Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the GIAC Certification GSSP-Java Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam GSSP-Java Premium Access

View all detail and faqs for the GSSP-Java exam


394 Students Passed

87% Average Score

98% Same Questions
Viewing page 1 out of 9 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following statements about programmatic security are true?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

The bean provider is responsible for writing code for programmatic security.

B.

It is also called as instance level security.

C.

It is implemented using methods of the EJBContext interface.

D.

It is implemented using the methods of the UserTransaction interface.

Questions # 2:

Which of the following methods can be invoked from the ejbStore() method of an entity bean class?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

getPrimaryKey()

B.

getUserTransaction()

C.

getRollbackOnly()

D.

isCallerInRole()

E.

getEJBObject()

Questions # 3:

You write the following code.

class Father {public void Method() {System.out.println("I am Father");}}

public class Son extends Father {public static void main(String argv[]) {Son son = new Son();son.Method();}

private void Method() {System.out.println("I am Son");}}

Which of the following will be the result, when you try to compile and run the code?

Options:

A.

I am Father will be displayed as the output.

B.

A runtime error will result.

C.

I am Son will be displayed as the output.

D.

The code will execute but without displaying any output.

E.

A compile-time error will result.

Questions # 4:

In which of the following cases is the GET method used to retrieve information?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Using a hyperlink inside a Web page.

B.

Using a form with no method definition.

C.

Adding the request parameter to the URL.

D.

Requesting to retrieve a large amount of data.

Questions # 5:

Which of the following are valid method signatures of the getInstance() method of the Policy class?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

getInstance(ProtectionDomain domain)

B.

static Policy getInstance(String type, Policy.Parameters params, Provider provider)

C.

getInstance(String type, Policy.Parameters params)

D.

static Policy getInstance(String type, Policy.Parameters params, String provider)

Questions # 6:

Which of the following are valid thread state transitions?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

From running to ready.

B.

From ready to waiting.

C.

From running to waiting.

D.

From waiting to ready.

E.

From ready to running.

F.

From waiting to running.

Questions # 7:

You work as a Software Developer for UcTech Inc. You build an online book shop, so that users can purchase books using their credit cards. You want to ensure that only the administrator can access the credit card information sent by users. Which security mechanism will you use to accomplish the task?

Options:

A.

Confidentiality

B.

Authorization

C.

Authentication

D.

Data integrity

Questions # 8:

Which of the following methods of the HttpServletResponse interface is used for URL rewriting?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

encodeURL

B.

encodeRedirectURL

C.

sendRedirect

D.

getRequestURL()

Questions # 9:

Which of the following functions are performed by methods of the

HttpSessionActivationListener interface?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Notifying the object when it is bound to a session.

B.

Notifying an attribute that a session has just migrated from one JVM to another.

C.

Notifying the object when it is unbound from a session.

D.

Notifying an attribute that a session is about to migrate from one JVM to another.

Questions # 10:

Which of the following methods is used to encrypt or decrypt data in a single step?

Options:

A.

wrap()

B.

update()

C.

digest()

D.

doFinal()

Viewing page 1 out of 9 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.