25. Which of the following is a process in which the security infrastructure checks whether the authenticated user has sufficient rights to access the requested resource?
a. Authentication
b. Authorization
c. Impersonation
d. None of the above
Answer: b. Authorization
26. Which type of authentication is very good for intranet Web sites where we know our users?
a. Windows Authentication
b. Forms Authentication
c. Passport Authentication
d. None
Answer: a. Windows Authentication
27. Where do we include the user lists for windows authentication?
a. <Credential>
b. <authorization>
c. <identity>
d. <authentiation>
Answer: b. <authorization>
28. What is a satellite assembly?
a. Any DLL file used by an EXE file.
b. An Assembly containing resources specific to a given language
c. a and b
d. None of the above
Answer: b. An Assembly containing resources specific to a given language
29. Which of the following is faster and consume lesser memory?
a. SQLDataReader
b. Data Set
Answer: a. SQLDataReader
30. We can manage states in asp.net application using _______
a. Session Objects
b. Application Objects
c. Viewstate
d. All of the above