Pass the GIAC GIAC Certification GSSP-Java Questions and answers with CertsForce

Viewing page 4 out of 9 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which directory in JAR files is used to store package and extension configuration data?

Options:

A.

META-INF


B.

GAMMA-INF


C.

ZIP-INF


D.

TAR-INF


Questions # 32:

Drag and drop the appropriate authentication types from the given options to match their properties.

Question # 32

Options:

A.

Questions # 33:

Which of the following methods is used to authenticate the users, and if the user has not been authenticated, the method returns false?

Options:

A.

getCallerPrincipal()


B.

getRemoteUser()


C.

isUserInRole()


D.

getCallerIdentity()


Questions # 34:

Which of the following functions are performed by methods of the

HttpSessionActivationListener interface?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Notifying the object when it is bound to a session.


B.

Notifying an attribute that a session has just migrated from one JVM to another.


C.

Notifying the object when it is unbound from a session.


D.

Notifying an attribute that a session is about to migrate from one JVM to another.


Questions # 35:

Which of the following listeners causes an object of the implementing class to be notified when it is added to or removed from a session?

Options:

A.

HttpSessionListener


B.

HttpSessionActivationListener


C.

HttpSessionAttributeListener


D.

HttpSessionBindingListener


Questions # 36:

Mark works as a Programmer for InfoTech Inc. He develops a Java application that uses the encryption and compression techniques. Which of the following interfaces will he use to control the serialization and deserialization processes?

Options:

A.

Flushable


B.

Closeable


C.

Serializable


D.

Externalizable


Questions # 37:

Which of the following fields must be present in the login page when using the form-based

authentication?

Each correct answer represents a part of the solution. Choose two.

Options:

A.

j_login


B.

j_password


C.

get_pw


D.

j_pw


E.

j_username


F.

user_pw


Questions # 38:

Which of the following is a mandatory sub-element of the element of the deployment descriptor?

Options:

A.


B.


C.


D.


Questions # 39:

You work as a Software Developer for UcTech Inc. You create a session using the HttpSession interface. You want the attributes to be informed when the session is moved from one JVM to another and also when an attribute is added or removed from the session. Which of the following interfaces can you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

HttpSessionBindingListener


B.

HttpSessionListener


C.

HttpSessionActivationListener


D.

HttpSessionAttributeListener


Questions # 40:

John works as a Programmer for Technostar Inc. He writes the following code using Java.

1. class WrapperClass{

2. public static void main(String[] argv){

3. String str2 = Double.toString(12);

4. String str1 = Double.toHexString(12);

5. System.out.println(str1+str2);

6. }

7. }

What will happen when John attempts to compile and execute the code?

Options:

A.

It will not compile because the Double class does not contain the toHexString() method.


B.

It will compile and execute successfully and will display 8p312 as the output.


C.

It will compile and execute successfully and will display 0x1.8p312.0 as the output.


D.

It will not compile because the Double class does not contain the toString() method.


Viewing page 4 out of 9 pages
Viewing questions 31-40 out of questions