Question Bank

721 approved questions from the community

How do you implement authorization in middleware and routes in Next.js?

HARD
SINGLE CHOICE
40s
Next.js
by Mohamed

What is the Global Assembly Cache (GAC)?

HARD
SINGLE CHOICE
40s
.NET
by Mohamed

What is expression-bodied member syntax in C#?

HARD
SINGLE CHOICE
40s
.NET
by Mohamed

What is the difference between optimistic and pessimistic locking in databases?

HARD
SINGLE CHOICE
45s
.NET
by Mohamed

When designing a multi-tenant database schema, which approach isolates each tenant's data in separate databases?

HARD
SINGLE CHOICE
45s
.NET
by Mohamed

What is the purpose of .NET Standard?

HARD
SINGLE CHOICE
40s
.NET
by Mohamed

What is covariance and contravariance in C# generics?

HARD
SINGLE CHOICE
50s
.NET
by Mohamed

What is the difference between .FirstOrDefault() and .SingleOrDefault() in LINQ?

HARD
SINGLE CHOICE
45s
.NET
by Mohamed

What is ConfigureAwait(false) used for in async methods?

HARD
SINGLE CHOICE
45s
.NET
by Mohamed

What is Dependency Injection (DI) in .NET Core?

HARD
SINGLE CHOICE
40s
.NET
by Mohamed

What is the difference between Task.Run and Task.Factory.StartNew in .NET?

HARD
SINGLE CHOICE
45s
.NET
by Mohamed

What is a materialized view in SQL?

HARD
SINGLE CHOICE
40s
.NET
by Mohamed

In .NET, what is Just-In-Time (JIT) compilation?

HARD
SINGLE CHOICE
40s
.NET
by Mohamed

Which of the following are key differences between .NET Core and .NET Framework? (Select all that apply)

HARD
MULTIPLE CHOICE
50s
.NET
by Mohamed

Which of the following are recommended practices for securing an ASP.NET Core web application? (Select all that apply)

HARD
MULTIPLE CHOICE
50s
.NET
by Mohamed

Which of the following are strategies to optimize garbage collection in .NET? (Select all that apply)

HARD
MULTIPLE CHOICE
50s
.NET
by Mohamed

What is the difference between IEnumerable and IQueryable in LINQ?

HARD
SINGLE CHOICE
45s
.NET
by Mohamed

How can SQL injection attacks be prevented in .NET applications?

HARD
SINGLE CHOICE
40s
.NET
by Mohamed

How can you mitigate the risk of Sensitive Data Exposure?

HARD
SINGLE CHOICE
45s
Web Security
by Mohamed

Which of the following are part of the OWASP Top 10 vulnerabilities? (Select all that apply)

HARD
MULTIPLE CHOICE
50s
Web Security
by Mohamed
PreviousPage 23 of 37Next