.NET Tutorials, Forums, Interview Questions And Answers
Welcome :Guest
Sign In
Win Surprise Gifts!!!

Top 5 Contributors of the Month
Gaurav Pal

Home >> Interview Question >> Others >> Post New Question Subscribe to Interview Questions

Explain about security of the Ajax based web applications?

Posted By :Akhil Raj     Posted Date :August 27, 2009    Points :10   Category :Others 
The XMLHttpRequest object is subjected to the browsers security sandbox. Any resources requested by the XMLHttpRequest object must reside within the same domain from which the calling script originated from which the calling script requested. XMLHttpRequest cannot request services due to security restriction, outside the domain from which the script was originally served.

You can also find related Interview Question to Explain about security of the Ajax based web applications?  below: 

With respect to security, which one is the better choice?.Net or J2EE? Explain?

As per majority programmers .NET is the best one which have single vendor compare to, the ease of use, more use friendly, you can send any problem ,it'll be solved. (More...)

What is the role of the ScriptManager control in implementing multilingual applications (AJAX)?

The ScriptManager control can be used to define the UI or custom UI cultures that you would use in your applications. You can set the
EnableScriptLocalization and EnableScriptGlobalization properties of
the ScriptManager control to true and specify the script reference path as per your requirements. (More...)

Explain the disadvantage of ajax related to browser integration?

Dynamically created pages created by ajax does not support back button which takes the user to the previous pages. There are various solutions to this problem out of which one solution is to use iframes. Also users can bookmark a certain application in its state. User can maintain the applications as the state of the application changes (More...)

Explain differences between the page execution lifecycle of an ASP.NET page and an ASP.NET AJAX page?

In an asynchronous model, all the server side events occur, as they do in a synchronous model. The Microsoft AJAX Library also raises client side events. However when the page is rendered, asynchronous postback renders only the contents of the update panel, where as in a synchronous postback, the entire page is recreated and sent back to the browser. (More...)

AJAX is based on ?

JavaScript and HTTP requests. (More...)

AJAX applications are

browser- and platform-independent. (More...)

What's the difference between code-based security and role-based security? Which one is better?

Code security is the approach of using permissions and permission sets for a given code to run. Role-based security most of the time involves the code running with the privileges of the current user. Both are equally better. Depending on the deployment type security can be implemented. (More...)

What are the requirements to run ASP.NET AJAX applications on a server?

You would need to install 'ASP.NET AJAX Extensions' on your server. If you are using the ASP.NET AJAX Control toolkit, then you would also need to add the AjaxControlToolkit.dll in the /Bin folder.

What is difference between Code access and role based security?

Code security is the approach of using permissions and permission sets for a given code to run. The admin, for example, can disable running executables off the Internet or restrict access to corporate database to only few applications.

Role security most of the time involves the code running with the privileges of the current user. This way the code cannot supposedly do more harm than mess up a single user account.

Neither is better. It depends on the nature of the application; both code-based and role-based security could be implemented to an extent.

Explain how connections are managed with Service Applications.


A virtual entity is used that is referred to as a proxy, due to label in PowerShell. (More...)

What are the requirements to create a CLR based user-defined type?

CLR must be enabled for the instance and A class created with a CLR-compatible language. (More...)

What options are available to deploy my .NET applications?

The .NET Framework simplifies deployment by making zero-impact install and XCOPY deployment of applications feasible. Because all requests are resolved first to the private application directory, simply copying an application's directory files to disk is all that is needed to run the application. No registration is required.
This scenario is particularly compelling for Web applications, Web Services, and self-contained desktop applications. However, there are scenarios where XCOPY is not sufficient as a distribution mechanism. An example is when the application has little private code and relies on the availability of shared assemblies, or when the application is not locally installed (but rather downloaded on demand). For these cases, the .NET Framework provides extensive code download services and integration with the Windows Installer. The code download support provided by the .NET Framework offers several advantages over current platforms, including incremental download, code access security (no more Authenticode dialogs), and application isolation (code downloaded on behalf of one application doesn't affect other applications). The Windows Installer is another powerful deployment mechanism available to .NET applications. All of the features of Windows Installer, including publishing, advertisement, and application repair will be available to .NET applications in Windows Installer 1.5. (More...)

Explain the concept of Reentrancy?

It is a useful, memory-saving technique for multiprogrammed timesharing systems. A Reentrant Procedure is one in which multiple users can share a single copy of a program during the same period. Reentrancy has 2 key aspects: The program code cannot modify itself, and the local data for each user process must be stored separately. Thus, the permanent part is the code, and the temporary part is the pointer back to the calling program and local variables used by that program. Each execution instance is called activation. It executes the code in the permanent part, but has its own copy of local variables/parameters. The temporary part associated with each activation is the activation record. Generally, the activation record is kept on the stack.

Note: A reentrant procedure can be interrupted and called by an interrupting program, and still execute correctly on returning to the procedure. (More...)

Quick Links For Interview Questions Categories:
ASP.Net Windows Application   .NET Framework   C#   VB.Net   ADO.Net  
Sql Server   SharePoint   Silverlight   OOPs   JQuery   JavaScript/VBScript
Biztalk Patten/Practices .IIS WCF WPF WWF
Networking Aptitude Others   All      

Find questions, FAQ's and their answers related to .NET, C#, Vb.Net, Sql Server and many more.

Now you can find lots of .NET, C#, Vb.Net, SQL Server,Windows, ASP.Net related Questions and their Answers here at www.dotnetspark.com. Our aim is to help you pass your certification Exams (MCP, MCSD, MCAD etc.,) with flying scores and get good name in your company.

So, Start looking our Interview Question section daily and improve your .NET Skills. You can also help others by posting Interview Questions and their Answers in this section.

Hall of Fame    Twitter   Terms of Service    Privacy Policy    Contact Us    Archives   Tell A Friend