GIAC GSSP-Java - GIAC Secure Software Programmer – Java Exam
Page: 1 / 55
Total 275 questions
Question #1 (Topic: Topic 1)
Which of the following elements are the subelements of the mime-mapping element in a
deployment descriptor file?
Each correct answer represents a complete solution. Choose all that apply.
deployment descriptor file?
Each correct answer represents a complete solution. Choose all that apply.
A. exception-type
B. error-code
C. extension
D. mime-type
E. servlet-class
Answer: C,D
Question #2 (Topic: Topic 1)
John works as a Software Developer for VenTech Inc. He writes the following code using
Java.
public class vClass extends Thread
public static void main(String args[])
vClass vc=new vClass();
vc.run();
public void start()
for(int k=0;k<20;k++)
System.out.println("The value of k = "+k);
What will happen when he attempts to compile and execute the application?
Java.
public class vClass extends Thread
public static void main(String args[])
vClass vc=new vClass();
vc.run();
public void start()
for(int k=0;k<20;k++)
System.out.println("The value of k = "+k);
What will happen when he attempts to compile and execute the application?
A. The application will compile successfully and the values from 0 to 19 will be displayed as the output.
B. A compile-time error will occur indicating that no run() method is defined for the Thread class.
C. A runtime error will occur indicating that no run() method is defined for the Thread class.
D. The application will compile successfully but will not display anything as the output.
Answer: D
Question #3 (Topic: Topic 1)
Which of the following classes is an engine class that provides an opaque representation of
cryptographic parameters?
cryptographic parameters?
A. DSAPublicKeySpec
B. AlgorithmParameterGenerator
C. DSAParameterSpec
D. AlgorithmParameters
Answer: D
Question #4 (Topic: Topic 1)
Which of the following statements about programmatic security are true?
Each correct answer represents a complete solution. Choose all that apply.
Each correct answer represents a complete solution. Choose all that apply.
A. The bean provider is responsible for writing code for programmatic security.
B. It is also called as instance level security.
C. It is implemented using methods of the EJBContext interface.
D. It is implemented using the methods of the UserTransaction interface.
Answer: A,B,C
Question #5 (Topic: Topic 1)
Which of the following functions are performed by methods of the
HttpSessionActivationListener interface?
Each correct answer represents a complete solution. Choose all that apply.
HttpSessionActivationListener interface?
Each correct answer represents a complete solution. Choose all that apply.
A. Notifying the object when it is bound to a session.
B. Notifying an attribute that a session has just migrated from one JVM to another.
C. Notifying the object when it is unbound from a session.
D. Notifying an attribute that a session is about to migrate from one JVM to another.
Answer: B,D