当前分类: SCDCD(310-081)
问题:单选题Which security mechanism can be directed through the element in a web deployment descriptor()?A authorizationB data integrityC confidentialityD authentication...
查看答案
问题:单选题The tag handler for n:recurse extends SimpleTagSupport.Assuming an n:recurse tag can either contain an empty body or another n:recurse tag, which strategy allows the tag handler for n:recurse to output the nesting depth of the deepest n:recurse tag?()A...
问题:单选题Which option prevents the exception thrown by my:errorProne from invoking the error page mechanism and outputs the message "File not found" in the response?()A AB BC CD DE E...
问题:单选题Which thefollowingstatements about static inner classes is true?()A An anonymous class can be declared as static.B A static inner class cannot be a static member of the outer class.C A static inner class does not require an instance of the enclosing...
问题:单选题Which path is required to be present within a WAR file?()A /classesB /index.htmlC /MANIFEST-INFD /WEB-INF/web.xmlE /WEB-INF/classesF /WEB-INF/index.htmlG /META-INF/index.xml...
问题:单选题A developer for the Company.com web site has been told that users may turn off cookie support in their browsers. What must the developer do to ensure that these customers can still use the web application?()A The developer must ensure that every URL i...
问题:多选题Under what two circumstances is the set JspBody method NOT called in a tag class that implements the Simple Tag interface? ()AThe tag is invoked without a body.BThe doTAb method throws an exception.CThe element has the value empty.DThe tag is called w...
问题:单选题Which interface must a class implement to be informed of a session creation event?()A javax.servlet.http.HttpSessionListenerB javax.servlet.http.HttpSessionBindingListenerC javax.servlet.http.HttpSessionCreationListenerD javax.servlet.http.HttpSess...
问题:多选题Which the two demonstrate encapsulation of data?()AMember data have no access modifiers.BMember data can be modified directly.CThe access modifier for methods is protected.DThe access modifier to member data is private.EMethods provide for access and m...
问题:单选题Which is the valid identifier?()A falseB defaultC _objectD a-class...
问题:单选题Which security mechanism is employed only on the server-side to limit access to resources or components?()A authorizationB data integrityC confidentialityD authentication...
问题:单选题} What is the result?()A Compilation succeeds and 1 is printed.B Compilation succeeds and 2 is printed.C An error at line 8 causes compilation to fail.D An error at line 14 causes compilation to fail....
问题:单选题Which the security mechanism uses the concept of a realm?()A authorizationB data integrityC confidentialityD authentication...
问题:单选题Which the HTTP method represents a request for information about the supported methods on an HTTP server?()A GETB INFOC HEADD TRACEE OPTIONS...
问题:单选题Which retrieves the value associated with “foo” from within an HttpServlet?()A String value = getServletConfig( ).getParameter(“foo”);B String value = getServletContext( ).getAttribute(“foo”);C Object value = getServletContext( ).getInitParameter...
问题:单选题Which HTTP method has the characteristic that multiple indential requests may produce side effect beyond those of a single request()?A PUTB GETC INFOD POSTE HEADF TRACE...
问题:多选题Which two are characteristics of the Intercepting Filter pattern?()Ait provides centralized request handling for incoming requests.BIt forces resource authentication to be distributed across web components.CIt reduces coupling between presentation-tier...
问题:单选题Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is t...
问题:多选题For which three events can web application event listeners be registered? ()Awhen a session is createdBafter a servlet is destroyedCwhen a session has timed outDwhen a cookie has been createdEwhen a servlet has forwarded a requestFwhen a session attrib...