[Free] 2017(Sep) CollectDumps Testking GIAC GSSP-Java Dumps with VCE and PDF 101-110

CollectDumps 2017 Sep GIAC Official New Released GSSP-Java
100% Free Download! 100% Pass Guaranteed!

GIAC Secure Software Programmer – Java

Question No: 101 – (Topic 2)

Mark works as a Programmer for InfoTech Inc. He develops a program that defines a class named Inventory that has an instance variable named NumOfItems. Which of the following properties will be applied by NumOfItems?

Each correct answer represents a complete solution. Choose all that apply.

  1. It will not be visible in Static methods if it passed as a parameter.

  2. It will be visible in Static methods if it passed as a parameter.

  3. It will be available for all the instance methods of the class.

  4. It becomes available for garbage collection if it is no longer in scope.

Answer: B,C,D

Question No: 102 – (Topic 2)

Which of the following statements are correct about the code given below?




lt;descriptiongt;This is an Account Servlet.lt;/descriptiongt;








Each correct answer represents a complete solution. Choose all that apply.

  1. The delete http method is not allowed in the http-method element declaration.

  2. If no http-method is specified in the web-resource-collection element, the security restriction will be applied to all http methods.

  3. There should be at-least one url-pattern element otherwise, the lt;web-resource- collectiongt; will be ignored.

  4. It is necessary that the web-resource-name must be specified in the web-resource- collection element.

  5. It is not possible to define more than two http method in the web-resource-collection element.

  6. It is necessary that the web-resource-name must be specified in the url of the url-pattern element.

Answer: B,C,D

Question No: 103 – (Topic 2)

You work as programmer for PassGuide.Inc. You have purchased a Web application named

SecureProgrammer that uses the programmatic authorization, and the security roles that are not used in your organization. Which of the following deployment descriptor elements must you use so that the SecureProgrammer application can work with your organization?

  1. lt;security-role-refgt;

  2. lt;security-rolegt;

  3. lt;security-constraintgt;

  4. lt;login-configgt;

Answer: A

Question No: 104 – (Topic 2)

You have the following code fragment of a Java program named test.

  1. public void getData(){

  2. ArrayList numbers=new ArrayList(); 14. for(int i=0; ilt;10;1 ){

  1. int value=i*((int i) Math.random());

  2. Integer obj=new Integer(value);

  3. numbers.add(obj);

18. }

19. System.out.println(numbers);

20. }

On which of the following lines of code will the object referenced by obj be eligible for garbage


  1. Line 18

  2. Line 19

  3. Line 17

  4. Line 20

Answer: D

Question No: 105 – (Topic 2)

Which of the following init() method calls initializes a cipher object with a key in the SECRET_MODE?

  1. cipher.init(2, key);

  2. cipher.init(1, key);

  3. cipher.init(3, key);

  4. cipher.init(4, key);

Answer: C

Question No: 106 – (Topic 2)

Peter works as a Software Developer for Neon Inc. He is developing an application in Java. He declares an interface. Which of the following field declarations are valid within the body of an interface?

Each correct answer represents a complete solution. Choose three.

  1. final static int answer=42;

  2. public static int answer = 42;

  3. private final static int answer=42;

  4. public int answer=42;

  5. int answer;

Answer: A,B,D

Question No: 107 – (Topic 2)

Given the following directory structure.

Collectdumps 2017 PDF and VCE

Assuming that the current directory is com, which of the below options can be used to create a jar file called TestJar.jar that contains all the files from the directory testApp?

  1. jar -zf TestJar.jar

  2. jar -cf TestJar.jar

  3. jar -tf TestJar.jar

  4. jar -cf TestJar.jar testApp

Answer: D

Question No: 108 – (Topic 2)

Which of the following elements contains the lt;filtergt; element in the deployment descriptor?

  1. lt;servletgt;

  2. lt;filtersgt;

  3. lt;web-appgt;

  4. lt;filter-mappinggt;

  5. lt;servlet-mappinggt;

Answer: C

Question No: 109 – (Topic 2)

Which of the following classes is an engine class designed to provide conversions between opaque cryptographic keys and allows you to build an opaque key object from a given key specification?

  1. KeyPair

  2. KeyFactory

  3. CertificateFactory

  4. KeyPairGenerator

Answer: B

Question No: 110 – (Topic 2)

The java.util.logging package provides the classes and interfaces of the Java platform#39;s core logging facilities. Which of the following are the main target uses of logs?

Each correct answer represents a complete solution. Choose all that apply.

  1. Problem diagnosis by field service engineers

  2. Problem diagnosis by the development organization

  3. Problem diagnosis by end users and system administrators

  4. Problem diagnosis by developers

Answer: A,B,C,D

100% Free Download!
Download Free Demo:GSSP-Java Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSSP-Java Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE