Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

GIAC GSSP-Java - GIAC Secure Software Programmer – Java

Page: 6 / 9
Total 275 questions

Identify whether the given statement is true or false.

"When a Java program starts up, one thread begins running immediately."

A.

True

B.

False

Identify whether the given statement is true or false.

"There is no method to create a new thread other than extending the Thread class."

A.

True

B.

False

Identify whether the given statement is true or false.

"When an exception occurs in a try block, each catch statement following the try block is inspected in sequential order, and the last one whose type matches that type of exception is executed."

A.

False

B.

True

Which of the following JAR file options is used for creating an archive?

A.

-v

B.

-u

C.

-x

D.

-c

Mark works as a Programmer for InfoTech Inc. He develops a Web application that takes input from users. Which of the following methods can be used by the client and server to validate the users input?

Each correct answer represents a complete solution. Choose all that apply.

A.

Validation through Servlets on the server side

B.

Validation using JavaScript on the client side

C.

Validation through Java Applets on the client side

D.

Validation through XML on the server side

In which of the following locations the helper classes of a session bean class reside?

A.

EJB JAD file

B.

Deployment descriptor

C.

META-INF directory

D.

EJB JAR file

Which of the following are correct if LoginContext enforces the requisite flag to each LoginModule in the configuration file?

Each correct answer represents a complete solution. Choose all that apply.

A.

If LoginModule succeeds, authentication continues down the LoginModule list.

B.

If LoginModule succeeds or fails, authentication still continues to proceed down the LoginModule list.

C.

The LoginModule is required to succeed.

D.

If LoginModule fails, control immediately returns to the application (authentication does not proceed down the LoginModule list).

You work as a Software Developer for NewTech Inc. You write a bean class called EmployeeBean. The class contains two methods, EmpSal() and EmpAttendance(). Both these methods can be accessed by the ADMIN role. The EmpSal() method can be accessed only by the HR role, while the EmpAttendance () method can be accessed only by the DBA role. You want the EmpAttendance() method to be accessed by the HR role also. However, no other roles in the class except ADMIN, DBA, and HR should be able to access the EmpAttendance() method. Which of the following steps will you take to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

Use the element of the deployment descriptor and declare the as DBA.

B.

Use the @RunAs("ADMIN") annotation to allow the HR the privileges as ADMIN.

C.

Use the @RunAs("DBA") annotation to allow the HR the privileges as DBA.

D.

Use the element of the deployment descriptor to declare the role-name as DBA and the method-name as EmpAttendance.

E.

Use the @PermitAll annotation with the EmpAttendance() method to allow the HR to access the EmpAttendance() method.

Mark works as a Programmer for InfoTech Inc. He develops a program that defines a class named Inventory that has an instance variable named NumOfItems. Which of the following properties will be applied by NumOfItems?

Each correct answer represents a complete solution. Choose all that apply.

A.

It will not be visible in Static methods if it passed as a parameter.

B.

It will be visible in Static methods if it passed as a parameter.

C.

It will be available for all the instance methods of the class.

D.

It becomes available for garbage collection if it is no longer in scope.

Which of the following elements contains the element in the deployment descriptor?

A.

B.

C.

D.

E.