[Free] 2017(Sep) CollectDumps Testking GIAC GSSP-Java Dumps with VCE and PDF 81-90

CollectDumps 2017 Sep GIAC Official New Released GSSP-Java
100% Free Download! 100% Pass Guaranteed!
http://www.CollectDumps.com/GSSP-Java.html

GIAC Secure Software Programmer – Java

Question No: 81 – (Topic 1)

Which of the following are valid code samples for creating file permissions? Each correct answer represents a complete solution. Choose all that apply.

  1. FilePermission per = new FilePermission(quot;-quot;, quot;read, executequot;);

  2. FilePermission per = new FilePermission(quot;lt;lt;ALL FILESgt;gt;quot;, quot;readquot;);

  3. FilePermission per = new FilePermission(quot;file1quot;, quot;read, writequot;);

  4. FilePermission per = new FilePermission(quot;/bin/*quot;, quot;executequot;);

  5. FilePermission per = new FilePermission(quot;/tmp/myfilequot;, quot;read, deletequot;);

  6. FilePermission per = new FilePermission(quot;/*quot;, quot;readquot;);

Answer: A,B,C,D,E

Question No: 82 – (Topic 1)

Which of the following code declarations are valid error-page declarations? Each correct answer represents a complete solution. Choose all that apply.

  1. lt;error-pagegt;

    lt;exception-typegt;java.lang.ArithmeticExceptionlt;/exception-typegt;

    lt;error-codegt;304lt;/error-codegt;

    lt;locationgt;NumericalException.jsplt;/locationgt;

    lt;/error-pagegt;

  2. lt;error-pagegt;

    lt;error-codegt;304lt;/error-codegt;

    lt;locationgt;NumericalException.jsplt;/locationgt;

    lt;/error-pagegt;

  3. lt;error-pagegt;

    lt;exception-typegt;304lt;/exception-typegt;

    lt;targetSourcegt;NumericalException.jsplt;/targetSourcegt;

    lt;/error-pagegt;

  4. lt;error-pagegt;

    lt;exception-typegt;java.lang.ArithmeticExceptionlt;/exception-typegt;

    lt;locationgt;NumericalException.jsplt;/locationgt;

    lt;/error-pagegt;

  5. lt;error-pagegt;

lt;exception-typegt;304lt;/exception-typegt;

lt;locationgt;NumericalException.jsplt;/locationgt;

lt;/error-pagegt;

Answer: B,D

Question No: 83 – (Topic 1)

What will be the output of the following code snippet?

class test22

{

public static void main(String args[])

{

String str= new String(quot;Helloquot;); str.insert(3,quot;byequot;); System.out.println(str);

}

}

  1. It will display Hello.

  2. It will display Helbyelo.

  3. It will throw NFE.

  4. It will generate a compile-time error.

Answer: D

Question No: 84 – (Topic 1)

Which of the following authentication flag values will force authentication to continue to proceed down the LoginModule list, irrespective of whether the LoginModule succeeds or fails?

Each correct answer represents a complete solution. Choose all that apply.

  1. Optional

  2. Composite

  3. Requisite

  4. Required

Answer: A,D

Question No: 85 – (Topic 1)

Which of the following is the correct syntax for the JVM garbage collection?

  1. System.out.gc();

  2. System.gc();

  3. System.free();

  4. System.setGarbageCollection();

Answer: B

Question No: 86 – (Topic 1)

Which of the following methods are overridden by the FileInputStream class? Each correct answer represents a complete solution. Choose all that apply.

  1. void reset()

  2. void write(int b)

  3. void flush()

  4. long skip(long numBytes)

Answer: A,D

Question No: 87 – (Topic 1)

Which of the following are valid method signatures of the getInstance() method of the Policy class?

Each correct answer represents a complete solution. Choose all that apply.

  1. getInstance(ProtectionDomain domain)

  2. static Policy getInstance(String type, Policy.Parameters params, Provider provider)

  3. getInstance(String type, Policy.Parameters params)

  4. static Policy getInstance(String type, Policy.Parameters params, String provider)

Answer: B,C,D

Question No: 88 – (Topic 1)

You work as a Software Developer for Relix Inc. You have written the following code. class Test {protected void show(){}}

Now you want to override the method show() in the subclass of Test. Which of the following access

specifiers can you use to override this method?

Each correct answer represents a complete solution. Choose two.

  1. protected

  2. default (no access specifier)

  3. private

  4. public

Answer: A,D

Question No: 89 – (Topic 1)

Which of the following web-resource element descriptions will be used if you want to restrict all URL#39;s in the application and perform authentication for the http delete method?

  1. lt;security-constraintgt;

    lt;web-resource-collectiongt;

    lt;web-resource-namegt;AccountServletlt;/web-resource-namegt;

    lt;url-patterngt;/*lt;/url-patterngt;

    lt;method-namegt;GETlt;/method-namegt;

    lt;method-namegt;DELETElt;/method-namegt;

    lt;/web-resource-collectiongt;

    lt;auth-constraintgt;

    lt;role-namegt;Managerlt;/role-namegt;

    lt;/auth-constraintgt;

    lt;/security-constraintgt;

  2. lt;security-constraintgt;

    lt;web-resource-collectiongt;

    lt;url-patterngt;*lt;/url-patterngt;

    lt;method-namegt;GETlt;/method-namegt;

    lt;method-namegt;DELETElt;/method-namegt;

    lt;/web-resource-collectiongt;

    lt;auth-constraintgt;

    lt;role-namegt;Managerlt;/role-namegt;

    lt;/auth-constraintgt;

    lt;/security-constraintgt;

  3. lt;security-constraintgt;

    lt;web-resource-collectiongt;

    lt;web-resource-namegt;AccountServletlt;/web-resource-namegt;

    lt;url-patterngt;/*lt;/url-patterngt;

    lt;http-methodgt;GETlt;/http-methodgt;

    lt;http-methodgt;DELETElt;/http-methodgt;

    lt;/web-resource-collectiongt;

    lt;auth-constraintgt;

    lt;role-namegt;Managerlt;/role-namegt;

    lt;/auth-constraintgt;

    lt;/security-constraintgt;

  4. lt;security-constraintgt;

lt;web-resource-collectiongt;

lt;web-resource-namegt;AccountServletlt;/web-resource-namegt;

lt;url-patterngt;*lt;/url-patterngt;

lt;http-methodgt;GETlt;/http-methodgt;

lt;http-methodgt;DELETElt;/http-methodgt;

lt;/web-resource-collectiongt;

lt;auth-constraintgt;

lt;role-namegt;Managerlt;/role-namegt;

lt;/auth-constraintgt;

lt;/security-constraintgt;

Answer: C

Question No: 90 – (Topic 1)

Which of the following options are available with jar files?

Each correct answer represents a complete solution. Choose all that apply.

  1. M – Deletes an existing manifest file

  2. c – Creates a jar file

  3. o – Overrides an existing jar file

  4. 0 – Stores a file without using zip compression

  5. m – Manipulates or updates an existing jar file

  6. u – Unzips a jar file

  7. M – Creates a manifest file

Answer: A,B,D

100% Free Download!
Download Free Demo:GSSP-Java Demo PDF
100% Pass Guaranteed!
Download 2017 CollectDumps GSSP-Java Full Exam PDF and VCE

CollectDumps ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 CollectDumps IT Certification PDF and VCE