[Free] 2017(Sep) EnsurePass Pass4sure GIAC GSSP-Java Dumps with VCE and PDF 121-130

EnsurePass
2017 Sep GIAC Official New Released GSSP-Java
100% Free Download! 100% Pass Guaranteed!
http://www.EnsurePass.com/GSSP-Java.html

GIAC Secure Software Programmer – Java

Question No: 121 – (Topic 2)

You work as a Software Developer for TechnoZen Inc. You create an application using Java. You define a method, named myMethod. You also define a class, named myClass, within myMethod.

Which of the following rules governs the access to the variables of the enclosing method?

  1. myClass can access only final variables.

  2. myClass can access only static variables.

  3. myClass can access only transient variables.

  4. myClass can access any variable.

Answer: A

Question No: 122 – (Topic 2)

Which of the following methods of the HttpSession interface can be called upon an invalidated session without throwing the IllegalStateException?

  1. getAttribute()

  2. getServletContext()

  3. getAttributesNames()

  4. invalidate()

  5. getLastAccessedTime()

Answer: B

Question No: 123 – (Topic 2)

Which of the following methods specifies which LoginModules should be used for a particular application, and in what order the LoginModules should be invoked?

  1. getLogger

  2. getConfiguration

  3. getResourceBundle

  4. getAppConfigurationEntry

    Answer: B

    Question No: 124 – (Topic 2)

    Peter works as a Programmer in Magi Net Inc. He writes the following code.

    1. class Ques0190{

    2. public static void main(String[] argv){

    3. byte a = 100;

    4. switch(a){

    5. case 10.

    6. System.out.println(quot;tenquot;);

    7. case 100.

    8. System.out.println(quot;hundredquot;); 9. case 1000.

10. System.out.println(quot;thousandquot;);

11. }

12. }

13. }

What will happen when Peter attempts to compile and execute the code?

  1. The code will compile and execute displaying hundred.

  2. The code will not compile because 1000 is not assignment compatible with a byte data type.

  3. The code will not compile because the argument to the switch cannot be a primitive type byte value.

  4. The code will compile and execute displaying hundred followed by thousand.

Answer: B

Question No: 125 – (Topic 2)

Which of the following statements about the form-based authentication are true? Each correct answer represents a complete solution. Choose two.

  1. It provides a weaker security check than the HTTP Digest and HTTPS Client authentications.

  2. It requires a hidden field that supplies the login-constraint used by the application.

  3. It requires that the action of the login form must be j_security_check.

  4. It transmits username and password over the network in the form of Base64 encoding.

Answer: A,C

Question No: 126 – (Topic 2)

Which of the following classes implements the java.lang.Cloneable and java.lang.Runnable interfaces correctly?

  1. public class DemoThread implements Runnable, Cloneable { public void run() { /* some code here */ }

    protected boolean clone() throws CloneNotSupportedException { /* some code here */ }

    . . . .

    }

  2. public class PrintData implements Runnable, Cloneable { public void run() { /* some code here */ }

    protected Object clone() throws CloneNotSupportedException { /* some code here */ }

    . . . .

    }

  3. public class CloneCheck implements Runnable, Cloneable { public int run() { /* some code here */ }

    public Object clone() throws CloneNotSupportedException { /* some code here */ }

    . . . .

    }

  4. public class Demo implements Runnable, Cloneable { public void run() { /* some code here */ }

. . . .

}

Answer: B

Question No: 127 – (Topic 2)

Which of the following methods are used to customize object serialization so that the objects will be able to apply default serialization?

Each correct answer represents a complete solution. Choose two.

  1. readObject()

  2. setDefault()

  3. writeObject()

  4. getDefault()

Answer: A,C

Question No: 128 – (Topic 2)

Which of the following statements about the lt;web-resource-collectiongt; element are true? Each correct answer represents a complete solution. Choose all that apply.

  1. It can have at the most one lt;url-patterngt; sub-element.

  2. It has lt;web-resource-namegt; as one of its sub-elements.

  3. If there is no lt;http-methodgt; sub-element, no HTTP method will be constrained.

  4. It is a sub-element of the lt;security-constraintgt; element.

    Answer: B,D

    Question No: 129 – (Topic 2)

    Wilbert works as a Software Developer for Wintos Inc. He writes the following code.

    1. public class tcf 2. {

3. public static void main(String[] args) 4. {

5. try 6. {

7. int x = 5 / 0;

8. System.exit(0); 9. }

10. catch(ArithmeticException e)

11. {

12. System.out.println(quot;Within catchquot;);

13. }

14. finally

15. {

16. System.out.println(quot;Within finallyquot;);

17. }

18. }

19. }

What will happen when he tries to compile and execute the code?

  1. It will compile and print Within catch as the output.

  2. It will compile and execute successfully but will not print anything.

  3. It will compile and print Within catch and Within finally as the output.

  4. It will compile and print Within finally as the output.

Answer: C

Question No: 130 – (Topic 2)

Which of the following, in JDBC 2.0, are the sub interfaces of the Statement interface? Each correct answer represents a complete solution. Choose two.

  1. ParsedStatement

  2. CompiledStatement

  3. PreparedStatement

  4. CallableStatemen

Answer: C,D

100% Free Download!
Download Free Demo:GSSP-Java Demo PDF
100% Pass Guaranteed!
Download 2017 EnsurePass GSSP-Java Full Exam PDF and VCE

EnsurePass ExamCollection Testking
Lowest Price Guarantee Yes No No
Up-to-Dated Yes No No
Real Questions Yes No No
Explanation Yes No No
PDF VCE Yes No No
Free VCE Simulator Yes No No
Instant Download Yes No No

2017 EnsurePass IT Certification PDF and VCE