You work as a Software Developer for UcTech Inc. You want to declare a security constraint in the
deployment descriptor using the
possible values for the element?
Each correct answer represents a complete solution. Choose all that apply.
A. CONFIDENTIAL
B. ALL
C. NONE
D. INTEGRAL
Which of the following methods must be implemented by each subclass of the Permission class to compare permissions?
A. hashcode
B. implies
C. newPermissionCollection
D. equals
You work as a Software Developer for UcTech Inc. You want to write a filter that will implement the Filter interface. Which of the following methods will you use to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.
A. doPostFilter()
B. doGetFilter()
C. doFilter()
D. init()
E. service()
Which of the following is used to restore the objects that have been previously serialized by a stream?
A. FileInputStream
B. ObjectOutputStream
C. ObjectInputStream
D. FileOutputStream
You work as a Software Developer for UcTech Inc. You build an online book shop, so that users can purchase books using their credit cards. You want to ensure that only the administrator can access the credit card information sent by users. Which security mechanism will you use to accomplish the task?
A. Confidentiality
B. Authorization
C. Authentication
D. Data integrity
You work as a Programmer for InfoTech Inc and develop the following two
declarations.
Which of the following statements is true about the
A. Nobody is allowed to access the specified resources.
B. Only Manager is allowed to access the specified resources.
C. The first
D. It is not possible to define the multiple security constraint on a single resource.
Mark works as a Programmer for InfoTech Inc. He develops a Java application that uses the encryption and compression techniques. Which of the following interfaces will he use to control the serialization and deserialization processes?
A. Flushable
B. Closeable
C. Serializable
D. Externalizable
Which of the following methods is used to encrypt or decrypt data in a single step?
A. wrap()
B. update()
C. digest()
D. doFinal()
Which of the following methods belongs to the FilterConfig interface and ServletConfig interface both? Each correct answer represents a complete solution. Choose all that apply.
A. getInitParameter()
B. getServletContext()
C. getFilterName()
D. getInitParameterNames()
You work as a Software Developer for UcTech Inc. You want to use form-based authentication as a
security mechanism in your application. Which of the following entries will you use in your login page to
accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.
A. j_pw
B. j_security_check
C. password
D. _jid
E. j_username
F. j_password
G. jid
H. j_un
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GSSP-JAVA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.