Mary works as a Software Developer for XYZ Inc. She writes the following code.
1.
class Alpha {
2.
public static class Beta { }
3.
}
4.
class Delta {
5.
// insert code here
6.
}
Which of the following code statements can be inserted at line 5 to create an instance of the Beta class
defined in the class Alpha?
A. Beta b = new Beta();
B. Alpha a = new Alpha();
C. Beta = new a.Beta();
D. The class Beta cannot be instantiated at line 5.
E. Alpha.Beta b = new Alpha.Beta();
You work as a Software Developer for Developer Inc. You write the following code.
interface A {public boolean b = false;}
class C implements A {public static void main(String args[]) {b = true;System.out.println(b);}} Which of the
following will be the result, when you try to compile and execute the above code?
A. The code will compile and print false.
B. The code will compile, but it will not execute.
C. The code will compile and print true.
D. The code will not compile.
Which of the following statements about various authentication mechanisms in J2EE are true?
A. The FORM based authentication requires a user to possess a Public Key Certificate.
B. The realm string of the BASIC authentication must reflect a security policy.
C. In case of the CLIENT-CERT authentication, a base-64 encoded user name and password is used.
D. The DIGEST authentication may or may not be supported for a J2EE 1.4 compliant Web container.
Mark works as a Programmer for InfoNet Inc. He writes the following programs.
1.
package book;
2.
public class read
3.
{
4.
(access modifier) int r1=10;
5.
}
1.
package book1;
2.
import book.read;
3.
class Doread extends read
4.
{
5.
public void test()
6.
{
7.
System.out.println("The value of r1 is." +r1);
8.
}
9.
}
Which of the following access modifiers will be put in the place of the word, (access modifier), to compile
the program successfully?
A. default
B. public
C. protected
D. private
E. volatile
Which of the following data type values is returned by the System.in.read() console input function?
A. String
B. Integer
C. Float
D. Character
Which of the following exceptions will be thrown by the validate method if the result type does not match the Source type, or if the specified source is neither SAXSource nor DOM Source?
A. SAXException
B. NullPointerException
C. IllegalArgumentException
D. IOException
Which of the following CLDC connector modes is used only for data input over a connection?
A. READ_WRITE
B. READ
C. WRITE
Which of the following is a valid constructor for the DataInputStream class?
A. DataInputStream(File file)
B. DataInputStream(FileInputStream fin)
C. DataInputStream(String str)
D. DataInputStream(FileInputStream fin, int size)
Which of the following TextField constraints hides the input while a user is entering the data in the text box?
A. ANY
B. NUMERIC
C. PASSWORD
D. CONSTRAINT_MASK
Which of the following fields is required when a user is authenticated using FORM authentication?
A. j_security_check
B. password
C. j_pw
D. jid
E. _jid
F. jpassword
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GIAC exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your GSSP-JAVA exam preparations and GIAC certification application, do not hesitate to visit our Vcedump.com to find your solutions here.