Pass4itsure > GIAC > GIAC Information Security > GSSP-JAVA > GSSP-JAVA Online Practice Questions and Answers

GSSP-JAVA Online Practice Questions and Answers

Questions 4

You work as a Software Developer for UcTech Inc. You want to use form-based authentication as a

security mechanism in your application. Which of the following entries will you use in your login page to

accomplish the task?

Each correct answer represents a part of the solution. Choose all that apply.

A. j_pw

B. j_security_check

C. password

D. _jid

E. j_username

F. j_password

G. jid

H. j_un

Buy Now
Questions 5

Mark works as a Programmer for InfoTech Inc. He develops a program that defines a class named

Inventory that has an instance variable named NumOfItems. Which of the following properties will be

applied by NumOfItems?

Each correct answer represents a complete solution. Choose all that apply.

A. It will not be visible in Static methods if it passed as a parameter.

B. It will be visible in Static methods if it passed as a parameter.

C. It will be available for all the instance methods of the class.

D. It becomes available for garbage collection if it is no longer in scope.

Buy Now
Questions 6

Which of the following statements about serialization are true? Each correct answer represents a complete solution. Choose all that apply.

A. Transient variables cannot be serialized.

B. Externalizable is a marker interface and does not define any method.

C. Serializable is a marker interface and does not define any method.

D. Static variables cannot be serialized.

Buy Now
Questions 7

Mark works as a Programmer for InfoTech Inc. He develops the following code snippet. class Auto {public

static void main(String args[])

{Character iob ='d';float i=iob;System.out.println(iob);}} What will be the result when Mark tries to execute

the code snippet?

A. It will display d.

B. It will show a runtime error.

C. It will show a compile-time error.

D. It will display 0.00.

Buy Now
Questions 8

Mark works as a Programmer for InfoTech Inc. He develops an application named AccountServlet. He

wants to ensure that no body can access his application, i.e., he does not want any role to have access on

his application. He defines the following security constraint for his application.

AccountServlet

/acme/Account

GET

PUT

//code

Which of the following options will be used to secure his application?

A.

B. Skip the element in the security constraint code.

C. *

D. NONE

Buy Now
Questions 9

Which of the following exceptions will be thrown if the commit() method fails?

A. DestroyFailedException

B. NullPointerException

C. LoginException

D. SecurityException

Buy Now
Questions 10

Which of the following elements indicates which users in specified roles are permitted access to a resource collection?

A. auth-constraint

B. user-data-constraint

C. web-resource-collection

D. login-config constraint

Buy Now
Questions 11

Which of the following data type values is returned by the System.in.read() console input function?

A. String

B. Character

C. Float

D. Integer

Buy Now
Questions 12

Which of the following is a mandatory sub-element of the element of the deployment descriptor?

A.

B.

C.

D.

Buy Now
Questions 13

Mark works as a Programmer for InfoTech Inc. He develops a Web application that takes input from users. Which of the following methods can be used by the client and server to validate the users input? Each correct answer represents a complete solution. Choose all that apply.

A. Validation through Servlets on the server side

B. Validation using JavaScript on the client side

C. Validation through Java Applets on the client side

D. Validation through XML on the server side

Buy Now
Exam Code: GSSP-JAVA
Exam Name: GIAC Secure Software Programmer – Java
Last Update: Apr 28, 2024
Questions: 275
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99