多选题If you want to use the Java EE platform’s built-in type of authentication that uses a custom HTML page for authentication. Which two statements are true?()AYour deployment descriptor will need to contain this tag: CUSTOM.BThe related custom HTML login 

题目
多选题
If you want to use the Java EE platform’s built-in type of authentication that uses a custom HTML page for authentication. Which two statements are true?()
A

Your deployment descriptor will need to contain this tag: CUSTOM.

B

The related custom HTML login page must be named loginPage.html.

C

When you use this type of authentication, SSL is turned on automatically.

D

You must have a tag in your deployment descriptor that allows you to point to both a login HTML pageand an HTML page for handling any login errors.

E

In the HTML related to authentication for this application, you must use predefined variable names fort he variables that store the user and password values.


相似考题
更多“多选题If you want to use the Java EE platform’s built-in type of authentication that uses a custom HTML page for authentication. Which two statements are true?()AYour deployment descriptor will need to contain this tag: CUSTOM.BThe related custom HTML login ”相关问题
  • 第1题:

    If you want to use the Java EE platform’s built-in type of authentication that uses a custom HTML page for authentication. Which two statements are true?()

    • A、Your deployment descriptor will need to contain this tag: CUSTOM.
    • B、The related custom HTML login page must be named loginPage.html.
    • C、When you use this type of authentication, SSL is turned on automatically.
    • D、You must have a tag in your deployment descriptor that allows you to point to both a login HTML pageand an HTML page for handling any login errors.
    • E、In the HTML related to authentication for this application, you must use predefined variable names fort he variables that store the user and password values.

    正确答案:D,E

  • 第2题:

    Given this fragment from a Java EE deployment descriptor: 124. beta.html 125. alpha.html And this request from a browser:http://www.sun.com/SCWCDtestApp/register Which statement is correct,when the container receives this request?()

    • A、This deployment descriptor is NOT valid.
    • B、The container first looks in the register directory for beta.html.
    • C、The container first looks in the register directory for alpha.html.
    • D、The container first looks for a servlet mapping in the deployment descriptor.

    正确答案:D

  • 第3题:

    You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()

    • A、Isolate a file name unique to the custom image and create a custom rule-type of "File" which matches on the file. Select the "Required" option under the custom rule.
    • B、Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of "MAC Address" which matches on the appropriate MAC address.
    • C、Select the "Required" option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of "IP Address" which matches on the appropriate IP address. Select the "Required" option under the custom rule.
    • D、Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of "Registry Setting" which matches on the name of the registry key.

    正确答案:A,D

  • 第4题:

    You create a Web Form. You need to add controls that use adaptive rendering to display content. The type of content rendered must depend on the device that is requesting the page. What are two possible ways to achieve this goal?()

    • A、Add custom controls that emit XHTML to the Web Form.
    • B、Add custom controls that emit WML to the Web Form.
    • C、Add mobile controls to the Web Form.
    • D、Add Web server controls to the Web Form.

    正确答案:C,D

  • 第5题:

    You are developing a Windows Presentation Foundation (WPF) application. You need to use XAML to create a custom control that contains two Button controls. From which base class should you inherit? ()

    • A、 FrameworkElement
    • B、 UIElement
    • C、 UserControl
    • D、 Button

    正确答案:C

  • 第6题:

    You create a Web page that contains the span shown in the following line of code. TextYou need replace the contents of the span with HTML that you download from a URL specified by a global variable named localURL. Which code segment should you use?()

    • A、$.ajax({ type: "GET", url: localURL, dataType: "jsonp", success: function(htmlText  { $("#span1").text(htmlText); } }); 
    • B、$.ajax(  localURL, {}, function(htmlText) { $("#span1").html(htmlText); },"html" ); 
    • C、$.ajax({  type: "GET", url: localURL, dataType: "html",success: function(htmlText) { $("#span1").innerHTML = htmlText; }}); 
    • D、$.ajax({  type: "GET", url: localURL,  success: function(htmlText) { $("#span1").html(htmlText); } });

    正确答案:D

  • 第7题:

    多选题
    Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()
    A

    Every  tag must have at least one  tag.

    B

    A  tag can have many  tags.

    C

    A given  tag can apply to only one  tag.

    D

    A given  tag can contain from zero to many  tags.

    E

    It is possible to construct a valid  tag such that,for a given resource,no user rolescan access that resource.


    正确答案: D,A
    解析: 暂无解析

  • 第8题:

    多选题
    You deployed a Java EE Shared Library and want to use it from an application that is also deployed on the same cluster.    Which two manifest attributes must be specified at a minimum with corresponding values in the deployment descriptor of the application that requires?()
    A

    Implementation-Version

    B

    Specification-Version

    C

    Extension-Name

    D

    Specification-Vendor

    E

    Implementation-Vendor


    正确答案: C,E
    解析: 暂无解析

  • 第9题:

    多选题
    You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()
    A

    Isolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.

    B

    Identify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.

    C

    Select the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.

    D

    Isolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.


    正确答案: C,D
    解析: 暂无解析

  • 第10题:

    多选题
    You are creating a custom user control. The custom user control will be used on 10 Web Forms for an ASP.NET Web site that allows users to register and log on to a personalized experience.The custom user control uses two TextBox controls and two Button controls.You need to ensure that the controls are visible only when users are not logged on to the Web site. You also need to minimize the amount of effort in development and maintenance for the Web site. Which two actions should you perform?()
    A

    Add the OnClick event handler for the Login button to the code used in the custom user control.

    B

    Add the OnClick event handler for the Login button to the code used in the Web Form where the control is added.

    C

    In the Page_Load method of the Web Form, add a code segment to set the visibility of the TextBox and Button controls where the control is added.

    D

    In the Page_Load method of the custom user control, add a code segment to set the visibility of the TextBox and Button controls.


    正确答案: D,B
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()
    A

    It can be invoked only from the doGet or doPost methods.

    B

    It can be used independently of the getRemoteUser method.

    C

    Can return true even when its argument is NOT defined as a valid role name in the deployment descriptor.

    D

    Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.


    正确答案: D,C
    解析: 暂无解析

  • 第12题:

    多选题
    If you want to use the Java EE platform’s built-in type of authentication that uses a custom HTML page for authentication. Which two statements are true?()
    A

    Your deployment descriptor will need to contain this tag: CUSTOM.

    B

    The related custom HTML login page must be named loginPage.html.

    C

    When you use this type of authentication, SSL is turned on automatically.

    D

    You must have a tag in your deployment descriptor that allows you to point to both a login HTML pageand an HTML page for handling any login errors.

    E

    In the HTML related to authentication for this application, you must use predefined variable names fort he variables that store the user and password values.


    正确答案: A,E
    解析: 暂无解析

  • 第13题:

    Which statement is false?() 

    • A、 custom URL categories cannot contain IP addresses
    • B、 custom URL categories cannot override predefined URL categories
    • C、 custom URL categories can contain domain names
    • D、 custom URL categories can use regular expressions

    正确答案:A

  • 第14题:

    Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()

    • A、It can be invoked only from the doGet or doPost methods.
    • B、It can be used independently of the getRemoteUser method.
    • C、Can return "true" even when its argument is NOT defined as a valid role name in the deployment descriptor.
    • D、Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.

    正确答案:B,C

  • 第15题:

    You deployed a Java EE Shared Library and want to use it from an application that is also deployed on the same cluster.    Which two manifest attributes must be specified at a minimum with corresponding values in the deployment descriptor of the application that requires?()

    • A、Implementation-Version
    • B、Specification-Version
    • C、Extension-Name  
    • D、Specification-Vendor
    • E、Implementation-Vendor

    正确答案:A,C

  • 第16题:

    You are creating a custom user control. The custom user control will be used on 10 Web Forms for an ASP.NET Web site that allows users to register and log on to a personalized experience. The custom user control uses two TextBox controls and two Button controls. You need to ensure that the controls are visible only when users are not logged on to the Web site. You also need to minimize the amount of effort in development and maintenance for the Web site. Which two actions should you perform? ()

    • A、Add the OnClick event handler for the Login button to the code used in the custom user control.
    • B、Add the OnClick event handler for the Login button to the code used in the Web Form where the control is added.
    • C、In the Page_Load method of the Web Form, add a code segment to set the visibility of the TextBox and Button controls where the control is added.
    • D、In the Page_Load method of the custom user control, add a code segment to set the visibility of the TextBox and Button controls.

    正确答案:A,D

  • 第17题:

    Which of the following is NOT one of the three details you need to fill in on the New Custom Control dialog?()

    • A、Name of the custom control
    • B、Comments to describe the custom control
    • C、List of the controls that will make up this custom control
    • D、Application that will contain the custom control

    正确答案:C

  • 第18题:

    多选题
    Which two statements are true about Oracle JRockit Mission Control (JRMC) ? ()
    A

    JRMC is platform neutral. It supports mosr JVMs in market

    B

    JRMC is used for Deep visibility and analisys of single JVMs

    C

    JRMC comes with custom in-memory agents and is supported by standard APIs (JVMT1)

    D

    JRMC is bundled with the WebLogic Suite and WebLogic Server EE


    正确答案: B,D
    解析: 暂无解析

  • 第19题:

    多选题
    You create a Web Form. You need to add controls that use adaptive rendering to display content. The type of content rendered must depend on the device that is requesting the page. What are two possible ways to achieve this goal? ()
    A

    Add custom controls that emit XHTML to the Web Form.

    B

    Add custom controls that emit WML to the Web Form.

    C

    Add mobile controls to the Web Form.

    D

    Add Web server controls to the Web Form.


    正确答案: C,B
    解析: 暂无解析

  • 第20题:

    单选题
    You have a master page custom.master ... u create a nested.master page using it ... and then u have content page that uses the nested.master as its master page ...  to get a string prop from custom.master into a label in content page the code u wud use()
    A

    master.master

    B

    parent.master

    C

    this.master

    D

    unknown


    正确答案: B
    解析: 暂无解析

  • 第21题:

    多选题
    You want to customize access to the corporate network so that agentiess users are instructed to obtain a certificatebefore accessing the network.Which two configurations solve this problem? ()
    A

    Create a custom sign-in page with specific instructions in the Instructions field.

    B

    Create a custom sign-in page with specific Missing Certificate messages in the Custom error messages field.

    C

    Create a custom sign-in policy with specific instructions in the Instructions field.

    D

    Create a custom sign-in notification and assign it to the Pre-Auth Sign-in Notification in the sign-in policy.


    正确答案: B,D
    解析: 暂无解析

  • 第22题:

    单选题
    Given a portion of a valid Java EE web application’s directory structure: MyApp | |-- File1.html | |-- Directory1 ||-- File2.html| |-- META-INF |-- File3.html You want to know whether File1.html, File2.html, and/or File3.html will be directly accessible by your webclient’s browsers. Which statement is true?()
    A

    All three files are directly accessible.

    B

    Only File1.html is directly accessible.

    C

    Only File2.html is directly accessible.

    D

    Only File3.html is directly accessible.

    E

    Only File1.html and File2.html are directly accessible.


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Given this fragment from a Java EE deployment descriptor: 124. beta.html 125. alpha.html And this request from a browser:http://www.sun.com/SCWCDtestApp/register Which statement is correct,when the container receives this request?()
    A

    This deployment descriptor is NOT valid.

    B

    The container first looks in the register directory for beta.html.

    C

    The container first looks in the register directory for alpha.html.

    D

    The container first looks for a servlet mapping in the deployment descriptor.


    正确答案: D
    解析: 暂无解析