[Free] 2017(Sep) EnsurePass Pass4sure GIAC GSSP-Java Dumps with VCE and PDF 1-10

EnsurePass
2017 Sep GIAC Official New Released GSSP-Java
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSSP-Java.html

GIAC Secure Software Programmer – Java

Question No: 1 – (Topic 1)

Which of the following elements are the subelements of the mime-mapping element in a deployment descriptor file?

Each correct answer represents a complete solution. Choose all that apply.

  1. exception-type

  2. error-code

  3. extension

  4. mime-type

  5. servlet-class

Answer: C,D

Question No: 2 – (Topic 1)

John works as a Software Developer for VenTech Inc. He writes the following code using Java.

public class vClass extends Thread

{

public static void main(String args[])

{

vClass vc=new vClass(); vc.run();

}

public void start()

{

for(int k=0;klt;20;k )

{

System.out.println(quot;The value of k = quot; k);

}

}

}

What will happen when he attempts to compile and execute the application?

  1. The application will compile successfully and the values from 0 to 19 will be displayed as the output.

  2. A compile-time error will occur indicating that no run() method is defined for the Thread class.

  3. A runtime error will occur indicating that no run() method is defined for the Thread class.

  4. The application will compile successfully but will not display anything as the output.

Answer: D

Question No: 3 – (Topic 1)

Which of the following classes is an engine class that provides an opaque representation of cryptographic parameters?

  1. DSAPublicKeySpec

  2. AlgorithmParameterGenerator

  3. DSAParameterSpec

  4. AlgorithmParameters

Answer: D

Question No: 4 – (Topic 1)

Which of the following statements about programmatic security are true? Each correct answer represents a complete solution. Choose all that apply.

  1. The bean provider is responsible for writing code for programmatic security.

  2. It is also called as instance level security.

  3. It is implemented using methods of the EJBContext interface.

  4. It is implemented using the methods of the UserTransaction interface.

Answer: A,B,C

Question No: 5 – (Topic 1)

Which of the following functions are performed by methods of the HttpSessionActivationListener interface?

Each correct answer represents a complete solution. Choose all that apply.

  1. Notifying the object when it is bound to a session.

  2. Notifying an attribute that a session has just migrated from one JVM to another.

  3. Notifying the object when it is unbound from a session.

  4. Notifying an attribute that a session is about to migrate from one JVM to another.

Answer: B,D

Question No: 6 – (Topic 1)

Mark works as a Programmer for InfoTech Inc. He develops the following deployment descriptor code.

lt;web-app . . . .gt;

lt;display-namegt;A Secure Applicationlt;/display-namegt;lt;servletgt;

lt;security-role-ref gt;

lt;role-namegt;Managerlt;/role-namegt;

lt;role-linkgt;Adminlt;/role-linkgt;

lt;/security-role-refgt;

lt;/servletgt;

lt;security-rolegt;

lt;role-namegt;Programmerlt;/role-namegt;

lt;/security-rolegt;

lt;security-rolegt;

lt;role-namegt;Adminlt;/role-namegt;

lt;/security-rolegt;

lt;security-rolegt;

lt;role-namegt;Employeelt;/role-namegt;

lt;/security-rolegt;

lt;/web-appgt;

Which of the following is a valid isUserInRole() method call that can be made if request is the

HttpServletRequest request?

  1. request.isUserInRole(quot;Programmerquot;);

  2. request.isUserInRole(quot;Managerquot;);

  3. request.isUserInRole(quot;Adminquot;);

  4. request.isUserInRole(quot;Employeequot;);

Answer: B

Question No: 7 – (Topic 1)

Which of the following methods of the EJBContext interface can be called by both the BMT and CMT beans?

Each correct answer represents a complete solution. Choose all that apply.

  1. getCallerPrincipal()

  2. getRollbackOnly()

  3. getUserTransaction()

  4. isCallerInRole()

Answer: A,D

Question No: 8 – (Topic 1)

Mark works as a Programmer for InfoTech Inc. He develops a deployment descriptor code that contains three valid

lt;security-constraintgt; elements.

All of them constraining a Web resource Res1, the

lt;auth-constraintgt; sub-element of the lt;security-constraintgt; elements are as follows.

lt;auth-constraintgt;Adminlt;/auth-constraintgt;

lt;auth-constraintgt;Managerlt;/auth-constraintgt;

lt;auth-constraint/gt;

Which of the following can access the resource Res1?

  1. Only Manager can access the resource.

  2. No one can access the resource.

  3. Everyone can access the resource.

  4. Only Admin can access the resource.

Answer: B

Question No: 9 – (Topic 1)

Which of the following statements correctly describe the features of the singleton pattern? Each correct answer represents a complete solution. Choose all that apply.

  1. Singletons are used to control object creation by limiting the number to one but allowing the flexibility to create more objects if the situation changes.

  2. Singletons can only be stateless, providing utility functions that need no more information than their parameters.

  3. A singleton class may disappear if no object holds a reference to the Singleton object, and it will be reloaded later when the singleton is needed again.

  4. The behavior of a singleton can be obtained by static fields and methods such as java.lang.Math.sin(double).

Answer: A,C,D

Question No: 10 – (Topic 1)

Which of the following deployment descriptor elements must contain the lt;transport- guaranteegt; element as its mandatory sub-element?

  1. lt;user-data-constraintgt;

  2. lt;web-resource-collectiongt;

  3. lt;auth-constraintgt;

  4. lt;login-configgt;

    Answer: A

    100% Free Download!
    Download Free Demo:GSSP-Java Demo PDF
    100% Pass Guaranteed!
    Download 2017 EnsurePass GSSP-Java Full Exam PDF and VCE

    EnsurePass ExamCollection Testking
    Lowest Price Guarantee Yes No No
    Up-to-Dated Yes No No
    Real Questions Yes No No
    Explanation Yes No No
    PDF VCE Yes No No
    Free VCE Simulator Yes No No
    Instant Download Yes No No

    2017 EnsurePass IT Certification PDF and VCE