Mark works as a Programmer for InfoTech Inc. He develops a session bean class named
accountService. Which of the following rules must be conformed by the session bean class?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Programmer for InfoTech Inc. You develop two html pages named authenticate.jsp and error.jsp, which are deployed directly at the root of the Web application named Authentication. Which of the following deployment descriptor code declarations will be used to ensure that the error.jsp page will be displayed automatically if the client is not authenticated?
You work as a Software Developer for Relix Inc. You have written the following code. class Test {protected void show(){}}
Now you want to override the method show() in the subclass of Test. Which of the following access
specifiers can you use to override this method?
Each correct answer represents a complete solution. Choose two.
Which of the following are advantages of client-side JavaScript?
Each correct answer represents a complete solution. Choose two.
Which of the following rules must be followed while determining a class loader?
Each correct answer represents a complete solution. Choose all that apply.
Mark works as an Application Developer for XYZ Solutions Inc. He writes the following code.
public class TestDemo{public static void main(String[] args){
{try{int x =0;int d= 5/x;}catch(Exception ex){System.out.println("Exception");}
catch(ArithmeticException ae){System.out.println("Arithmetic Exception");}}}
What is the result when Mark tries to compile and execute the code?
Which of the following statements about the <auth-constraint> element are true?
Each correct answer represents a complete solution. Choose all that apply.
Mark works as a Programmer for InfoTech Inc. He develops a class named Data that imports all the required packages. The class Data uses a method named PrintData(), which uses a method that checks whether the caller has a BeanUser security role. Which of the following code of the method PrintData() will satisfy the requirement?
Mark works as a Programmer for InfoTech Inc. He develops the following deployment descriptor code.
<web-app . . . .>
...
<security-role-ref >
</security-role-ref>
<security-role>
</security-role>
<security-role>
</security-role>
<security-role>
</security-role>
</web-app>
Which of the following is a valid isUserInRole() method call that can be made if request is the
HttpServletRequest request?
Which of the following <security-constraint> sub-elements specifies which users in specified roles are permitted access to a resource collection?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
GIAC Free Exams |
---|
![]() |