Home > Interview Question
            and Answer > C# and VB.Net >
        .NET Assemblies, Configuration, and Security 
    
    
        .NET Assemblies, Configuration, and Security interview questions and answers
    
    
        Interview questions and answers for .NET Assemblies, Configuration, and Security.
        .NET Framework, Assemblies, Configuration, and Security, Metadata, manifest, Satellite
        assembly, Permission, Strong Name, .NET Framework C#, VB.NET Configuration Interview
        Question and Answers for .NET Framework Version 2.0, 3.0, 3.5, 4.0, 4.5
    
    
    
    
    
    
    
    
        .NET Assemblies, Configuration, and Security interview questions and answers
    
    
    
        
            
                1. Describe how to sign your assembly with a strong name. Why would you want
                    to do this?
            
                To sign your assembly with a strong name, you must have access to a key file or
                create one with the strong name utility (sn.exe). You then specify the key file
                in the AssemblyInfo file and verify that the version number is correct. The assembly
                will be signed with a strong name when built. In addition to identifying your assembly
                and ensuring version identity, a strong name is required if you want to install
                your assembly to the Global Assembly Cache.
            
         
        
            
                2. Describe how to use code to retrieve resources at run time.
            
                You must first create an instance of the ResourceManager class that is associated
                with the assembly that contains the desired resource. You can then use the GetString
                method to retrieve string resources or the GetObject method to retrieve object resources.
            
         
        
            
                3. Explain how to retrieve information from the configuration file at run time.
                    How would you store information in the configuration file at design time?
            
                You must first create an instance of AppSettingsReader to read the configuration
                file. You can then call the GetValue method to read values represented in the configuration
                file. To add configuration file entries, you should create <add> elements
                in the <appSettings> node of the configuration file. In the <add> element,
                you should specify a value for the entry and a key that can be used to retrieve
                the entry. The value can be changed between executions of the application.
            
         
        
            
                4. You are creating a solution that must be accessed by members of a group called
                    Developers and Administrators on the local machine. Describe a plan to implement
                    this security scheme.
            
                Create one PrincipalPermission that represents the Developers group and another
                PrincipalPermission that represents the BUILTIN\Administrators group. Then, create
                a third permission that represents the union of the two by calling the Union method
                and demand that permission.
            
         
        
            
                5. Briefly highlight the differences between imperative and declarative security
                    as they pertain to code access security
            
                Imperative security is implemented by calling methods of Permission objects in code
                at run time. Declarative security is configured by attaching attributes representing
                permissions to classes and methods. Imperative security allows a finer control over
                the point in execution where permissions are demanded, but declarative security
                is emitted into metadata, and required permissions can be discovered through the
                classes in the System.Reflection namespace. Additionally, you can request assembly-wide
                permissions using the Assembly (assembly) directive with declarative security.
            
         
        
            
            
            
            
        
        
            
                6. What is a shared assembly? How would you create one?
            
                An assembly is an assembly of which only a single copy is installed per machine.
                This copy can be shared by multiple applications. To make an assembly a shared assembly,
                you must first assign it a strong name, and then install it to the global assembly
                cache.
            
         
        
            
                7. What is Assemblies?
            
                Assemblies are the fundamental building blocks of a .NET Framework application.
                They contain the types and resources that make up an application and describe those
                contained types to the common language runtime. Assemblies enable code reuse, version
                control, security, and deployment.
            
         
        
            
                8. What is assembly manifest?
            
                assembly manifest The metadata for the assembly. It contains all of the information
                needed to describe the assembly to the common language runtime
            
         
        
            
                9. What is Authenticated and Authorization?
            
                authentication The process of determining the identity of a user. In effect, authentication
                validates that the users are who they say they are
                
                authorization The process of allowing access to an application or resource based
                on credentials supplied by the user
            
         
        
            
                10. What is satellite assembly?
            
                satellite assembly When localizing an application, assemblies that contain alternate
                sets of resources to be used in the application for different cultures.
            
         
     
    
        More C# and VB.Net Interview Question and Answers
        
            - .NET Framework interview questions
                and answers 
 
            - VB.NET and C# User Interface
                interview questions and answers 
 
            - .NET Object-Oriented
                Programming (OOPs) interview questions and answers 
 
            - ADO.NET interview questions and answers
            
 
            - Advanced .NET Framework
                Topics interview questions and answers 
 
            - Windows Service,
                COM+ and XML Web Services interview questions and answers 
 
            - .NET
                Assemblies, Configuration, and Security interview questions and answers
            
 
            - VB.NET and C# setup
                and deployment interview questions and answers 
 
            - VB.NET and C# general interview
                questions and answers 
 
        
    
    
    
        Home > Interview Question
            and Answer > C# and VB.Net >
        .NET Framework