GIAC GSSP-Java - GIAC Secure Software Programmer – Java
Which of the following methods is used to request that any pending finalizers be run for objects eligible for garbage collection?
Which of the following statements about programmatic security are true?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following methods must be implemented by each subclass of the Permission class to compare permissions?
Given below are top-level class declarations. Which of these class declarations would not produce a compile-time error?
abstract class P {} //1
private class Q {} //2
static class R {} //3
transient class S {} //4
What will be the output of the following program?
class Stringtest
{
public static void main(String args[])
{
String s= "test";
s.concat("paper");
System.out.println(s);
}
}
Which of the following statements is true?
Which of the following are advantages of client-side JavaScript?
Each correct answer represents a complete solution. Choose two.
Mark works as a Programmer for InfoTech Inc. He develops a Java application that uses the encryption and compression techniques. Which of the following interfaces will he use to control the serialization and deserialization processes?
Which of the following statements are true about object serialization?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following code declarations are valid error-page declarations?
Each correct answer represents a complete solution. Choose all that apply.
