.NET Tutorials, Forums, Interview Questions And Answers
Welcome :Guest
 
Sign In
Register
 
Win Surprise Gifts!!!
Congratulations!!!


Top 5 Contributors of the Month
david stephan

Home >> Interview Question >> .NET Framework >> Post New Question Subscribe to Interview Questions

What is Full Trust?

Posted By :Shashi Ray     Posted Date :July 22, 2009    Points :10   Category :.NET Framework 
Your code is allowed to do anything in the framework, meaning that all (.Net) permissions are
granted. The GAC has Full Trust because it's on the local HD, and that has Full Trust by default,
you can change that using caspol .

You can also find related Interview Question to What is Full Trust?  below: 

How do I assign full trust to an XBAP application ?

  
The application crashes due to insufficient access to registry even if you have a local intranet certificate. The issue is, you get access to the registry using the CLR in debug mode, whereas when hosted in local intranet, NT security restricts you from accessing the registry, giving full access to registry in the NT security to the administrators and power users group. (More...)

How do I assign full trust to an XBAP application ?

  
The application crashes due to insufficient access to registry even if you have a local intranet certificate. The issue is, you get access to the registry using the CLR in debug mode, whereas when hosted in local intranet, NT security restricts you from accessing the registry, giving full access to registry in the NT security to the administrators and power users group. (More...)

Which function is used to perform a full text search on a column?

  
FREETEXT function can perform a full text search on the specified column.

FREETEXT({column/*}, search-string)


It will return the rows with columns that match the search-string. It matches the meaning only not the exact value of the search-string. (More...)

What is the full form of KPI?

  
Key Performance Indicators (More...)

How you will Change application to full screen Mode in SilverLight?

  
Application.Current.Host.Content.IsFullScreen=true; (More...)

Tempdb is going to full what should we do?

  


step1 :shrink the database

dbcc shrinkdatabase(tempdb,10)

or

step 2 : Need to restart the sql server agent services (More...)

What is Full Assembly reference

  
A full assembly reference includes the assembly's text name, version, culture, and public key token (if the assembly has a strong name). A full assembly reference is required if you reference any assembly that is part of the common language runtime or any assembly located in the global assembly cache. (More...)

What is Full Assembly reference

  
A full assembly reference includes the assembly's text name, version, culture, and public key token (if the assembly has a strong name). A full assembly reference is required if you reference any assembly that is part of the common language runtime or any assembly located in the global assembly cache. (More...)

What are the things we have to follow when switching from the SIMPLE recovery model to the FULL or BULK-LOGGED recovery model ?

  
1. Once we complete the switching to the FULL or BULK-LOGGED recovery model, we have to take a full or differential database backup to start the log chain.

2. Then only it takes effect after the first data backup.

3. Schedule regular log backups and update your restore plan accordingly to maintain high-availability/Disaster recovery
(More...)

What are the things we have to follow when swithing from FULL or BULK-LOGGED to SIMPLE recovery model ?

  
1. Before switching from FULL or BULK-LOGGED recovery model, We have to take LOG Backup immediately before switching to SIMPLE.

2. It will help us to recover Point-In-Time(If any)

3. Finally, we can switch to SIMPLE recovery model. (More...)

On a routine monitoring of the data files and transaction log, you notice that the transaction log is extremely close to being full. What will happen if the log fills? What steps can you take to avoid running out of transaction log space?

  
If the transaction log fills, you are unable to modify the data in the database until the log is archived or expanded. To avoid a full transaction log, you can monitor the log space regularly, expand the log whenever necessary, set the log to grow automatically, and create an alert to notify you when the available log space falls below a specified level (alerts are not covered in this training kit). Scheduling or performing frequent transaction log dumps is the best way to reclaim available space in the transaction log.
(More...)

what is the full form of UDDI?

  
Full form of UDDI is Universal Description, Discovery and Integration. (More...)

How can I raise the trust level for assemblies installed in the BIN directory?

  
Windows SharePoint Services can use any of the following three options from ASP.NET and the CLR to provide assemblies installed in the BIN directory with sufficient permissions. The following table outlines the implications and requirements for each
option.
1.Option Pros Cons Increase the trust level for the entire virtual server.In a development environment,increasing the trust level allows you to test an assembly with increased permissions while allowing you to recompile assemblies directly into the BIN directory without resetting IIS. This option is least secure. This option affects all assemblies used by the virtual server.There is no guarantee the destination server has the required trust level. Therefore, Web Parts may not work once installed on the destination
server.
2.Create a custom policy file for your assemblies. For more information, see "How do I create acustom policy file?" Recommended approach.This option is most secure.An assembly can operate with a unique policy that meets the minimum permission
requirementsfor the assembly.By creating a custom security policy, you can ensure the destination server can run your WebParts.
3.Requires the most configuration of all three options.Install your assemblies in the GACEasy to implement.This grants Full trust to your assembly without affecting the trust level of assemblies installed inthe BIN directory.This option is less secure.Assemblies
installed in the GAC are available to all virtual servers and applications on a serverrunning Windows SharePoint Services. This could represent a potential security risk as itpotentially grants a higher level of permission to your assembly across a larger scope
thannecessaryIn a development environment, you must reset IIS every time you recompile assemblies.Licensing issues may arise due to the global availability of your assembly. (More...)

What does partial trust mean the Web Part developer?

  
If an assembly is installed into the BIN directory, the code must be ensured that provides errorhandling in the event that required permissions are not available.
Otherwise, unhandled securityexceptions may cause the Web Part to fail and may affect page rendering on the page where theWeb Part appears. (More...)

Quick Links For Interview Questions Categories:
ASP.Net Windows Application   .NET Framework   C#   VB.Net   ADO.Net  
Sql Server   SharePoint   Silverlight   OOPs   JQuery   JavaScript/VBScript
Biztalk Patten/Practices .IIS WCF WPF WWF
Networking Aptitude Others   All      

Find questions, FAQ's and their answers related to .NET, C#, Vb.Net, Sql Server and many more.

 
Now you can find lots of .NET, C#, Vb.Net, SQL Server,Windows, ASP.Net related Questions and their Answers here at www.dotnetspark.com. Our aim is to help you pass your certification Exams (MCP, MCSD, MCAD etc.,) with flying scores and get good name in your company.

So, Start looking our Interview Question section daily and improve your .NET Skills. You can also help others by posting Interview Questions and their Answers in this section.


Hall of Fame    Twitter   Terms of Service    Privacy Policy    Contact Us    Archives   Tell A Friend