Exam 5: Java Programming Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Regarding protection domains, how can objects in one domain automatically discover objects in another domain?

Free
(Essay)
4.9/5
(40)
Correct Answer:
Verified

Objects in one domain cannot automatically discover objects in another domain. In fact, all Java runtime code is considered system code and runs inside the unique system domain. Each application or applet runs in its own domain according to the current effective policy. The JVM ensures that objects in any nonsystem domain cannot automatically discover objects in another nonsystem domain. This partition is achieved by careful class resolution and loading such as using different ClassLoaders for different domains.

Regarding protection domains, when an object from one domain calls code from another domain, the rule of ____ is employed.

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

D

With automatic ____, the Java programmer is freed of the complex task of deciding when and where to safely release memory.

Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
Verified

C

____________________ is a memory-management activity carried out by the Java runtime environment to reclaim dynamically allocated memory that is no longer being used.

(Short Answer)
4.7/5
(33)

A ____ object represents the policy for a Java application environment.

(Multiple Choice)
4.9/5
(35)

____ are used instead of pointers to allow Java programmers to create data structures.

(Multiple Choice)
4.8/5
(32)

The ____ class is used for access control operations and decision making.

(Multiple Choice)
4.8/5
(31)

How does Java prevent invalid memory access?

(Essay)
4.8/5
(32)

Individual permissions can be set using the ____ program without any programming.

(Multiple Choice)
4.8/5
(37)

The syntax of Java language started as a subset of the popular object-oriented language C++.

(True/False)
4.7/5
(37)

What are the purposes of the AccessController class?

(Essay)
4.8/5
(28)

No class in the same package can access an inner class after it is compiled.

(True/False)
4.9/5
(33)

The ____ collector is a generational collector that has been implemented to emphasize the throughput of the application or low garbage collection pause times.

(Multiple Choice)
4.8/5
(30)

What are the advantages and disadvantages of automatic garbage collection?

(Essay)
4.9/5
(35)

A ____ is a database of private keys and their associated digital certificates.

(Multiple Choice)
4.8/5
(24)

A programmer can exam the byte codes by disassembling a class file using the command ____ .

(Multiple Choice)
4.9/5
(35)

Java ____________________ is the machine language of the JVM.

(Short Answer)
4.7/5
(28)

How does a concurrent low pause collector work?

(Essay)
4.9/5
(38)

How does a serial collector work?

(Essay)
4.8/5
(39)

The core of Java permissions is the ____ class.

(Multiple Choice)
4.9/5
(31)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)