当前分类: SCDCD(310-081)
问题:单选题Which the HTTP method represents a request for information about the supported methods on an HTTP server?()A GETB INFOC HEADD TRACEE OPTIONS...
查看答案
问题:单选题When adding a element to a web application deployment descriptor, the inclusion of which sub-element requires the definition of an error page()?A realm-name B auth-metod C auth-constraint D form-login-config E user-data-constaint...
问题:多选题For which three events can web application event listeners be registered? ()Awhen a session is createdBafter a servlet is destroyedCwhen a session has timed outDwhen a cookie has been createdEwhen a servlet has forwarded a requestFwhen a session attrib...
问题:单选题Which option prevents the exception thrown by my:errorProne from invoking the error page mechanism and outputs the message "File not found" in the response?()A AB BC CD DE E...
问题:单选题Which is the valid identifier?()A falseB defaultC _objectD a-class...
问题:单选题In form-based authentication, what must be included in the HTML returned from the URL specified by the element?()A a base-64 encoded user name and passwordB a form that POSTs to the j_security_check URLC an applet that requests the user name and pa...
问题:单选题Within a web application deployment descriptor, which maps the com.example.LoginServlet servlet to /utils/LoginServlet?()A AB BC CD D...
问题:多选题Which the three interfaces need to be declared in the web application deployment descriptor? ()AHttpSessionListenerBHttpSessionBindingListenerCHttpSessionTimedOutListenerDHttpSessionAttributeListenerEHttpSessionActivationListenerFHttpSessionPassivatedL...
问题:单选题Which HTTP method has the characteristic that multiple indential requests may produce side effect beyond those of a single request()?A PUTB GETC INFOD POSTE HEADF TRACE...
问题:单选题Which security mechanism can be directed through the element in a web deployment descriptor()?A authorizationB data integrityC confidentialityD authentication...
问题:多选题Which two are valid values for the element inside a element of a web application deployment descriptor?()ANULLBSECURECINTEGRALDENCRYPTEDECONFIDENTIAL...
问题:单选题Given the HttpServlet code: getServletContext().setAttribute(“foo”, “value”); What is the result?()A The attribute foo is placed in the applicationB A ServletContextListener registered for that servlet is notifiedC A ServletAttributeListener regis...
问题:单选题Which thefollowingstatements about static inner classes is true?()A An anonymous class can be declared as static.B A static inner class cannot be a static member of the outer class.C A static inner class does not require an instance of the enclosing...
问题:单选题} What is the result?()A Compilation succeeds and 1 is printed.B Compilation succeeds and 2 is printed.C An error at line 8 causes compilation to fail.D An error at line 14 causes compilation to fail....
问题:单选题Assume a tag handler extends TagSupport. Which is used within the tag handler to get an attribute “foo” that is in the application scope?()A pageContext.getAttribute(“foo”);B getPageContext().getAttribute(“foo”);C pageContext.getApplicationScope(“fo...
问题:单选题Which interface must a class implement to be informed of a session creation event?()A javax.servlet.http.HttpSessionListenerB javax.servlet.http.HttpSessionBindingListenerC javax.servlet.http.HttpSessionCreationListenerD javax.servlet.http.HttpSess...
问题:多选题Which two are characteristics of the Intercepting Filter pattern?()Ait provides centralized request handling for incoming requests.BIt forces resource authentication to be distributed across web components.CIt reduces coupling between presentation-tier...
问题:多选题Under what two circumstances is the set JspBody method NOT called in a tag class that implements the Simple Tag interface? ()AThe tag is invoked without a body.BThe doTAb method throws an exception.CThe element has the value empty.DThe tag is called w...
问题:单选题A web application uses the HttpSession mechanism to determine if a user is “logged in”. When a user supplies a valid user name and password, an HttpSession is created for that user. The user has access to the application for only 15 minutes after logg...
问题:单选题Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is t...