多选题Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()AMANAGER can do a GET on resources in 

题目
多选题
Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()
A

MANAGER can do a GET on resources in the /Bar/Baz directory.

B

MANAGER can do a POST on any resource in the /Bar/Baz directory.

C

MANAGER can do a TRACE on any resource in the /Bar/Baz directory.

D

DEVELOPER can do a GET on resources in the /Bar/Baz directory.

E

DEVELOPER can do only a POST on resources in the /Bar/Baz directory.

F

DEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.


相似考题
更多“多选题Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()AMANAGER can do a GET on resources in ”相关问题
  • 第1题:

    What type of constraint can be used to ensure that, in any given row in a table, the value of one column never exceeds the value of another column?()

    • A、Check
    • B、Range
    • C、Referential
    • D、Informational

    正确答案:A

  • 第2题:

    Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()

    • A、Every  tag must have at least one  tag.
    • B、A  tag can have many  tags.
    • C、A given  tag can apply to only one  tag.
    • D、A given  tag can contain from zero to many  tags.
    • E、It is possible to construct a valid  tag such that,for a given resource,no user rolescan access that resource.

    正确答案:B,E

  • 第3题:

    Given the two security constraints in a deployment descriptor: 101. 102.  103.SALES 104.SALES 105. 106. 107. 108.  109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()

    • A、<auth-constraint/>
    • B、<auth-constraint><role-name>*</role-name></auth-constraint>
    • C、<auth-constraint><role-name>ANY</role-name></auth-constraint>
    • D、<auth-constraint><role-name>MARKETING</role-name></auth-constraint>

    正确答案:B,D

  • 第4题:

    Given: 3.class MyServlet extends HttpServlet { 4.public void doPut(HttpServletRequest req, HttpServletResponse resp) throws ServletException,IOException { 5.// servlet code here ... 26.} 27.} If the DD contains a single security constraint associated with MyServlet and its only  tagsand  tags are:GETPUT Admin Which four requests would be allowed by the container?()

    • A、A user whose role is Admin can perform a PUT.
    • B、A user whose role is Admin can perform a GET.
    • C、A user whose role is Admin can perform a POST.
    • D、A user whose role is Member can perform a PUT.
    • E、A user whose role is Member can perform a POST.
    • F、A user whose role is Member can perform a GET.

    正确答案:A,B,C,E

  • 第5题:

    Examine the following statement that is used to modify the constraint on the SALES table: SQL> ALTER TABLE SALES MODIFY CONSTRAINT pk DISABLE VALIDATE; Which three statements are true regarding the above command()

    • A、The constraint remains valid.
    • B、The index on the constraint is dropped.
    • C、It allows the loading of data into the table using SQL*Loader.
    • D、New data conforms to the constraint, but existing data is not checked
    • E、It allows the data manipulation on the table using INSERT/UPDATE/DELETE SQL statements.

    正确答案:A,B,C

  • 第6题:

    多选题
    Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()
    A

    MANAGER can do a GET on resources in the /Bar/Baz directory.

    B

    MANAGER can do a POST on any resource in the /Bar/Baz directory.

    C

    MANAGER can do a TRACE on any resource in the /Bar/Baz directory.

    D

    DEVELOPER can do a GET on resources in the /Bar/Baz directory.

    E

    DEVELOPER can do only a POST on resources in the /Bar/Baz directory.

    F

    DEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.


    正确答案: D,B
    解析: 暂无解析

  • 第7题:

    多选题
    Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()
    A

    Every  tag must have at least one  tag.

    B

    A  tag can have many  tags.

    C

    A given  tag can apply to only one  tag.

    D

    A given  tag can contain from zero to many  tags.

    E

    It is possible to construct a valid  tag such that,for a given resource,no user rolescan access that resource.


    正确答案: D,A
    解析: 暂无解析

  • 第8题:

    多选题
    Which three statements are true when working with high-availability clusters?()
    A

    The valid cluster-id range is between 0 and 255.

    B

    JUNOS security devices can belong to more than one cluster if cluster virtualization is enabled.

    C

    If the cluster-id value is set to 0 on a JUNOS security device, the device will not participate in the cluster.

    D

    A reboot is required if the cluster-id or node value is changed.

    E

    JUNOS security devices can belong to one cluster only.


    正确答案: C,E
    解析: 暂无解析

  • 第9题:

    多选题
    You need to configure port security on switch R1.  Which two statements are true about this  technology? ()
    A

    Port security can be configured for ports supporting VoIP.

    B

    With port security configured, four MAC addresses are allowed by default.

    C

    The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.

    D

      Withsecurity configured, only one MAC addresses is allowed by default.

    E

    Port security cannot be configured for ports supporting VoIP.


    正确答案: A,E
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements are true about the primary key constraint in a table? ()
    A

    It is not possible to disable the primary key constraint.

    B

    It is possible to have more than one primary key constraint in a single table.

    C

    The primary key constraint can be referred by only one foreign key constraint.

    D

    The primary key constraint can be imposed by combining more than one column.

    E

    The non-deferrable primary key constraint creates an unique index on the primary key column if it is not already indexed.


    正确答案: D,B
    解析: 暂无解析

  • 第11题:

    多选题
    Given: 3.class MyServlet extends HttpServlet { 4.public void doPut(HttpServletRequest req, HttpServletResponse resp) throws ServletException,IOException { 5.// servlet code here ... 26.} 27.} If the DD contains a single security constraint associated with MyServlet and its only  tagsand  tags are:GETPUT Admin Which four requests would be allowed by the container?()
    A

    A user whose role is Admin can perform a PUT.

    B

    A user whose role is Admin can perform a GET.

    C

    A user whose role is Admin can perform a POST.

    D

    A user whose role is Member can perform a PUT.

    E

    A user whose role is Member can perform a POST.

    F

    A user whose role is Member can perform a GET.


    正确答案: F,A
    解析: 暂无解析

  • 第12题:

    多选题
    Which statements concerning the relationships between the following classes are true?()   class Foo {  int num;   Baz comp = new Baz();   }   class Bar {  boolean flag;   }   class Baz extends Foo {   Bar thing = new Bar();   double limit;   }
    A

    A Bar is a Baz.

    B

    A Foo has a Bar.

    C

    A Baz is a Foo.

    D

    A Foo is a Baz.

    E

    A Baz has a Bar.


    正确答案: E,A
    解析: 暂无解析

  • 第13题:

    An airline is building a booking system for its premium and general customers. The goal is to ensure premium members are given higher access priority when user traffic is high.    What configuration will achieve this goal?()

    • A、Configure a Work Manager for premium users with a Minimum Thread Constraint.
    • B、Configure a Work Manager for premium users with a higher fair-share-request-class.
    • C、Configure a Work Manager for premium users with a higher response-time-request-class.
    • D、Configure a Work Manager general users with a Maximum Thread Constraint.
    • E、Configure a Work Manager for premium users with a custom request-class.

    正确答案:B

  • 第14题:

    Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()

    • A、MANAGER can do a GET on resources in the /Bar/Baz directory.
    • B、MANAGER can do a POST on any resource in the /Bar/Baz directory.
    • C、MANAGER can do a TRACE on any resource in the /Bar/Baz directory.
    • D、DEVELOPER can do a GET on resources in the /Bar/Baz directory.
    • E、DEVELOPER can do only a POST on resources in the /Bar/Baz directory.
    • F、DEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.

    正确答案:A,C,D,F

  • 第15题:

    Which statements concerning the relationships between the following classes are true?()   class Foo {  int num;   Baz comp = new Baz();   }   class Bar {  boolean flag;   }   class Baz extends Foo {   Bar thing = new Bar();   double limit;   }  

    • A、A Bar is a Baz.
    • B、A Foo has a Bar.
    • C、A Baz is a Foo.
    • D、A Foo is a Baz.
    • E、A Baz has a Bar.

    正确答案:C,E

  • 第16题:

    Which two statements are true about the primary key constraint in a table? ()

    • A、It is not possible to disable the primary key constraint.
    • B、It is possible to have more than one primary key constraint in a single table.
    • C、The primary key constraint can be referred by only one foreign key constraint.
    • D、The primary key constraint can be imposed by combining more than one column.
    • E、The non-deferrable primary key constraint creates an unique index on the primary key column if it is not already indexed.

    正确答案:D,E

  • 第17题:

    In a Java EE messaging application, one MDB is consuming a lot of memory at high traffic.    What configuration should you use to prevent possible out-of-memory error at high traffic and at the same time not losing messages?()

    • A、Configure a Work Manager for the MDB with a Maximum Thread Constraint.
    • B、Configure a Work Manager for the MDB with a Minimum Thread Constraint.  
    • C、Configure a Work Manager for the MDB with a Maximum Thread Constraint and a Capacity  Constraint. 
    • D、Configure a Work Manager for the MDB with a Minimum Thread Constraint and a Capacity Constraint. 
    • E、Configure a Work Manager for the MDB with both a Maximum Thread Constraint and Minimum Thread Constraint.

    正确答案:B

  • 第18题:

    多选题
    Given the two security constraints in a deployment descriptor: 101. 102.  103.SALES 104.SALES 105. 106. 107. 108.  109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()
    A

    <auth-constraint/>

    B

    <auth-constraint><role-name>*</role-name></auth-constraint>

    C

    <auth-constraint><role-name>ANY</role-name></auth-constraint>

    D

    <auth-constraint><role-name>MARKETING</role-name></auth-constraint>


    正确答案: C,D
    解析: 暂无解析

  • 第19题:

    多选题
    Given the two security constraints in a deployment descriptor: 101. 102.  103.SALES 104.SALES 105. 106. 107. 108.  109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()
    A

    <auth-constraint/>

    B

    <auth-constraint><role-name>*</role-name></auth-constraint>

    C

    <auth-constraint><role-name>ANY</role-name></auth-constraint>

    D

    <auth-constraint><role-name>MARKETING</role-name></auth-constraint>


    正确答案: A,C
    解析: 暂无解析

  • 第20题:

    多选题
    Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()
    A

    MANAGER can do a GET on resources in the /Bar/Baz directory.

    B

    MANAGER can do a POST on any resource in the /Bar/Baz directory.

    C

    MANAGER can do a TRACE on any resource in the /Bar/Baz directory.

    D

    DEVELOPER can do a GET on resources in the /Bar/Baz directory.

    E

    DEVELOPER can do only a POST on resources in the /Bar/Baz directory.

    F

    DEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.


    正确答案: A,C,D,F
    解析: 暂无解析

  • 第21题:

    多选题
    Which two management-software applications can you use to manage the Cisco Catalyst Express 500 Series Switches?()
    A

    Cisco Network Assistant

    B

    Cisco Security Device Manager

    C

    Cisco Device Manager

    D

    Cisco Adaptive Security Device Manager


    正确答案: B,A
    解析: 暂无解析

  • 第22题:

    多选题
    Examine the following statement that is used to modify the constraint on the SALES table: SQL> ALTER TABLE SALES MODIFY CONSTRAINT pk DISABLE VALIDATE; Which three statements are true regarding the above command()
    A

    The constraint remains valid.

    B

    The index on the constraint is dropped.

    C

    It allows the loading of data into the table using SQL*Loader.

    D

    New data conforms to the constraint, but existing data is not checked

    E

    It allows the data manipulation on the table using INSERT/UPDATE/DELETE SQL statements.


    正确答案: C,A
    解析: 暂无解析

  • 第23题:

    多选题
    Which four are valid Oracle constraint types? ()
    A

    CASCADE

    B

    UNIQUE

    C

    NONUNIQUE

    D

    CHECK

    E

    PRIMARY KEY

    F

    CONSTANT

    G

    NOT NULL


    正确答案: B,A
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()
    A

    It can be invoked only from the doGet or doPost methods.

    B

    It can be used independently of the getRemoteUser method.

    C

    Can return true even when its argument is NOT defined as a valid role name in the deployment descriptor.

    D

    Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.


    正确答案: D,C
    解析: 暂无解析