Exam 5: Java Programming Security
Exam 1: Introduction to Security Concepts42 Questions
Exam 2: Software Engineering and Security42 Questions
Exam 3: Essential Public Key Infrastructure42 Questions
Exam 4: Trust and Threat Model42 Questions
Exam 5: Java Programming Security42 Questions
Exam 6: Java Api-Level Security Features42 Questions
Exam 7: Authentication and Authorization With Java42 Questions
Exam 8: Secure Programming With C and Openssl42 Questions
Exam 9: Secure Programming With Perl42 Questions
Exam 10: Identity Management42 Questions
Exam 11: Security Topics42 Questions
Select questions type
Regarding protection domains, how can objects in one domain automatically discover objects in another domain?
Free
(Essay)
4.9/5
(40)
Correct Answer:
Objects in one domain cannot automatically discover objects in another domain. In fact, all Java runtime code is considered system code and runs inside the unique system domain. Each application or applet runs in its own domain according to the current effective policy. The JVM ensures that objects in any nonsystem domain cannot automatically discover objects in another nonsystem domain. This partition is achieved by careful class resolution and loading such as using different ClassLoaders for different domains.
Regarding protection domains, when an object from one domain calls code from another domain, the rule of ____ is employed.
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
D
With automatic ____, the Java programmer is freed of the complex task of deciding when and where to safely release memory.
Free
(Multiple Choice)
4.9/5
(29)
Correct Answer:
C
____________________ is a memory-management activity carried out by the Java runtime environment to reclaim dynamically allocated memory that is no longer being used.
(Short Answer)
4.7/5
(33)
A ____ object represents the policy for a Java application environment.
(Multiple Choice)
4.9/5
(35)
____ are used instead of pointers to allow Java programmers to create data structures.
(Multiple Choice)
4.8/5
(32)
The ____ class is used for access control operations and decision making.
(Multiple Choice)
4.8/5
(31)
Individual permissions can be set using the ____ program without any programming.
(Multiple Choice)
4.8/5
(37)
The syntax of Java language started as a subset of the popular object-oriented language C++.
(True/False)
4.7/5
(37)
No class in the same package can access an inner class after it is compiled.
(True/False)
4.9/5
(33)
The ____ collector is a generational collector that has been implemented to emphasize the throughput of the application or low garbage collection pause times.
(Multiple Choice)
4.8/5
(30)
What are the advantages and disadvantages of automatic garbage collection?
(Essay)
4.9/5
(35)
A ____ is a database of private keys and their associated digital certificates.
(Multiple Choice)
4.8/5
(24)
A programmer can exam the byte codes by disassembling a class file using the command ____ .
(Multiple Choice)
4.9/5
(35)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)