单选题A web application uses the HttpSession mechanism to determine if a user is "logged in." When a usersupplies a valid user name and password, an HttpSession is created for that user. The user has access tothe application for only 15 minutes after logging

题目
单选题
A web application uses the HttpSession mechanism to determine if a user is "logged in." When a usersupplies a valid user name and password, an HttpSession is created for that user. The user has access tothe application for only 15 minutes after logging in. The code must determine how long the user has beenlogged in, and if this time is greater than 15 minutes, must destroy the HttpSession. Which method in HttpSession is used to accomplish this?()
A

Getcreationtime

B

Invalidateafter

C

Getlastaccessedtime

D

Getmaxinactiveinterval


相似考题
更多“单选题A web application uses the HttpSession mechanism to determine if a user is "logged in." When a usersupplies a valid user name and password, an HttpSession is created for that user. The user has access tothe application for only 15 minutes after logging”相关问题
  • 第1题:

    Given a web application in which the cookie userName is expected to contain the name of the user. Which EL expression evaluates to that user name?()

    • A、${userName}
    • B、${cookie.userName}
    • C、${cookie.user.name}
    • D、${cookies.userName[0]}

    正确答案:B

  • 第2题:

    A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  Which of the following would be another way for the user to send the Remote Assistance invitation? ()

    • A、Configuring the Windows Firewall exceptions.
    • B、Using Windows Messenger.
    • C、Configuring My Network Places.
    • D、Using Internet Explorer.

    正确答案:B

  • 第3题:

    Examine the command: SQL> ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()

    • A、The SKD user cannot log in to the database instance.
    • B、The objects owned by the SKD user are not accessible to any user.
    • C、The other users can access the objects owned by the SKD user, on which they have access.
    • D、The password for the SKD user expires and the user is forced to change the password at the next log in.

    正确答案:A,C

  • 第4题:

    In your database instance, the user sessions are connected to the database server from the remotemachines. You want to achieve the following for these users:  1:The user account must be locked after four unsuccessful login attempts.PASSWORD_LOCK_TIME  2:The user must be prompted to change the password at regular intervals.PASSWORD_LIFE_TIME  3:The user may not have more than three simultaneous sessions.SESSIONS_PER_USER  4:The user session must automatically be logged off if more than 10 minutes elapsed time used.CONNECT_TIME  How would you accomplish the above()

    • A、by assigning profiles for the users
    • B、by implementing Fine-Grained Auditing (FGA)
    • C、by granting a secure application role to the users
    • D、by implementing the Database Resource Manager plan

    正确答案:A

  • 第5题:

    You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.If Page.User.Identity.Name <> "CONTOSO/Administrator" Then Response.Redirect("login.aspx")End IfYou are logged on as Administrator. When you display the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()

    • A、In the Web.config file, enable impersonation.
    • B、In IIS, enable anonymous access.
    • C、In IIS, disable anonymous access.
    • D、In the Web.config file, set the authentication mode to Windows.

    正确答案:C,D

  • 第6题:

    You are implementing an ASP.NET Web application. Users will authenticate to the application with an ID. The application will allow new users to register for an account. The application will generate an ID for the user based on the users full name. You need to implement this registration functionality. Which two actions should you perform?()

    • A、Configure the SqlMembershipProvider in the web.config file.
    • B、Configure the SqlProfileProvider in the web.config file.
    • C、Create an ASP.NET page that contains a default CreateUserWizard control to create a new user account.
    • D、Create an ASP.NET page that contains a custom form that collects the user information and then uses the Membership.CreateUser method to create a new user account.

    正确答案:A,D

  • 第7题:

    单选题
    You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  The configuration below exists in the Web.config file:           Certkiller.com hosts the Web application in Microsoft Internet Information Services (IIS) 6.0. TheIntegrated Windows Authentication is enabled in IIS and anonymous access disabled. The application pool is configured to run as the identity Certkiller/WebApp. The IIS anonymous accountis Certkiller/Anonymous.  The following code exists in the code-behind file for a web form:  stringname = WindowsIdentity.GetCurrent().Name;  Response.Write(name); A Certkiller.com employee named RoryAllen has a domain user account named Certkiller/RAllen.He uses this account to access the page. However, Rory Allen logs in to the Web application withthe user name FormsUser. You need to determine the output of this code when Rory Allenaccesses the page. What will the output of this code be?()
    A

    The output will be FormsUser.

    B

    The output will be Certkiller/RAllen.

    C

    The output will be Certkiller/Anonymous.

    D

    The output will be Certkiller/WebApp


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    In your database instance, the user sessions are connected to the database server from the remotemachines. You want to achieve the following for these users:  1:The user account must be locked after four unsuccessful login attempts.PASSWORD_LOCK_TIME  2:The user must be prompted to change the password at regular intervals.PASSWORD_LIFE_TIME  3:The user may not have more than three simultaneous sessions.SESSIONS_PER_USER  4:The user session must automatically be logged off if more than 10 minutes elapsed time used.CONNECT_TIME  How would you accomplish the above()
    A

    by assigning profiles for the users

    B

    by implementing Fine-Grained Auditing (FGA)

    C

    by granting a secure application role to the users

    D

    by implementing the Database Resource Manager plan


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    A user has changed their password using the passwd command, and notices that the change is only made tothe local node. When the administrator changes the user’s password from the command line using the passwd command thechange is made cluster-wide. What is the most likely cause of this problem?()
    A

    The user has a UID less than 200

    B

    The user has been defined as an administrative user

    C

    The file /usr/es/sbin/cluster/clpasswd is not executable by the user

    D

    The user needs explicit authorization to change their password cluster-wide


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    Upon a user’s first visit to the website, which two operations are always performed when the getSession method is called with no arguments in a servlet?()
    A

    All URLs returned by the server are rewritten.

    B

    An HttpSession object is created if necessary.

    C

    The user name and password of the user are checked.

    D

    The session ID is stored in the HTTP response as a cookie.


    正确答案: C,D
    解析: 暂无解析

  • 第11题:

    单选题
    A technician needs to use Remote Assistance with a user. The user is asked to use an email application to send the technician an invitation to remotely access the user’s computer. The email application has not been configured in the user’s computer.  Which of the following would be another way for the user to send the Remote Assistance invitation? ()
    A

    Configuring the Windows Firewall exceptions.

    B

    Using Windows Messenger.

    C

    Configuring My Network Places.

    D

    Using Internet Explorer.


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    An organization has decided to deploy an IBM Tivoli Access Manager for Enterprise Single-on solution to help address security and productivity issues. Per their corporate security policy, the organization has detailed requirements related to password management for their enterprise applications.  Which password requirements need to be captured?()
    A

    details related to application user ID requirements

    B

    policy requirements related to the number of applications that a user can access

    C

    policy requirements for application and user initiated password resets and password complexity

    D

    do nothing as password policy requirements are best addressed within the application space rather than in an Enterprise Single Sign-On project


    正确答案: D
    解析: 暂无解析

  • 第13题:

    Upon a user’s first visit to the website, which two operations are always performed when the getSession method is called with no arguments in a servlet?()

    • A、 All URLs returned by the server are rewritten.
    • B、 An HttpSession object is created if necessary.
    • C、 The user name and password of the user are checked.
    • D、 The session ID is stored in the HTTP response as a cookie.

    正确答案:B,D

  • 第14题:

    A web application uses the HttpSession mechanism to determine if a user is "logged in." When a usersupplies a valid user name and password, an HttpSession is created for that user. The user has access tothe application for only 15 minutes after logging in. The code must determine how long the user has beenlogged in, and if this time is greater than 15 minutes, must destroy the HttpSession. Which method in HttpSession is used to accomplish this?()

    • A、Getcreationtime
    • B、Invalidateafter
    • C、Getlastaccessedtime
    • D、Getmaxinactiveinterval

    正确答案:A

  • 第15题:

    Which statement is true regarding this setting?()

    • A、It drops the connection after the specified number of login attempts fail for any user.
    • B、It is enforced only if the password profile is enabled for the user. 
    • C、It locks the user account after the specified number of attempts. 
    • D、It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.

    正确答案:A

  • 第16题:

    You work as a Web Developer at Certkiller.com. You are in the process of creating a Webapplication using Microsoft ASP.NET 3.5.  The configuration below exists in the Web.config file:     Certkiller.com hosts the Web application in Microsoft Internet Information Services (IIS) 6.0. TheIntegrated Windows Authentication is enabled in IIS and anonymous access disabled. The application pool is configured to run as the identity Certkiller/WebApp. The IIS anonymous accountis Certkiller/Anonymous.  The following code exists in the code-behind file for a web form:  stringname = WindowsIdentity.GetCurrent().Name;  Response.Write(name); A Certkiller.com employee named RoryAllen has a domain user account named Certkiller/RAllen.He uses this account to access the page. However, Rory Allen logs in to the Web application withthe user name FormsUser. You need to determine the output of this code when Rory Allenaccesses the page. What will the output of this code be?()

    • A、The output will be FormsUser.
    • B、The output will be Certkiller/RAllen.
    • C、The output will be Certkiller/Anonymous.
    • D、The output will be Certkiller/WebApp

    正确答案:D

  • 第17题:

    You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.if (Page.User.Identity.Name != @"CONTOSO/Administrator") { the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()

    • A、In the Web.config file, enable impersonation.
    • B、In IIS, enable anonymous access.
    • C、In IIS, disable anonymous access.
    • D、In the Web.config file, set the authentication mode to Windows.

    正确答案:C,D

  • 第18题:

    You work as an ASP.NET Web Application Developer for SomeCompany.  The company uses Visual Studio .NET 2010 as its application development platform.You create an ASP.NET Web site using .NET Framework 4.0. Only registered users of the company will be able to use the application. The application holds a page named UserAccount.aspx that enables new users to register them to the registered users„ list of the company. The UserAccount page hold numerous TextBox controls that accept users personal details, such as user name, password, home address, zipcode, phone number, etc.  One of the TextBox controls on the page is named ZipCode in which a user enters a zip code.  You must ensure that when a user submits the UserAccount page, ZipCode must contain five numeric digits.  What will you do to accomplish this?()

    • A、Use RangeValidator.
    • B、Use RegularExpressionValidator
    • C、Use RequiredValidator
    • D、Use CompareValidator
    • E、Use RequiredFieldValidator

    正确答案:B,E

  • 第19题:

    单选题
    Given a web application in which the cookie userName is expected to contain the name of the user. Which EL expression evaluates to that user name?()
    A

    ${userName}

    B

    ${cookie.userName}

    C

    ${cookie.user.name}

    D

    ${cookies.userName[0]}


    正确答案: A
    解析: 暂无解析

  • 第20题:

    多选题
    You are developing a Web application. The Web application restricts access to an administrative page. The Web application uses the following code segment to protect the page.if (Page.User.Identity.Name != @"CONTOSO/Administrator") { the page, you are redirected to Login.aspx. You discover that the User.Identity.Name property is not being correctly populated. You need to ensure that you can access the page when you are logged on as Administrator. Which two actions should you perform? ()
    A

    In the Web.config file, enable impersonation.

    B

    In IIS, enable anonymous access.

    C

    In IIS, disable anonymous access.

    D

    In the Web.config file, set the authentication mode to Windows.


    正确答案: C,B
    解析: 暂无解析

  • 第21题:

    单选题
    Which statement is true regarding this setting?()
    A

    It drops the connection after the specified number of login attempts fail for any user.

    B

    It is enforced only if the password profile is enabled for the user. 

    C

    It locks the user account after the specified number of attempts. 

    D

    It drops the connection after the specified number of login attempts fail only for users who have the SYSDBA privilege.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    多选题
    Examine the command: SQL> ALTER USER skd ACCOUNT LOCK; Which two statements are true after the command is executed()
    A

    The SKD user cannot log in to the database instance.

    B

    The objects owned by the SKD user are not accessible to any user.

    C

    The other users can access the objects owned by the SKD user, on which they have access.

    D

    The password for the SKD user expires and the user is forced to change the password at the next log in.


    正确答案: B,A
    解析: 暂无解析

  • 第23题:

    单选题
    A web application uses the HttpSession mechanism to determine if a user is “logged in”. When a user supplies a valid user name and password, an HttpSession is created for that user.  The user has access to the application for only 15 minutes after logging in. The code must determine how long the user has been logged in, and if this time is greater than 15 minutes, must destroy the HttpSession.  Which method in HttpSession is used to accomplish this?()
    A

     getCreationTime

    B

     invalidateAfter

    C

     getLastAccessedTime

    D

     getMaxInactiveInterval


    正确答案: B
    解析: 暂无解析