Exam 5: Java Programming Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____________________ builds an environment that provides separate name spaces for classes loaded from different locations.

(Short Answer)
4.8/5
(31)

Describe the four-step Java byte code verification process.

(Essay)
4.9/5
(32)

The ____ security model is used as the original Java security model.

(Multiple Choice)
4.8/5
(38)

____ generation is defined as objects allocated in a generation for shorter-lived objects in memory.

(Multiple Choice)
4.7/5
(41)

The JVM relies on the platform and various software technologies to present a secure location where Java programs run. This secure location is called a(n) ____ in JVM terminology.

(Multiple Choice)
4.9/5
(33)

When a class is presented to run in a JVM, the ____ finds the class, loads the byte codes, performs verification, executes its main method, and then loads any supplemental classes.

(Multiple Choice)
4.9/5
(36)

A(n) ____________________ serves as a group that contains objects that have the same accessibility and protection.

(Short Answer)
4.8/5
(32)

Briefly describe the ProtectionDomain class.

(Essay)
4.9/5
(38)

____ objects imply that contents can be changed.

(Multiple Choice)
4.8/5
(33)
Match each item with a statement below:
compiles Java program into Java byte codes
ClassLoader
monitors references to dynamic memory and releases the memory when there are no longer any references to it
SecureClassLoader
allows you to associate permissions based upon the source of a loaded class
Domain
Correct Answer:
Verified
Premises:
Responses:
compiles Java program into Java byte codes
ClassLoader
monitors references to dynamic memory and releases the memory when there are no longer any references to it
SecureClassLoader
allows you to associate permissions based upon the source of a loaded class
Domain
presents a bounded environment for a Java program to run within
JVM
class that allows applications to implement a code-level security policy
Sandbox
a set of Java objects
Garbage collector
allows Java byte codes to execute
SecurityManager
memory pools holding objects of different ages
javac
the gatekeeper of the JVM
Generations
(Matching)
4.9/5
(33)

The ____ provides fine-grained control on what operation can be run within the JVM.

(Multiple Choice)
4.8/5
(33)

The Java programming language is a multiplatform programming language.

(True/False)
4.9/5
(27)

To build a secure and efficient Java program, a developer should always try the collector chosen by the JVM on the application first.

(True/False)
4.7/5
(40)

A ____ object is defined as an object that is no longer be reached from any pointer in running programs under a JVM.

(Multiple Choice)
4.8/5
(34)

In Java, a sandbox provides strong protection against nuisances and denial of service (DOS) attacks.

(True/False)
4.8/5
(38)

Calling the ____ method instructs the JVM to recycle unused objects in order to make the memory available for quick reuse.

(Multiple Choice)
4.8/5
(36)

What is the design goal of the Java language?

(Essay)
4.9/5
(30)

____ is used to load classes and resources from a search path of URLs referring to both Java archive (JAR) files and directories.

(Multiple Choice)
4.8/5
(32)

All Java programs run on a common platform called the ____________________.

(Short Answer)
4.8/5
(36)

What are the attributes of a protection domain?

(Essay)
4.8/5
(33)
Showing 21 - 40 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)