单选题Which ensures that a JSP response is of type "text/plain"?()A <%@ page mimeType=text/plain %>B <%@ page contentType=text/plain %>C <%@ page pageEncoding=text/plain %>D <%@ page contentEncoding=text/plain %>E <% response.setEncoding(text/plain); %>

题目
单选题
Which ensures that a JSP response is of type "text/plain"?()
A

<%@ page mimeType=text/plain %>

B

<%@ page contentType=text/plain %>

C

<%@ page pageEncoding=text/plain %>

D

<%@ page contentEncoding=text/plain %>

E

<% response.setEncoding(text/plain); %>


相似考题
更多“单选题Which ensures that a JSP response is of type "text/plain"?()A %@ page mimeType=text/plain %B %@ page contentType=text/plain %C %@ page pageEncoding=text/plain %D %@ page contentEncoding=text/plain %E % response.setEncoding(text/plain); %”相关问题
  • 第1题:

    A(68)copies a photograph,drawing or page of text into the computer.

    A.scanner

    B.printer

    C.display

    D.keyboard


    正确答案:A
    解析:扫描仪把图像、图形和文本页面复制到计算机中。

  • 第2题:

    Which three RIP features are supported on the WX or WXC device? ()(Choose three.)

    A. SHA-1

    B. MD5 authentication

    C. version 1 messages

    D. version 2 messages

    E. plain-text authentication


    参考答案:C, D, E

  • 第3题:

    A ______ copies a photograph, drawing or page of text into the computer.

    A.scanner

    B.printer

    C.display

    D.keyboard


    正确答案:A
    解析:译文的含义是:()可以复制相片、图画或文本页到计算机中。选项A、B、C、D的含义分别是扫描仪、打印机、显示器、键盘。选项A符合题意,为所选。

  • 第4题:

    Which ensures that a JSP response is of type "text/plain"?()

    • A、<%@ page mimeType="text/plain" %>
    • B、<%@ page contentType="text/plain" %>
    • C、<%@ page pageEncoding="text/plain" %>
    • D、<%@ page contentEncoding="text/plain" %>
    • E、<% response.setEncoding("text/plain"); %>

    正确答案:B

  • 第5题:

    POJO是()

    • A、Plain Old Java Object
    • B、Programming Object Java Object
    • C、Page Old Java Object
    • D、Plain Object Java Old

    正确答案:A

  • 第6题:

    How does using the service password encryption command on a router provide additional security?()

    • A、by encrypting all passwords passing through the router
    • B、by encrypting passwords in the plain text configuration file
    • C、by requiring entry of encrypted passwords for access to the device
    • D、by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges
    • E、by automatically suggesting encrypted passwords for use in configuring the router

    正确答案:B

  • 第7题:

    Which description of BGP authentication is true?()

    • A、MD5 has been used by BGP to encrypt BGP update packets.
    • B、BGP uses a message-digest algorithm to authenticate BGP peers
    • C、A plain-text password authentication is an option of BGP authentication
    • D、EBGP peers authentication is faster than IBGP peers authentication
    • E、BGP uses public key and private key to authenticate BGP peers.

    正确答案:B

  • 第8题:

    Which three RIP features are supported on the WX or WXC device? ()(Choose three.)

    • A、SHA-1
    • B、MD5 authentication
    • C、version 1 messages
    • D、version 2 messages
    • E、plain-text authentication

    正确答案:C,D,E

  • 第9题:

    单选题
    Which description of BGP authentication is true?()
    A

    MD5 has been used by BGP to encrypt BGP update packets.

    B

    BGP uses a message-digest algorithm to authenticate BGP peers

    C

    A plain-text password authentication is an option of BGP authentication

    D

    EBGP peers authentication is faster than IBGP peers authentication

    E

    BGP uses public key and private key to authenticate BGP peers.


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    Regarding constructing a good encryption algorithm, what does creating an avalanche effect indicate?()
    A

    Altering the key length causes the ciphertext to be completely different

    B

    Changing only a few bits of a ciphertext message causes the plain text to be completely different

    C

    Altering the key length causes the plain text to be completely different

    D

    Changing only a few bits of a plain-text message causes the ciphertext to be completely different


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    You are testing an existing ASP.NET page. The page includes a text box. You are able to execute malicious JavaScript code by typing it in the text box and submitting. You need to configure the page to prevent JavaScript code from being submitted by the text box. In the @ Page directive, which attribute should you set to true?()
    A

    the EnableEventValidation attribute

    B

    the ResponseEncoding attribute

    C

    the ValidateRequest attribute

    D

    the Strict attribute


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Krstin has created a page in the videos application .which one of the following statements about pages is not true ?()
    A

    pages are design elements

    B

    Pages can be full-text indexed 

    C

    pages  can be referenced by outlines or frames  

    D

    pages  can include text,graphics ,applets,and links


    正确答案: B
    解析: 暂无解析

  • 第13题:

    A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2.Which protocol would meet the customers needs?()

    A. EAP-TLS

    B. EAP-MD5

    C. PAP

    D. EAP-MSCHAPv2


    参考答案:D

  • 第14题:

    Symmetric, or private-key, encryption is based on a secret key that is shared by both communcating parties. The ( ) party uses the secret key as part of the mathematical operation to encrypt ( ) text to cipher text. The receiving party uses the same secret key to decrypt the cipher text to plain text. Asymmetric, or public-key, encryption uses two different keys for each user: one is a ( ) key known only to this one user; the other is a corresponding public key, which is accessible to anyone. The private and public keys are mathematically related by the encryption algorithm. One key ia used for encyption and the other for decryption, depending on the nature of the communication service being implemented. In addition, public key encryption technoligies allow digital ( ) to be placed on messages. A digital signature uses the sender&39;s private key to encrypt some portion of the message. When the message is received, the receiver uses the sender&39;s ( ) key tp decipher the digital signature to verify the sender&39;s identity.

    A.host B.terminal C.sending D.receiving A.plain B.cipher C.public D.private A.plain B.cipher C.public D.private A.interpretation B.signatures C.encryption D.decryption A.plain B.cipher C.public D.private


    正确答案:C,A,D,B,C

  • 第15题:

    A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2. Which protocol would meet the customers needs?()

    • A、EAP-TLS
    • B、EAP-MD5
    • C、PAP
    • D、EAP-MSCHAPv2

    正确答案:D

  • 第16题:

    You create an ASP.NET page that contains the following tag.  Page Name  You need to write code that will change the contents of the tag dynamically when the page is loaded. What are two possible ways to achieve this goal?()

    • A、this.hdr1.InnerHtml = "Text";
    • B、(hdr1.Parent as HtmlGenericControl).InnerText = "Text";
    • C、HtmlGenericControl h1 = this.FindControl("hdr1") as HtmlGenericControl;h1.InnerText = "Text";
    • D、HtmlGenericControl h1 = Parent.FindControl("hdr1") as HtmlGenericControl;h1.InnerText = "Text";

    正确答案:A,C

  • 第17题:

    与page指令<%@ page import= “java.util.*, java.text.* “ %> 等价的是()。

    • A、<%@ import="“java.util.*" page=""><%@ import="“java.text.*" page=""><%@ import="“java.text.*" page=""><%@ import="“java.util.*" page=""><%@ import="“java.text.*" page=""><%@ import="“java.util.*" page=""><%@ page import= “java.util.* %> <%@ page import= “java.text.* “ %> 
    • B、<%@ page import= “java.util.*”  ,  import= “java.text.* “ %> 
    • C、<%@ page import= “java.util.* “  ;  %> <%@ page import= “java.text.* “  ; %>
    • D、<%@ page import= “java.util.* ; java.text.* “ %>

    正确答案:A

  • 第18题:

    Regarding constructing a good encryption algorithm, what does creating an avalanche effect indicate?()

    • A、Altering the key length causes the ciphertext to be completely different
    • B、Changing only a few bits of a ciphertext message causes the plain text to be completely different
    • C、Altering the key length causes the plain text to be completely different
    • D、Changing only a few bits of a plain-text message causes the ciphertext to be completely different

    正确答案:D

  • 第19题:

    Krstin has created a page in the videos application .which one of the following statements about pages is not true ?()

    • A、pages are design elements
    • B、Pages can be full-text indexed 
    • C、pages  can be referenced by outlines or frames  
    • D、pages  can include text,graphics ,applets,and links

    正确答案:B

  • 第20题:

    You are testing an existing ASP.NET page. The page includes a text box. You are able to execute malicious JavaScript code by typing it in the text box and submitting. You need to configure the page to prevent JavaScript code from being submitted by the text box. In the @ Page directive, which attribute should you set to true?()

    • A、the EnableEventValidation attribute
    • B、the ResponseEncoding attribute
    • C、the ValidateRequest attribute
    • D、the Strict attribute

    正确答案:C

  • 第21题:

    单选题
    与page指令 等价的是()。
    A

    <%@ import="“java.util.*" page=""><%@ import="“java.text.*" page=""><%@ import="“java.text.*" page=""><%@ import="“java.util.*" page=""><%@ import="“java.text.*" page=""><%@ import="“java.util.*" page=""><%@ page import= “java.util.* %> <%@ page import= “java.text.* “ %> 

    B

    <%@ page import= “java.util.*”  ,  import= “java.text.* “ %> 

    C

    <%@ page import= “java.util.* “  ;  %> <%@ page import= “java.text.* “  ; %>

    D

    <%@ page import= “java.util.* ; java.text.* “ %>


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    A customer is trying to decide which 802.1X inner protocol to use on their network. The customer requires that nopasswords be sent across the network in plain text, that the protocol be supported by the Windows native supplicant,and that the protocol supports password changes at Layer 2. Which protocol would meet the customers needs?()
    A

    EAP-TLS

    B

    EAP-MD5

    C

    PAP

    D

    EAP-MSCHAPv2


    正确答案: C
    解析: 暂无解析

  • 第23题:

    多选题
    You create an ASP.NET page that contains the following tag.  Page Name  You need to write code that will change the contents of the tag dynamically when the page is loaded. What are two possible ways to achieve this goal?()
    A

    this.hdr1.InnerHtml = Text;

    B

    (hdr1.Parent as HtmlGenericControl).InnerText = Text;

    C

    HtmlGenericControl h1 = this.FindControl(hdr1) as HtmlGenericControl;h1.InnerText = Text;

    D

    HtmlGenericControl h1 = Parent.FindControl(hdr1) as HtmlGenericControl;h1.InnerText = Text;


    正确答案: A,C
    解析: 暂无解析