GIAC GSSP-Java - GIAC Secure Software Programmer – Java
Which of the following rules must be followed while determining a class loader?
Each correct answer represents a complete solution. Choose all that apply.
In which of the following cases is the GET method used to retrieve information?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following functions are performed by methods of the
HttpSessionActivationListener interface?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following methods belongs to the FilterConfig interface and ServletConfig interface both?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following elements are the subelements of the mime-mapping element in a deployment descriptor file?
Each correct answer represents a complete solution. Choose all that apply.
John works as a Software Developer for VenTech Inc. He writes the following code using Java.
public class vClass extends Thread
{
public static void main(String args[])
{
vClass vc=new vClass();
vc.run();
}
public void start()
{
for(int k=0;k<20;k++)
{
System.out.println("The value of k = "+k);
}
}
}
What will happen when he attempts to compile and execute the application?
Which of the following statements about a JAR file are true?
Each correct answer represents a complete solution. Choose all that apply.
The following JSP scriptlet is given.
<% response.setContentType("text/html; charset=ISO-8859-1"); %>
Which of the following directives is the equivalent directive for the scriptlet given above?
Which of the following fields is required when a user is authenticated using FORM authentication?
Fill in the______blank with the required interface name to complete the statement below.
An object of the interface is provided by the container to invoke the next filter in a chain of filters.
