[Free] 2017(Sep) CollectDumps Testking GIAC GSSP-Java Dumps with VCE and PDF 41-50

CollectDumps 2017 Sep GIAC Official New Released GSSP-Java
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSSP-Java.html

GIAC Secure Software Programmer – Java

Question No: 41 – (Topic 1)

Which of the following is used to restore the objects that have been previously serialized by a stream?

  1. FileInputStream

  2. ObjectOutputStream

  3. ObjectInputStream

  4. FileOutputStream

Answer: C

Question No: 42 – (Topic 1)

You work as a Software Developer for UcTech Inc. You build an online book shop, so that users can purchase books using their credit cards. You want to ensure that only the administrator can access the credit card information sent by users. Which security mechanism will you use to accomplish the task?

  1. Confidentiality

  2. Authorization

  3. Authentication

  4. Data integrity

Answer: A

Question No: 43 – (Topic 1)

You work as a Programmer for InfoTech Inc and develop the following two

lt;security-constraintgt; declarations.

lt;security-constraintgt;

lt;web-resource-collectiongt;

lt;web-resource-namegt;Managerlt;/web-resource-namegt;

lt;url-patterngt;/acme/Manager/*lt;/url-patterngt;

lt;http-methodgt;GETlt;/http-methodgt;

lt;http-methodgt;POSTlt;/http-methodgt;

lt;/web-resource-collectiongt;

lt;auth-constraint/gt;

lt;/security-constraintgt;

lt;security-constraintgt;

lt;web-resource-collectiongt;

lt;web-resource-namegt;Managerlt;/web-resource-namegt;

lt;url-patterngt;/acme/Manager/*lt;/url-patterngt;

lt;http-methodgt;GETlt;/http-methodgt;

lt;http-methodgt;POSTlt;/http-methodgt;

lt;/web-resource-collectiongt;

lt;auth-constraintgt;

lt;role-namegt;Managerlt;/role-namegt;

lt;/auth-constraintgt;

lt;/security-constraintgt;

Which of the following statements is true about the lt;auth-constraintgt; in the code given above?

  1. Nobody is allowed to access the specified resources.

  2. Only Manager is allowed to access the specified resources.

  3. The first lt;security-constraintgt; element declaration is incorrect.

  4. It is not possible to define the multiple security constraint on a single resource.

Answer: A

Question No: 44 – (Topic 1)

Mark works as a Programmer for InfoTech Inc. He develops a Java application that uses the encryption and compression techniques. Which of the following interfaces will he use to control the serialization and deserialization processes?

  1. Flushable

  2. Closeable

  3. Serializable

  4. Externalizable

Answer: D

Question No: 45 – (Topic 1)

Which of the following methods is used to encrypt or decrypt data in a single step?

  1. wrap()

  2. update()

  3. digest()

  4. doFinal()

Answer: D

Question No: 46 – (Topic 1)

Which of the following methods belongs to the FilterConfig interface and ServletConfig interface both?

Each correct answer represents a complete solution. Choose all that apply.

  1. getInitParameter()

  2. getServletContext()

  3. getFilterName()

  4. getInitParameterNames()

Answer: A,B,D

Question No: 47 – (Topic 1)

You work as a Software Developer for UcTech Inc. You want to use form-based authentication as a security mechanism in your application. Which of the following entries will you use in your login page to accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

  1. j_pw

  2. j_security_check

  3. password

  4. _jid

  5. j_username

  6. j_password

  7. jid

  8. j_un

Answer: B,E,F

Question No: 48 – (Topic 1)

Mark works as a Programmer for InfoTech Inc. He develops a session bean class named

accountService. Which of the following rules must be conformed by the session bean class?

Each correct answer represents a complete solution. Choose all that apply.

  1. It can be used without the @Stateful or @Stateless annotation.

  2. It must implement the business methods defined in the business interface.

  3. It can implement any optional business method annotated by the @Remove annotation.

  4. It must have a public constructor that takes a string as its parameter.

  5. It requires helper classes to meet the needs of an application.

Answer: B,C,E

Question No: 49 – (Topic 1)

Which of the following methods performs the authentication of subject and, if successful, associates Principals and Credentials with the authenticated Subject?

  1. The getSubject() method of the LoginContext class

  2. The login() method of the LoginModule interface

  3. The login() method of the LoginContext class

  4. The initialize() method of the LoginModule class

Answer: C

Question No: 50 – (Topic 1)

What will be the output of the following program?

class Stringtest

{

public static void main(String args[])

{

String s= quot;testquot;; s.concat(quot;paperquot;); System.out.println(s);

}

}

  1. It will display test.

  2. It will display testpaper.

  3. It will generate a compile-time error.

  4. It will display paper.

Answer: A

100% Free Download!
Download Free Demo:GSSP-Java Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSSP-Java Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE