Cyber Monday Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GIAC GSSP-Java - GIAC Secure Software Programmer – Java

Page: 2 / 9
Total 275 questions

Which of the following methods is used to request that any pending finalizers be run for objects eligible for garbage collection?

A.

freeMemory()

B.

gc()

C.

runFinalization()

D.

runFinalizers()

Which of the following statements about programmatic security are true?

Each correct answer represents a complete solution. Choose all that apply.

A.

The bean provider is responsible for writing code for programmatic security.

B.

It is also called as instance level security.

C.

It is implemented using methods of the EJBContext interface.

D.

It is implemented using the methods of the UserTransaction interface.

Which of the following methods must be implemented by each subclass of the Permission class to compare permissions?

A.

hashcode

B.

implies

C.

newPermissionCollection

D.

equals

Given below are top-level class declarations. Which of these class declarations would not produce a compile-time error?

abstract class P {} //1

private class Q {} //2

static class R {} //3

transient class S {} //4

A.

Line 3

B.

Line 1

C.

Line 2

D.

Line 4

What will be the output of the following program?

class Stringtest

{

public static void main(String args[])

{

String s= "test";

s.concat("paper");

System.out.println(s);

}

}

A.

It will display test.

B.

It will display testpaper.

C.

It will generate a compile-time error.

D.

It will display paper.

Which of the following statements is true?

A.

All UTF characters are eight bits long.

B.

All UTF characters are all sixteen bits long.

C.

All UTF characters are twenty four bits long.

D.

All bytecode characters are sixteen bits long.

E.

All unicode characters are sixteen bits long.

Which of the following are advantages of client-side JavaScript?

Each correct answer represents a complete solution. Choose two.

A.

It is fast.

B.

It provides graphical components.

C.

It is secure.

D.

It provides form-validation at client side.

Mark works as a Programmer for InfoTech Inc. He develops a Java application that uses the encryption and compression techniques. Which of the following interfaces will he use to control the serialization and deserialization processes?

A.

Flushable

B.

Closeable

C.

Serializable

D.

Externalizable

Which of the following statements are true about object serialization?

Each correct answer represents a complete solution. Choose all that apply.

A.

After deserialization, objects have the same state as it had when it was serialized.

B.

It uses ObjectOutputStream to deserialize objects.

C.

It uses the ObjectInput and ObjectOutput interfaces.

D.

An object will have the same state at deserialization as it had at the time it was serialized if all its superclasses are also serializable.

Which of the following code declarations are valid error-page declarations?

Each correct answer represents a complete solution. Choose all that apply.

A.

java.lang.ArithmeticException

304

NumericalException.jsp

B.

304

NumericalException.jsp

C.

304

NumericalException.jsp

D.

java.lang.ArithmeticException

NumericalException.jsp

E.

304

NumericalException.jsp