多选题Which two are characteristics of the Intercepting Filter pattern?()Ait provides centralized request handling for incoming requests.BIt forces resource authentication to be distributed across web components.CIt reduces coupling between presentation-tier

题目

多选题Which two are characteristics of the Intercepting Filter pattern?()Ait provides centralized request handling for incoming requests.BIt forces resource authentication to be distributed across web components.CIt reduces coupling between presentation-tier clients and underlying business services.DIt can be added and removed unobtrusively, without requiring changes to existing  code.EIt allows preprocessing and postprocessing on the incoming requests and outgoing  responses.


相似考题
更多“多选题Which two are characteristics of the Intercepting Filter pattern?()Ait provides centralized request handling for incoming requests.BIt forces resource authentication to be distributed across web components.CIt reduces coupling between presentation-tier”相关问题
  • 第1题:

    Which is characteristic of the Business Delegate pattern?()

    • A、 It decreases complexity by removing a layer of proxy classes.
    • B、 It reduces coupling between tiers by hiding implementation details.
    • C、 It decreases performance due to the lack of caching of remote data.
    • D、 It forces business-tier expectations to be dealt with in the presentation-tier.

    正确答案:B

  • 第2题:

    A Company.com developer is designing a multi-tier web application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, because the business and resource tiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing client requests.  Which design patterns, working together, address these issues?()

    • A、 Front Controller and Transfer Object
    • B、 Front Controller and Service Locator
    • C、 Business Delegate and Transfer Object
    • D、 Business delegate and Intercepting Filter
    • E、 Model-View-Controller and Intercepting Filter

    正确答案:C

  • 第3题:

    Which three characteristics are true of the ProtectLink Gateway product?()

    • A、protects from spyware and phishing attacks
    • B、provides web server content filtering
    • C、provides encryption between a browser and a web server
    • D、is bundled in the SPS platform
    • E、blocks 97% of SPAM
    • F、provides content filtering for e-mail

    正确答案:A,B,F

  • 第4题:

    A developer is designing a multi-tier web application and discovers a need to log each incoming clientrequest. Which two patterns, taken independently, provide a solution for this problem?()

    • A、Transfer Object
    • B、Service Locator
    • C、Front Controller
    • D、Intercepting Filter
    • E、Business Delegate

    正确答案:C,D

  • 第5题:

    A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()

    • A、Remote Proxy
    • B、Front Controller
    • C、Service Activator
    • D、Intercepting Filter
    • E、Business Delegate

    正确答案:B

  • 第6题:

    多选题
    Which two are characteristics of the Intercepting Filter pattern?()
    A

    it provides centralized request handling for incoming requests.

    B

    It forces resource authentication to be distributed across web components.

    C

    It reduces coupling between presentation-tier clients and underlying business services.

    D

    It can be added and removed unobtrusively, without requiring changes to existing  code.

    E

    It allows preprocessing and postprocessing on the incoming requests and outgoing  responses.


    正确答案: C,A
    解析: 暂无解析

  • 第7题:

    多选题
    Which two statements are true about Oracle ActiveCache ?()
    A

    it supports very large data-sets such as the result-sets from large search queries to be held in memory

    B

    it provides a set of management tools that enables automation of configuration

    C

    it provides enhanced visibility across the entire application infrastructure

    D

    it significantly increases the performance of Web-based applications with no code change


    正确答案: C,D
    解析: 暂无解析

  • 第8题:

    多选题
    What are two characteristics of GSS?()
    A

    It helps verify end-to-end path availability.

    B

    It provides traffic rerouting in case of disaster.

    C

    HSRP, GLBP, and VRRP can be clients of GSS.

    D

    BGP must be the routing protocol between the distributed data centers.

    E

    DNS responsiveness is improved by providing centralized domain management.


    正确答案: A,E
    解析: 暂无解析

  • 第9题:

    多选题
    Which two statements are true about Oracle Real Applications Insight ?()
    A

    it provides enhanced visibility across the entire application infrastructure

    B

    it provides a set of management tools that enable automation of configuraion

    C

    it significantly increases the performance of Web-based applications with no code change

    D

    it dramatically reduces costs associated with diagnostics, configuration, and deployment on production servers


    正确答案: B,A
    解析: 暂无解析

  • 第10题:

    多选题
    Which two are characteristics of the Service Locator pattern?()
    A

    It encapsulates component lookup procedures.

    B

    It increases source code duplication and decreases reuse.

    C

    It improves client performance by caching context and factory objects.

    D

    It degrades network performance due to increased access to distributed lookup services.


    正确答案: B,D
    解析: 暂无解析

  • 第11题:

    单选题
    A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()
    A

    Remote Proxy

    B

    Front Controller

    C

    Service Activator

    D

    Intercepting Filter

    E

    Business Delegate


    正确答案: B
    解析: 暂无解析

  • 第12题:

    单选题
    A Company.com developer is designing a multi-tier web application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, because the business and resource tiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing client requests.  Which design patterns, working together, address these issues?()
    A

     Front Controller and Transfer Object

    B

     Front Controller and Service Locator

    C

     Business Delegate and Transfer Object

    D

     Business delegate and Intercepting Filter

    E

     Model-View-Controller and Intercepting Filter


    正确答案: E
    解析: 暂无解析

  • 第13题:

    A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()

    • A、Transfer Object
    • B、Session Facade
    • C、Intercepting Filter
    • D、Template Method
    • E、Model-View-Controller

    正确答案:C

  • 第14题:

    A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()

    • A、 Transfer Object
    • B、 Service Locator
    • C、 Front Controller
    • D、 Intercepting Filter
    • E、 Business Delegate
    • F、 Model-View-Controller

    正确答案:C

  • 第15题:

    Which two are characteristics of the Intercepting Filter pattern?()

    • A、 it provides centralized request handling for incoming requests.
    • B、 It forces resource authentication to be distributed across web components.
    • C、 It reduces coupling between presentation-tier clients and underlying business services.
    • D、 It can be added and removed unobtrusively, without requiring changes to existing  code.
    • E、 It allows preprocessing and postprocessing on the incoming requests and outgoing  responses.

    正确答案:D,E

  • 第16题:

    Which the two are characteristics of the Service Locator pattern?()

    • A、 It encapsulates component lookup procedures
    • B、 It increases source code duplication and decreases reuse
    • C、 It improves client performance by caching context and factory objects
    • D、 It degrades network performance due to increased access to distributed lookup services

    正确答案:A,C

  • 第17题:

    Which two are characteristics of the Front Controller pattern?()

    • A、It simplifies remote interfaces to distributed objects.
    • B、It promotes cleaner application partitioning and encourages reuse.
    • C、It provides an initial point of contact for handling all related requests.
    • D、It reduces maintainability due to the increased complexity of the design.
    • E、It provides loosely coupled handlers that can be combined in various permutations.

    正确答案:B,C

  • 第18题:

    多选题
    Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()
    A

    the URL pattern that requires authorization

    B

    the HTTP methods that require authorization

    C

    the users allowed access to the web resource

    D

    the J2EE roles allowed access to the web resource

    E

    the authentication mechanism required by the web resource


    正确答案: C,A
    解析: 暂无解析

  • 第19题:

    多选题
    Which the two are characteristics of the Service Locator pattern?()
    A

    It encapsulates component lookup procedures

    B

    It increases source code duplication and decreases reuse

    C

    It improves client performance by caching context and factory objects

    D

    It degrades network performance due to increased access to distributed lookup services


    正确答案: C,A
    解析: 暂无解析

  • 第20题:

    单选题
    A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()
    A

     Transfer Object

    B

     Service Locator

    C

     Front Controller

    D

     Intercepting Filter

    E

     Business Delegate

    F

     Model-View-Controller


    正确答案: A
    解析: 暂无解析

  • 第21题:

    多选题
    Which two are characteristics of the Transfer Object design pattern?()
    A

    It reduces network traffic by collapsing multiple remote requests into one.

    B

    It increases the complexity of the remote interface by removing coarse-grained methods.

    C

    It increases the complexity of the design due to remote synchronization and version control issues.

    D

    It increases network performance introducing multiple fine-grained remote requests which return verysmall amounts of data.


    正确答案: C,A
    解析: 暂无解析

  • 第22题:

    单选题
    Which is characteristic of the Business Delegate pattern?()
    A

     It decreases complexity by removing a layer of proxy classes.

    B

     It reduces coupling between tiers by hiding implementation details.

    C

     It decreases performance due to the lack of caching of remote data.

    D

     It forces business-tier expectations to be dealt with in the presentation-tier.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    多选题
    Which two are characteristics of the Front Controller pattern?()
    A

    It simplifies remote interfaces to distributed objects.

    B

    It promotes cleaner application partitioning and encourages reuse.

    C

    It provides an initial point of contact for handling all related requests.

    D

    It reduces maintainability due to the increased complexity of the design.

    E

    It provides loosely coupled handlers that can be combined in various permutations.


    正确答案: C,B
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements are true about the Websense redirect Web filter solution? ()(Choose two.)
    A

    The Websense redirect Web filter solution does not require a license on the SRX device.

    B

    The Websense server provides the SRX device with a category for the URL and the SRX device then matches the category decides to permit or deny the URL.

    C

    The Websense server provides the SRX device with a decision as to whether the SRX device permits or denies the URL.

    D

    When the Websense server does not know the category of the URL, it sends a request back to the SRX device SurfControl server in the cloud.


    正确答案: B,C
    解析: 暂无解析