[Free] 2017(Sep) CollectDumps Testking GIAC GSSP-Java Dumps with VCE and PDF 31-40

CollectDumps 2017 Sep GIAC Official New Released GSSP-Java
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSSP-Java.html

GIAC Secure Software Programmer – Java

Question No: 31 – (Topic 1)

Which of the following fields must be present in the login page when using the form-based authentication?

Each correct answer represents a part of the solution. Choose two.

  1. j_login

  2. j_password

  3. get_pw

  4. j_pw

  5. j_username

  6. user_pw

Answer: B,E

Question No: 32 – (Topic 1)

Mark works as a Programmer for InfoTech Inc. He wants to define the security constraint for an application that allows users with the role of Manager access to the POST method of all resources with

the URL pattern /acme/Manager/*, and also allow users with the role of Editor access to the POST method of all resources with the URL pattern /acme/Editor/*. Which of the following code will be used to declare the security element?

  1. lt;security-constraintgt;

    lt;web-resource-collectiongt;

    lt;web-resource-namegt;Managerlt;/web-resource-namegt;

    lt;url-patterngt;/acme/Manager/*lt;/url-patterngt;

    lt;http-methodgt;GETlt;/http-methodgt;

    lt;http-methodgt;POSTlt;/http-methodgt;

    lt;/web-resource-collectiongt;

    lt;auth-constraintgt;

    lt;role-namegt;Managerlt;/role-namegt;

    lt;/auth-constraintgt;

    lt;/security-constraintgt;

    lt;security-constraintgt;

    lt;web-resource-collectiongt;

    lt;web-resource-namegt;Editorlt;/web-resource-namegt;

    lt;url-patterngt;/acme/Editor/*lt;/url-patterngt;

    lt;http-methodgt;GETlt;/http-methodgt;

    lt;http-methodgt;POSTlt;/http-methodgt;

    lt;/web-resource-collectiongt;

    lt;auth-constraintgt;

    lt;role-namegt;Editorlt;/role-namegt;

    lt;/auth-constraintgt;

    lt;/security-constraintgt;

  2. lt;security-constraintgt;

    lt;web-resource-collectiongt;

    lt;web-resource-namegt;Managerlt;/web-resource-namegt;

    lt;url-patterngt;/acme/Manager/*lt;/url-patterngt;

    lt;http-methodgt;GETlt;/http-methodgt;

    lt;http-methodgt;POSTlt;/http-methodgt;

    lt;/web-resource-collectiongt;

    lt;auth-constraintgt;

    lt;role-namegt;Managerlt;/role-namegt;

    lt;/auth-constraintgt;

    lt;http-methodgt;GETlt;/http-methodgt;

    lt;http-methodgt;POSTlt;/http-methodgt;

    lt;/web-resource-collectiongt;

    lt;auth-constraintgt;

    lt;role-namegt;Editorlt;/role-namegt;

    lt;/auth-constraintgt;

    lt;/security-constraintgt;

  3. lt;security-constraintgt;

    lt;web-resource-collectiongt;

    lt;web-resource-namegt;Managerlt;/web-resource-namegt;

    lt;url-patterngt;/acme/Manager/*lt;/url-patterngt;

    lt;http-methodgt;GETlt;/http-methodgt;

    lt;http-methodgt;POSTlt;/http-methodgt;

    lt;/web-resource-collectiongt;

    lt;auth-constraintgt;

    lt;role-namegt;Managerlt;/role-namegt;

    lt;/auth-constraintgt;

    lt;auth-constraintgt;

    lt;role-namegt;Editorlt;/role-namegt;

    lt;/auth-constraintgt;

    lt;/security-constraintgt;

  4. lt;security-constraintgt;

lt;web-resource-collectiongt;

lt;web-resource-namegt;Managerlt;/web-resource-namegt;

lt;url-patterngt;/acme/Manager/*lt;/url-patterngt;

lt;http-methodgt;GETlt;/http-methodgt;

lt;http-methodgt;POSTlt;/http-methodgt;

lt;/web-resource-collectiongt;

lt;web-resource-collectiongt;

lt;web-resource-namegt;Editorlt;/web-resource-namegt;

lt;url-patterngt;/acme/Editor/*lt;/url-patterngt;

lt;http-methodgt;GETlt;/http-methodgt;

lt;http-methodgt;POSTlt;/http-methodgt;

lt;/web-resource-collectiongt;

lt;auth-constraintgt;

lt;role-namegt;Managerlt;/role-namegt;

lt;/auth-constraintgt;

lt;/security-constraintgt;

Answer: A

Question No: 33 – (Topic 1)

Which of the following lt;security-constraintgt; sub-elements specifies which users in specified roles are permitted access to a resource collection?

  1. lt;user-data-constraintgt;

  2. lt;web-resource-collectiongt;

  3. lt;url-patterngt;

  4. lt;auth-constraintgt;

Answer: D

Question No: 34 – (Topic 1)

In which of the following directories will files be searched when the classpath is specified by the syntax below.-classpath uc\JavaFiles\NewFiles;uc\ServletFiles;.;

  1. The current directory, the NewFiles directory, and the ServletFiles directory

  2. The current directory, the uc directory, the NewFiles directory, and the ServletFiles directory

  3. The current directory, the uc directory, the JavaFiles directory, the NewFiles directory, and the ServletFiles directory

  4. The uc directory, the JavaFiles directory, the NewFiles directory, and the ServletFiles directory

Answer: A

Question No: 35 – (Topic 1)

Which of the following is the appropriate deployment descriptor elements entry for the code given below?

@RunAs(quot;adminquot;)

@Stateless public class StudentBean implements Student {

//more code …

}

  1. lt;enterprise-beansgt;

    lt;sessiongt;

    .

    lt;ejb-namegt;Studentlt;/ejb-namegt;

    lt;security-identitygt;

    lt;run-asgt;

    lt;method-permissiongt;adminlt;/method-permissiongt;

    lt;/run-asgt;

    lt;/security-identitygt;

    lt;/sessiongt;

    ..

    lt;/enterprise-beansgt;

  2. lt;enterprise-beansgt;

    lt;sessiongt;

    .

    lt;ejb-namegt;Studentlt;/ejb-namegt;

    lt;security-identitygt;

    lt;run-asgt;

    lt;role-namegt;adminlt;/role-namegt;

    lt;/run-asgt;

    lt;/security-identitygt;

    lt;/sessiongt;

    ..

    lt;/enterprise-beansgt;

  3. lt;enterprise-beansgt;

    lt;sessiongt;

    .

    lt;ejb-namegt;Studentlt;/ejb-namegt;

    lt;security-identitygt;

    lt;run-asgt;

    lt; security-role-refgt;adminlt;/ security-role-refgt;

    lt;/run-asgt;

    lt;/security-identitygt;

    lt;/sessiongt;

    ..

    lt;/enterprise-beansgt;

  4. lt;enterprise-beansgt;

lt;sessiongt;

.

lt;ejb-namegt;Studentlt;/ejb-namegt;

lt;security-identitygt;

lt;run-asgt;adminlt;/run-asgt;

lt;/security-identitygt;

lt;/sessiongt;

..

lt;/enterprise-beansgt;

Answer: B

Question No: 36 – (Topic 1)

Which of the following methods is used to request that any pending finalizers be run for objects eligible for garbage collection?

  1. freeMemory()

  2. gc()

  3. runFinalization()

  4. runFinalizers()

    Answer: C

    Question No: 37 – (Topic 1)

    Martin works as a Programmer in Data Net Inc. He writes the following code.

    1. class Ques0191{

    2. public static void main(String[] argv){

    3. byte a = 1;

    4. switch(a 1){

    5. case 1.

    6. System.out.println(quot;Onequot;);

    7. case 2.

    8. System.out.println(quot;2quot;);

    9. case 2.

    10. System.out.println(quot;Twoquot;); break;

11. }

12. }

13. }

What will happen when Martin attempts to compile and execute the code?

  1. The code will compile successfully, but a runtime error will occur because of the duplicate case label at line number 9.

  2. The code will not compile because of the duplicate case label at line number 9.

  3. The code will compile successfully and will execute displaying 2 followed by Two.

  4. The code will not compile because an argument to the switch must be a constant.

Answer: B

Question No: 38 – (Topic 1)

You work as a Software Developer for UcTech Inc. You want to declare a security constraint in the deployment descriptor using the lt;transport-guaranteegt; element. Which of the following can be the possible values for the element?

Each correct answer represents a complete solution. Choose all that apply.

  1. CONFIDENTIAL

  2. ALL

  3. NONE

  4. INTEGRAL

Answer: A,C,D

Question No: 39 – (Topic 1)

Which of the following methods must be implemented by each subclass of the Permission class to compare permissions?

  1. hashcode

  2. implies

  3. newPermissionCollection

  4. equals

Answer: B

Question No: 40 – (Topic 1)

You work as a Software Developer for UcTech Inc. You want to write a filter that will implement the Filter interface. Which of the following methods will you use to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

  1. doPostFilter()

  2. doGetFilter()

  3. doFilter()

  4. init()

  5. service()

Answer: C,D

100% Free Download!
Download Free Demo:GSSP-Java Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSSP-Java Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE