Exam Details

  • Exam Code
    :GSSP-JAVA
  • Exam Name
    :GIAC Secure Software Programmer – Java
  • Certification
    :GIAC Information Security
  • Vendor
    :GIAC
  • Total Questions
    :275 Q&As
  • Last Updated
    :Apr 30, 2024

GIAC GIAC Information Security GSSP-JAVA Questions & Answers

  • Question 261:

    Mark works as a Programmer for InfoTech Inc. He wants to develop a JMS API application that is used as

    a messaging service application. He writes the following createSession() method.

    session = connection.createSession(false, 2);

    Which of the following statements are true about the syntax? Each correct answer represents a complete

    solution. Choose all that apply.

    A. The client acknowledges a consumed message by calling the message's acknowledge method.

    B. The acknowledge method can reduce session overhead by minimizing the work the session does to prevent duplicates.

    C. This method instructs the session to lazily acknowledge the delivery of messages.

    D. The session automatically acknowledges a client's receipt of a message.

    E. If a message consumer consumes eight messages and then acknowledges the fourth message delivered, all eight messages are acknowledged.

  • Question 262:

    Which of the following statements are true about object serialization? Each correct answer represents a complete solution. Choose all that apply.

    A. After deserialization, objects have the same state as it had when it was serialized.

    B. It uses ObjectOutputStream to deserialize objects.

    C. It uses the ObjectInput and ObjectOutput interfaces.

    D. An object will have the same state at deserialization as it had at the time it was serialized if all its superclasses are also serializable.

  • Question 263:

    Which of the following elements are the subelements of the mime-mapping element in a deployment

    descriptor file?

    Each correct answer represents a complete solution. Choose all that apply.

    A. exception-type

    B. error-code

    C. extension

    D. mime-type

    E. servlet-class

  • Question 264:

    John works as a Software Developer for VenTech Inc. He writes the following code using Java.

    public class vClass extends Thread { public static void main(String args[]) { vClass vc=new vClass(); vc.run(); } public void start() { for(int k=0;k<20;k++) { System.out.println("The value of k = "+k); } } } What will happen when he attempts to compile and execute the application?

    A. The application will compile successfully and the values from 0 to 19 will be displayed as the output.

    B. A compile-time error will occur indicating that no run() method is defined for the Thread class.

    C. A runtime error will occur indicating that no run() method is defined for the Thread class.

    D. The application will compile successfully but will not display anything as the output.

  • Question 265:

    Which of the following classes is an engine class that provides an opaque representation of cryptographic parameters?

    A. DSAPublicKeySpec

    B. AlgorithmParameterGenerator

    C. DSAParameterSpec

    D. AlgorithmParameters

  • Question 266:

    Which of the following statements about programmatic security are true? Each correct answer represents a complete solution. Choose all that apply.

    A. The bean provider is responsible for writing code for programmatic security.

    B. It is also called as instance level security.

    C. It is implemented using methods of the EJBContext interface.

    D. It is implemented using the methods of the UserTransaction interface.

  • Question 267:

    Which of the following functions are performed by methods of the HttpSessionActivationListener interface?

    Each correct answer represents a complete solution. Choose all that apply.

    A. Notifying the object when it is bound to a session.

    B. Notifying an attribute that a session has just migrated from one JVM to another.

    C. Notifying the object when it is unbound from a session.

    D. Notifying an attribute that a session is about to migrate from one JVM to another.

  • Question 268:

    Mark works as a Programmer for InfoTech Inc. He develops the following deployment descriptor code.

    A Secure Application ...

    Manager

    Admin

    Programmer

    Admin

    Employee

    Which of the following is a valid isUserInRole() method call that can be made if request is the

    HttpServletRequest request?

    A. request.isUserInRole("Programmer");

    B. request.isUserInRole("Manager");

    C. request.isUserInRole("Admin");

    D. request.isUserInRole("Employee");

  • Question 269:

    Which of the following methods of the EJBContext interface can be called by both the BMT and CMT

    beans?

    Each correct answer represents a complete solution. Choose all that apply.

    A. getCallerPrincipal()

    B. getRollbackOnly()

    C. getUserTransaction()

    D. isCallerInRole()

  • Question 270:

    Mark works as a Programmer for InfoTech Inc. He develops a deployment descriptor code that contains three valid

    elements.

    All of them constraining a Web resource Res1, the

    sub-element of the

    elements are as follows.

    Admin Manager

    Which of the following can access the resource Res1?

    A. Only Manager can access the resource.

    B. No one can access the resource.

    C. Everyone can access the resource.

    D. Only Admin can access the resource.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GSSP-JAVA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.