Limited Time Discount Offer
30% Off - Ends in 02:00:00

X

GIAC GSSP-Java Dumps

verified by experts

  • Verified by experts

GSSP-Java Premium File

  • 275 Questions & Answers

$21.41

$14.99
GIAC
GIAC Secure Software Programmer-Java
GIAC
GIAC Secure Software Programmer-Java

Files

File Name
Views
Size
Downloads

177

215.6 KB

183

Files

Views

177

Size

215.6 KB

Downloads

183

Questions & Answers for GIAC GSSP-Java

Showing 1-15 of 275 Questions

Question #1 - Topic 1

You work as a Software Developer for NewTech Inc. You want to configure the deployment
descriptor so as to specify the error pages used in the FORM based authentication. Which
of the following elements will you use to accomplish the task?

A. The <realm-name> sub-element of the <login-config> element.

B. The <role-link> sub-element of the <security-role-ref> element.

C. The <method> sub-element of the <method-permission> element.

D. The <form-login-config> sub-element of the <login-config> element.

Question #2 - Topic 1

You work as a Software Developer for UcTech Inc. You want to declare a security
constraint in the deployment descriptor using the <transport-guarantee> element. Which of
the following can be the possible values for the element?
Each correct answer represents a complete solution. Choose all that apply.

A. CONFIDENTIAL

B. ALL

C. NONE

D. INTEGRAL

Question #3 - Topic 1

Which of the following are valid method signatures of the getInstance() method of the
Policy class?
Each correct answer represents a complete solution. Choose all that apply.

A. getInstance(ProtectionDomain domain)

B. static Policy getInstance(String type, Policy.Parameters params, Provider provider)

C. getInstance(String type, Policy.Parameters params)

D. static Policy getInstance(String type, Policy.Parameters params, String provider)

Question #4 - Topic 1

Which of the following actions can you take to seal two packages, PackageA and
PackageB, in the JAR file MyJar.jar?
Each correct answer represents a complete solution. Choose all that apply.

A. Execute the following command. jar cvf MyJar.jar Manifest.txt MyPackage/*.class

B. Create a text file named Manifest.txt with the following contents. Name. myCompany/*Sealed. true

C. Execute the following command. jar cmf MyJar.jar Manifest.txt MyPackage/*.class

D. Create a text file named Manifest.txt with the following contents. Name. myCompany/PackageA/Sealed. true Name. myCompany/PackageB/ Sealed. true

Question #5 - Topic 1

Given below are top-level class declarations. Which of these class declarations would not
produce a compile-time error?
abstract class P {} //1
private class Q {} //2
static class R {} //3
transient class S {} //4

A. Line 3

B. Line 1

C. Line 2

D. Line 4

Question #6 - Topic 1

Which of the following statements about the isCallerInRole() method are true?
Each correct answer represents a complete solution. Choose all that apply.

A. It can be called from the PostConstruct and PreDestroy callback methods of a stateful session bean.

B. It is present in the UserTransaction interface.

C. It cannot be called from a message-driven bean.

D. It can be invoked only from the business method of an enterprise bean.

Question #7 - Topic 1

Which of the following statements is true?

A. All UTF characters are eight bits long.

B. All UTF characters are all sixteen bits long.

C. All UTF characters are twenty four bits long.

D. All bytecode characters are sixteen bits long.

E. All unicode characters are sixteen bits long.

Question #8 - Topic 1

Which of the following methods is used to request that any pending finalizers be run for
objects eligible for garbage collection?

A. freeMemory()

B. gc()

C. runFinalization()

D. runFinalizers()

Question #9 - Topic 1

You work as a Software Developer for UcTech Inc. You want to use form-based
authentication as a security mechanism in your application. Which of the following entries
will you use in your login page to accomplish the task?
Each correct answer represents a part of the solution. Choose all that apply.

A. j_pw

B. j_security_check

C. password

D. _jid

E. j_username

F. j_password

G. jid

H. j_un

Question #10 - Topic 1

You work as a Software Developer for UcTech Inc. You build an online book shop, so that
users can purchase books using their credit cards. You want to ensure that only the
administrator can access the credit card information sent by users. Which security
mechanism will you use to accomplish the task?

A. Confidentiality

B. Authorization

C. Authentication

D. Data integrity

Question #11 - Topic 1

Which of the following web-resource element descriptions will be used if you want to
restrict all URL's in the application and perform authentication for the http delete method?

A. <security-constraint> <web-resource-collection> <web-resource-name>AccountServlet</web-resource-name> <url-pattern>/*</url-pattern> <method-name>GET</method-name> <method-name>DELETE</method-name> </web-resource-collection> <auth-constraint> <role-name>Manager</role-name> </auth-constraint> </security-constraint>

B. <security-constraint> <web-resource-collection> <url-pattern>*</url-pattern> <method-name>GET</method-name> <method-name>DELETE</method-name> </web-resource-collection> <auth-constraint> <role-name>Manager</role-name> </auth-constraint> </security-constraint>

C. <security-constraint> <web-resource-collection> <web-resource-name>AccountServlet</web-resource-name> <url-pattern>/*</url-pattern> <http-method>GET</http-method> <http-method>DELETE</http-method> </web-resource-collection> <auth-constraint> <role-name>Manager</role-name> </auth-constraint> </security-constraint>

D. <security-constraint> <web-resource-collection> <web-resource-name>AccountServlet</web-resource-name> <url-pattern>*</url-pattern> <http-method>GET</http-method> <http-method>DELETE</http-method> </web-resource-collection> <auth-constraint> <role-name>Manager</role-name> </auth-constraint> </security-constraint>

Question #12 - Topic 1

What will be the output of the following program?
class Stringtest
public static void main(String args[])
String s= "test";
s.concat("paper");
System.out.println(s);

A. It will display test.

B. It will display testpaper.

C. It will generate a compile-time error.

D. It will display paper.

Question #13 - Topic 1

Which of the following statements is true about the Java synchronized keyword?

A. It prevents multiple threads from accessing a block of code at the same time.

B. It allows the class to be loaded as soon as the JRE starts.

C. It prevents multiple developers from code redundancy.

D. It allows two different functions to execute in a shared manner.

Question #14 - Topic 1

Which of the following statements are true?
Each correct answer represents a complete solution. Choose all that apply.

A. An inner class cannot be defined as private.

B. An inner class cannot be defined as protected.

C. An inner class can be defined as private.

D. An inner class can extend another class.

Question #15 - Topic 1

Mark works as an Application Developer for XYZ Solutions Inc. He writes the following
code.
public class TestDemo{public static void main(String[] args){
{try{int x =0;int d= 5/x;}catch(Exception ex){System.out.println("Exception");}
catch(ArithmeticException ae){System.out.println("Arithmetic Exception");}}}
What is the result when Mark tries to compile and execute the code?

A. Exception

B. An exception is thrown at runtime.

C. Compilation fails.

D. Arithmetic Exception

×