Office Document APIs for .NET
ITIL Career Advice
PMP Career Advice
Android Intel XDK
Welcome Guest !
Which are the following valid encryption algorithms that can be used when encrypting the connection strings ?
on 8/4/2012 | Category:
ADO.NET Interview questions
| Views: 2078 |
Select from following answers:
RsaProtectedConfigurationProvider offers encryption by using an exportable pair of keys.
SHA256Managed generates hash values.
RijndaelManaged provides symmetric encryption but cannot encrypt .config files.
Show Correct Answer
MeasureUp.com | |
< Previous :
Which of the following is a valid symmetric encryp ...
Next > :
What should you use to capture an exception that m ...
Comments or Responses
Login to post response
More Interview Questions by Rajkatie
What should you use to capture an exception that might occur when you ...
You create a PerformanceCounter object to view the SQL statements sent ...
When working with the Entity Framework, what can you use to retrieve t ...
You have created a conceptual model manually by using the Entity Frame ...
In your application, you have existing classes that represent the conc ...
You have entity classes from your conceptual model, but you can't ...
You have a Customer entity, but it comprises properties that are spre ...
You are creating a new application that will use a database that alrea ...
Latest Interview Questions
How do you copy the COM component to the server and register ?
It is not a good idea to add ASPNET user to the Administrators group, ...
How is the ASP.NET worker process impersonated ?
What will happen when you access the Global.asax file from a browser?
When you access the Web.config file from a browser, What will happen ?
What will happen to an application’s Web.config file when you make cha ...
Inside a content page, Can you access non public properties and non pu ...
Is there any way to access controls on the Master Page without using F ...