Search this blog

You can search for all the topics in our blog using our google custom search now.

Search the blog

Loading

Saturday, December 25, 2010

MCTS Exam 70 536 Preparation Notes By Pritam Singha

My dear friends,
One of our visitors has decided to share his preparation material with us. Recently he has cleared his mcts 70 536 examination with 930/1000 and he has decided to share his preparation material with all of us who seek to crack this examination. I really appreciate you guys for coming forward and helping me build this blog to make it useful to each one of us.Once again, thanks and congratulations pritam.

Regards
Sameer Shaik


                PREPARATION MATERIAL FOR MCTS EXAMINATION 70 536

*****************************************50-100**********************************************

The BooleanSwitch class is used to toggle trace messages on and off.
If the value is 0, then the BooleanSwitch object is turned off and the Enabled
property returns false.

ManagementObjectSearcher object is instantiated with the WQL query string on which to search.

When implementing the IFormatter interface, you must provide implementation for two methods
and three properties. The two methods, Serialize and Deserialize control how objects will be
stored from memory and loaded into memory, respectively. Both methods accept a Stream object
as an argument. The Serialize method also takes a generic object as its second argument and
uses the Stream argument to write the object. The Deserialize method returns the object using
the Stream argument. The Binder, Context, and Surrogate Selector properties must also be
implemented.

[ONSERIALIZED/ONDESERIALIZED]StreamingContext as an argument for accessing the read/write stream during serialization/deserialization not OnSerializing/DeSerializing QUESTIONnO:57&250

The UnknownNode event is fired when an unexpected element or node is detected that does not
map to the XmlSerializer object's expected type.This would allow easy deserialization for the Shipping object.

The number of files in the directory is evaluated by using the GetFiles method, which returns an array of FileInfo objects and retrieves the Length Property of the array.

The UnsafeDeserialize and Deserialize methods perform the same operation, but the UnsafeDeserialize method uses unmanaged code and requires more permission. Because the UnsafeDeserialize method uses unmanaged code,your code should be granted full trust to execute properly.

The FileInfo object represents the information about a system file[LIKE AS HOST FILE].[Q: 67]

FileStream class is already a buffered stream

The reset switch will set the specified security policy or policies back to their default state. The all switch refers to machine, user, and enterprise policy levels.

The SetAccessRuleProtection method accepts two Boolean arguments, the first of which indicates whether settings are protected from inheritance, and the second of which indicates whether to preserve the existing inherited access rule

Including the MD5CryptoServiceProvider and SHA1CryptoServiceProvider classes. They all inherit the ComputeHash method from the HashAlgorithm class. DSA class and DSACryptoServiceProvider class

DIFFERENCE BETWEEN DES & DSA CRYPTOSERVICEPROVIDER?

DES AND TRIPLE-DES:[data confidentiality] The DESCryptoServiceProvider class represents a managed cryptographic provider of the DataEncryption Standard (DES) symmetric algorithm. The DES symmetric algorithm is commonly used for data confidentiality, and it supports 64-bit keys.Because the same key and IV are needed for encryption and decryption, the CreateEncryptor and CreateDecryptor methods generate the appropriate ICryptoTransform object to alter the data.

DSA:[data intigrity] The DSACryptoServiceProvider class represents a managed cryptographic provider of the Digital Signature Algorithm (DSA) asymmetric algorithm. The DSA asymmetric algorithm is commonly used for digital signatures and data integrity, supporting 1024 bit keys. When instantiating a DSACryptoServiceProvider object, a public/private key pair is generated and a default hash is assigned.The SignData method takes a byte array representing the original data and returns the hashed and then signed byte array.

Since the RSACryptoServiceProvider class implements an asymmetric cryptography algorithm
that makes use of a set of related keys to encrypt and decrypt data this class is the correct choice in the scenario.

manifestactivated application > ApplicationSecurityInfo appInfo = new ApplicationSecurityInfo (appDomain.CurrentDomain.ActivationContext);

IF ASSEMBLY SAME PUBLISHER [Check(Assembly.GetCallAssembly().Evidence)]or SAME ORIGANATING INTRANET WEBSITE/: Check (Assembly.GetCallingAssembly ().Evidence);

Imperative role-based security can use the PrincipalPermission class or the IPrincipal object
directly. The PrincipalPermission class takes a user name and role as string arguments
representing the required membership.The IPrincipal object can be retrieved using the Thread.CurrentPrincipal property.

DYNAMICALLY LOAD ASSEMBLLY SPECIFIED WITH PATH USE 'REFLECTIONONLYLOADFROM'
DYNAMICALLY LOAD ASSEMBLLY RESOLVE LOCATION REQUEST TO CLR 'LOADFROM'

*****************************************50-100**********************************************
******************************************01-21*********************************************
ICOLLECTION > USED TO DEFINE PROPERTIES IN A COLLECTION
ILIST > DEFINE THE PROPERTIES OF A NON-GENERIC LIST IF ITEMS


ICOMPARABLE > SUPPORT "COMPARETO()" METHOD The IComparable interface is
typically used when you want to create a class whose objects can be sorted in either a list or collection.

ICOMPARER > SUPPORT "COMPARE()" METHOD

The AddFirst and AddLast
methods accept an element argument and return a LinkedListNode object as a pointer reference.
The AddBefore and AddAfter methods also return a LinkedListNode object, but they accept
another LinkedListNode indicating which node before or after to insert the element

******************************************01-21**********************************************
*****************************************22-49***********************************************

For a Windows service to run in an application process, you must invoke the Run method on the
ServiceBase class. The Run method is overloaded to accept either a single ServiceBase object or an array of ServiceBase objects.

To monitor and control the behavior of a Windows service, you should use the ServiceController class.[CONTROLS THE WINDOWS SERVICES]

The Priority property indicates the relative position of a thread in the wait queue when being scheduled for execution

The QueueUserWorkItem method takes a WaitCallback delegate as an argument and manages the tasks using background threads. This allows the developer to concentrate on business logic and requires minimal synchronization code.

The BeginInvoke method takes the same arguments as the method it references but also includes
an AsyncCallack delegate and a generic object.

The CreateDomain method of the AppDomain class is an overload method that can be used to
create an application domain.

LOADFROM & LOAD
LOADFROM, LoadAssembly FOR DOMAIN: APPDOMAIN OBJECT DOMAIN ONLY SUPPORT LOAD METHOD PAGE: 44
AND LOADFROM,LOAD,REFLECTIONONLYLOADFROM THOSE METHOD ALSO SUPPORTED BY "ASSEMBLY CLASS"

The OpenExeConfiguration method takes a
ConfigurationUserLevel enumeration value to indicate the visibility of the configuration settings.
Configuration config=ConfigurationManager.OpenExeConfiguration(ConfigurationUserLevel.None);
The value None means that the settings apply to all users. The OpenExeConfiguration method
returns a Configuration object representing the current configuration settings.

You should not add the RunInstaller attribute to the assembly because the RunInstaller attribute
is applied to a class, not the entire assembly.

The supportedRuntime element identifies the versions of the CLR with which the application can be run. The supportedRuntime element is only supported in assemblies built using.NET 1.1 or later.
The requiredRuntime element should only be used by assemblies built by using the .NET 1.0
Framework(NOT THE ANSWER)

The publicKeyToken attribute specifies the strong-named key,
and the culture attribute indicates the localization type.

The developmentMode element instructs the CLR to use the DEVPATH environmental variable to
locate assemblies. If you do not add this element to the machine.config file, the DEVPATH
environmental variable will be ignored.

The EventSourceCreationData object is used to configure a new event log source
The GetSystemProcesses and GetAllProcesses methods do not exist in the Process class

simultaneously facilitate uninterrupted execution: WRITELINEIF

****************************************22-49************************************************
*****************************************100-150*********************************************
EventInstance class > FOR EVENT LOG ENTRY
EventBuilder class > DYNAMICALLY GENERATED CLASS

The ThreadStart method can be used to create actively managed foreground threads.
QUEUSERWORKITEM METHOD AND WAITCALLBACK DELEGATE FOR BACKGROUND THREAD THOSE UNDER THE THREADPOOL STATIC CLASS

AUTOMIC & NON-BLOCKING UPDATES,MULTIPLE THREADS OR THREAD SAFE RUN > INTERLOCKED CLASS
MUTEX CLASS > synchronize execution of some resources
READER LOCK > synchronization scheme that employs shared locks together

SEARCH PRIVATE ASSEMBLIES AND ADD BASE APPLICATION'S DIRECTORY
AppDomainSetup.PrivateBinPath property should be used.[APPDOMAINSETUP NOT APPDOMAIN]

To have your code protected from being deadlocked you should avoid using the SyncLock
statement and replace calls to Monitor.Enter with calls to "Monitor.TryEnter"

It is possible to provide the common language runtime with configuration information for a new application domain using the AppDomainSetup class. The most important property is the
ApplicationBase when creating your own application domains which is used to define the root
directory of the application. Q: 140

GetSection method of the ConfigurationManager > FOR WINDOWS CLIENT APPLICATIONS

The ConfigurationSection is a new class in .NET Framework 2.0 which should be used as it allows you to read and write custom configuration sections. The method in the answer also provides strongly typed access to the custom configuration sections. Q: 144

The usage of the and elements are incorrect as the one is useful for
specifying the search path for private assemblies and the other will affect settings of applications that are already deployed
*****************************************100-150*********************************************
*****************************************151-300*********************************************
The WriteEntry method of the EventLog class should be used in the scenario as this method is
used to write the localized messages to the event log.FOR 151 QUESTION NUMBER

if you run the application in debug mode both the Tracer and Debug statements will be executed.

Win32_NetworkAdapterConfiguration object as this property is associated with the network adapter configuration.

ManagementEventWatcher > Set up a listener for events by using the "EVENTARRIVED"

As the Serializable attribute is not inherited by the derived classes you should add the attribute to both classes in the scenario.

UnknownElement event will be raised when the XmlSerializer encounters an XML element such as number, style and size.

serialize all public and non-public data > BINARY FORMATTER CLASS

DriveFormat and TotalFreeSpace properties of the DriveInfo class

Use the FileStream class >to view the required files byte-by-byte

To successfully read the user's preferences you should make use of the
IsolatedStorageFile.GetUserStoreForAssembly method should be used. The method retrieves
assembly-specific and user-specific data from the isolated storage

1.any code that you call to perform actions that your code has permissions to perform however the callers may not have permissions to perform. > envPerm.Assert()
2.Deny on all permissions other than the permission P and this will affect other
permissions.> envPerm.PermitOnly()
3.Demand method requires all the callers to have permissions to perform the specific action

The usage of the -resolvegroup option in the scenario is incorrect because the -resolvegroup
option is used to show the code groups that the specified user belongs to. PAGE : 203 NOT A ANSWER

RSACryptoServiceProvider class implements an asymmetric cryptography algorithm
that makes use of a set of related keys to encrypt and decrypt data

Type Library Exporter tool (tlbexp.exe) > This tool is used to generate a Com library from an assembly and should not be considered for usage in the scenario.

dateValue.Ticks > SUPERFAST SERIALIZE

CURRENTCULTURE > CULTURE SENSITIVE OPERATIONS
INVARRIENTCULTURE > CULTURE INSENSITIVE OPERATIONS

System.UInt16 IS NOT GRATER THAN 65,535

ServiceInstaller.StartType controls how the service will start up automatically or manually

DRAG AND DROP > 1.DRIVEINFO.GETDRIVES METHOD 2. DRIVE INFO CLASS 3. DRIVEINFO.TOTALSIZE PROPERTY
DRAG AND DROP > 1.FILESECURITY OBJECT 2.FILESYSTEMACCESSRULE OBJECT 3.NEW FILESTREAM OBJECT/FILETSREAM CONTRUCTOR
DRAG AND DROP > 1. SYSTEM.TIMERS.TIMER 2.ONSTART METHOD 3.ELAPSED EVENT HANDLER

DEMAND METHOD : force all callers in the call stack
Assert will ignore the permissions of callers and allow them indiscriminately.


Use CurrencyNegativePattern property set to 1 to display negative currency values with a minus sign

CAREFULLY READ QUESTION NUMER : 249 [MACHINE SCOPED],252 [FOLLOW USER WORDS]

A & B GetProcesses() accepts a computer name for retrieving the processes on a remote
computer. GetProcessesByName() should be used to return processes by their name.
******************************************151-200********************************************
The Evidence object represents the identity
information used for Code Access Security (CAS) in the Microsoft .NET Framework to determine
the permissions granted to an assembly.

The Assert method of the debug class is an overloaded
method that provides you the ability to test assumptions made in your programming logic
A an Assert will stop execution of the application in debug mode if the condition is not met.
CodeAccessPermission.RevertAssert() should be used to undo a previous Assert call.

PermitOnly will instruct the runtime to reduce the access by only allowing callers with the
permissions explicitly stated and nothing else.

The String.Compare(Fileemployee1, Fileemployee2, true, CultureInfo.CurrentUICulture)
segment should be used for changing the user's interface culture used by a thread

The ThreadStart method can be used to create actively
managed foreground threads.

The usage of the TraceSwitch class is used to provide different levels of tracing switches which are defined by the enumeration as Off 0, Error 1, Warning 2, Info 3 and Verbose 4.

Because the Com applications expect to find runtime information about types in the Windows
registry the usage of the Assembly Registration toll(Regasm.exe) reads an assembly creates
entries required by the Com applications.

Secure Hash Algorithm (SHA-1).

B&C GetHashCode is the method inherited from the Object class. It will not perform a hash on the incoming message.

CultureTypes.SpecificCultures will filter all language codes that are specific to a country\region

The array will not be big enough to store the serialized object because it is not sized on the entire object.

Attempts to define a physical file location, this is not compatible with
AssemblyBuilder.Save

New questions start from 346 continue........................

1 comment:

  1. good work sameer
    i hope this is very helful stuffs for who are the people going to sit for mcts 70-536 exam

    ReplyDelete