单项选择题

A.Replace read write non-static fields in the code with static fields.
B.Replace read-only static fields in the code with read write static fields. 
C.Use the peverify.exe PEVerify tool to verify whether the code meets the type-safety requirements.
D.Use the regasm.exe assembly registration tool to register the assembly on the server before deployment.

相关考题

单项选择题 You administer a SQL Server 2008 instance. The instance hosts a database that is used by a Web-based application. The application processes 15,000 transactions every minute. A table in the database contains a column that is used only by the application. This column stores sensitive data. You need to store the sensitive data in the most secure manner possible. You also need to ensure that you minimize the usage of memory space and processor time. Which encryption type should you use?()

单项选择题 You administer a SQL Server 2008 instance. You plan to design the security requirements for a new database application that will be deployed to the instance.  The new database contains a table that is created by using the following code segment: You need to ensure that the BonusPlan column is protected from unauthorized access by using the most secure method. What should you do?()

单项选择题 You administer a SQL Server 2008 Reporting Services (SSRS) instance. You plan to design an authentication method for SSRS reports that use SQL Server data connections. You need to ensure that all SSRS reports communicate to the SQL Server instance by using the Kerberos authentication protocol. What should you do?()