Pass the GIAC GIAC Certification GSSP-Java Questions and answers with CertsForce

Viewing page 6 out of 9 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which of the following statements is true?

Options:

A.

All UTF characters are eight bits long.


B.

All UTF characters are all sixteen bits long.


C.

All UTF characters are twenty four bits long.


D.

All bytecode characters are sixteen bits long.


E.

All unicode characters are sixteen bits long.


Questions # 52:

You work as a Programmer for InfoTech Inc and develop the following two

declarations.

Manager

/acme/Manager/*

GET

POST

<auth-constraint/>

Manager

/acme/Manager/*

GET

POST

<auth-constraint>

Manager

</auth-constraint>

Which of the following statements is true about the <auth-constraint> in the code given above?

Options:

A.

Nobody is allowed to access the specified resources.


B.

Only Manager is allowed to access the specified resources.


C.

The first element declaration is incorrect.


D.

It is not possible to define the multiple security constraint on a single resource.


Questions # 53:

Mark works as a Programmer for InfoTech Inc. He wants to define the security constraint for an application that allows users with the role of Manager access to the POST method of all resources with

the URL pattern /acme/Manager/*, and also allow users with the role of Editor access to the POST method of all resources with the URL pattern /acme/Editor/*. Which of the following code will be used to declare the security element?

Options:

A.

Manager

/acme/Manager/*

GET

POST

<auth-constraint>

Manager

</auth-constraint>


B.

Manager

/acme/Manager/*

GET

POST

<auth-constraint>

Manager

</auth-constraint>

GET

POST


C.

Manager

/acme/Manager/*

GET

POST

<auth-constraint>

Manager

</auth-constraint>

<auth-constraint>

Editor

</auth-constraint>


D.

Manager

/acme/Manager/*

GET

POST

Editor

/acme/Editor/*

GET


Questions # 54:

Which of the following statements are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

StringBuffer is thread safe, but StringBuilder is not.


B.

The String class is final.


C.

StringBuilder offers faster performance than StringBuffer.


D.

The size of the String can be obtained using the length property.


Questions # 55:

You work as a Software Developer for UcTech Inc. You want to declare a security constraint in the deployment descriptor using the element. Which of the following can be the possible values for the element?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

CONFIDENTIAL


B.

ALL


C.

NONE


D.

INTEGRAL


Questions # 56:

Mark works as a Programmer for InfoTech Inc. He develops a session bean class named

accountService. Which of the following rules must be conformed by the session bean class?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

It can be used without the @Stateful or @Stateless annotation.


B.

It must implement the business methods defined in the business interface.


C.

It can implement any optional business method annotated by the @Remove annotation.


D.

It must have a public constructor that takes a string as its parameter.


E.

It requires helper classes to meet the needs of an application.


Questions # 57:

Mark works as a Programmer for InfoTech Inc. He develops a Web application that takes input from users. Which of the following methods can be used by the client and server to validate the users input?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Validation through Servlets on the server side


B.

Validation using JavaScript on the client side


C.

Validation through Java Applets on the client side


D.

Validation through XML on the server side


Questions # 58:

Identify whether the given statement is true or false.

"If the isUserInRole() method is called on an unauthenticated user, the container returns false."

Options:

A.

True


B.

False


Questions # 59:

Which of the following security related elements of the deployment descriptor matches the argument to the isCallerInRole() method?

Options:

A.


B.


C.


D.


Questions # 60:

Which of the following is the valid permission for a BasicPermission?

Options:

A.

*


B.

a*b


C.

*.com


D.

*java


Viewing page 6 out of 9 pages
Viewing questions 51-60 out of questions