents the BUILTIN\Administrators group. Then, create a third permission that represents the union of the two by calling the Union method and demand that permission.


Briefly highlight the differences between imperative and declarative security as they pertain to code access security.


Imperative security is implemented by calling methods of Permission objects in code at run time. Declarative security is configured by attaching attributes representing permissions to classes and methods. Imperative security allows a finer control over the point in execution where permissions are demanded, but declarative security is emitted into metadata, and required permissions can be discovered through the classes in the System.Reflection namespace. Additionally, you can request assembly-wide permissions using the Assembly (assembly) directive with declarative security.


What is a shared assembly? How would you create one?


An assembly is an assembly of which only a single copy is installed per machine. This copy can be shared by multiple applications. To make an assembly a shared assembly, you must first assign it a strong name, and then install it to the global assembly cache.


What is Assemblies?


Assemblies are the fundamental building blocks of a .NET Framework application. They contain the types and resources that make up an application and describe those contained types to the common language runtime. Assemblies enable code reuse, version control, security, and deployment.


What is assembly manifest?


assembly manifest The metadata for the assembly. It contains all of the information needed to describe the assembly to the common language runtime


What is Authenticated and Authorization?


authentication The process of determining the identity of a user. In effect, authentication validates that the users are who they say they are

authorization The process of allowing access to an application or resource based on credentials supplied by the user


What is satellite assembly?


satellite assembly When localizing an application, assemblies that contain alternate sets of resources to be used in the application for different cultures.

Next  .NET Setup and deployment interview questions and answers            Go back to Interview Question Main

(C) Atanu Maity, 2006-2018