98-372 exam questions

[Newest Version] Easily Pass 98-372 Exam with Updated Real 98-372 Exam Materials

Attention please! Here is the shortcut to pass your May 16,2022 Hotest 98-372 pdf dumps exam! Get yourself well prepared for the Microsoft Developer Newest 98-372 exam questions Microsoft .NET Fundamentals exam is really a hard job. But don’t worry! We We, provides the most update 98-372 actual tests. With We latest 98-372 exam questions, you’ll pass the Microsoft Developer Latest 98-372 vce Microsoft .NET Fundamentals exam in an easy way

We Geekcert has our own expert team. They selected and published the latest 98-372 preparation materials from Official Exam-Center.

The following are the 98-372 free dumps. Go through and check the validity and accuracy of our 98-372 dumps.If you need to check sample questions of the 98-372 free dumps, go through the Q and As from 98-372 dumps below.

Question 1:

Which core technology allows interoperability between Microsoft Visual Basic .NET code and C# code?

A. Microsoft Visual Studio

B. Windows 7

C. Microsoft Intermediate Language (MSIL)

D. Windows Azure

Correct Answer: C

Question 2:

You define a method according to the following code segment. (Line numbers are included for reference only.)

Where should you insert code that must be executed, regardless of whether or not an error is thrown?

A. Between lines 05 and 06

B. Between lines 08 and 09

C. Between lines 11 and 12

D. Between lines 12 and 13

Correct Answer: C

Question 3:

You write code that reads a file from the disk.

Which exception will catch an error if the file is missing?

A. InvalidOperationException

B. FaultException

C. IOException

D. ApplicationException

Correct Answer: C

Question 4:

An event declaration is shown in the following code segment.

Public event NewProduccEventHandlerNewProduct;

What is NewProductEventHandler in the event declaration?

A. A built-in data type for handling events.

B. An enumeration that defines the type of the NewProduct variable.

C. The name of the delegate that will dispatch the event.

D. The name of the class method that will catch the event.

Correct Answer: C

Question 5:

Connection strings in the web.config file are:

A. Automatically encrypted when the project is published.

B. Automatically encrypted by the web server.

C. Stored in binary format.

D. Stored in clear text unless they are encrypted.

Correct Answer: D

When working with data source controls it is recommended that you centralize the location of your connection strings by storing them in the application\’s Web.config file. This simplifies the management of connection strings by making them available to all of the ASP.NET pages in a Web application. In addition, you do not need to modify numerous individual pages if your connection string information changes. Finally, you can improve the security of sensitive information stored in a connection string, such as the database name, user name, password, and so on, by encrypting the connection string section of the Web.config file using protected configuration.

Question 6:

In which file does a .NET Windows application store information that has been customized for a particular instance of the application?

A. App.config

B. User.config

C. Machine.config

D. Web.config

Correct Answer: B

Question 7:

You need to force the position of the cursor on the screen at (15, 10).

Which code segment should you use?

A. B. C. D.

Correct Answer: C

Question 8:

You want to insert a new line on the console.

Which three code fragments will display “Hello” followed by a new line? (Each correct answer presents a complete solution. Choose three.)

A. Console.Write(“Hello\t”) ;

B. Console.Write(“Hello\n”);

C. Console.Error.Write(“Hello\t”);

D. Console.Error.WriteLine (“Hello”) ;

E. Console.WriteLine(“Hello”);

Correct Answer: BDE

B: \n adds a newline.

D: Console.Error.WriteLine writes a newline.

E: Console.WriteLine writes a newline.


A, C: \t is just a space

Question 9:

You need to create a DLL that contains classes that can be reused in other projects. Which type of Microsoft Visual Studio project should you use?

A. Class Library

B. Web Application

C. Console Application

D. Windows Service

Correct Answer: A

Question 10:

You want to encrypt the connection string stored in the web.config file. Which tool should you use?

A. ASP.NET IIS Registration Tool (RegIIS.exe)

B. Intermediate Language Disassembler (ILDASM.exe)

C. Web Site Administration Tool

D. Dotfuscator Software Services

Correct Answer: A

You can use the ASP.NET IIS Registration Tool (Aspnet_regiis.exe) to encrypt or decrypt sections of a Web configuration file.


The following command encrypts the connectionStrings element in the Web.config file for the application SampleApplication.

aspnet_regiis -pe “connectionStrings” -app “/SampleApplication” -prov “RsaProtectedConfigurationProvider”

Question 11:

You want to create a method that can accept any data type as arguments.

Which feature of .NET languages allows you to create one method that will accept different data types on each call to the method?

A. Delegates

B. Named Parameters

C. Overriding

D. Generics

Correct Answer: D

Question 12:

You create an unmanaged object and use the object. You no longer need the object. What should you do?

A. Set the value of the variable to null.

B. Cache the variable\’s value in a static variable.

C. Dispose the object to release memory.

D. Cast the object to its base type.

Correct Answer: C

The term “unmanaged resource” is usually used to describe something not directly under the control of the garbage collector. For example, if you open a connection to a database server this will use resources on the server (for maintaining the connection) and possibly other non-.net resources on the client machine, if the provider isn\’t written entirely in managed code.

This is why, for something like a database connection, it\’s recommended you write your code thusly:

using (var connection = new SqlConnection(“connection_string_here”)) { // Code to use connection here } As this ensures that .Dispose() is called on the connection object, ensuring that any unmanaged resources are cleaned up.

Question 13:

You create an XML document that has an XmlNode named node1.

Which code fragment will read the XML contained in node1 and its subnodes?

A. Node1.ToString ();

B. Node1.OuterXml;

C. Node1.InnerXml;

D. Node1.InnerXext;

E. Node1.Value;

Correct Answer: B

Question 14:

Which describes the characteristic of the interoperability of the .NET Framework?

A. Allows consistent communication between a desktop application and a mobile application.

B. Allows consistent communication between a desktop application and a web application.

C. Handles exceptions consistently across languages.

D. Uses the same code syntax.

Correct Answer: C

Question 15:

Which three policy types are .NET security policy levels? (Choose three.)

A. Enterprise policy

B. Data policy

C. Network policy

D. Machine policy

E. Application domain policy

Correct Answer: ADE

The following table describes the four security policy levels provided by .NET Framework security.


Enterprise policy

All managed code in an enterprise setting where an enterprise configuration file is distributed.


Machine policy

All managed code on the computer.


User policy

Code in all the processes associated with the current operating system user when the common language runtime starts.


Application domain policy

Managed code in the host\’s application domain