Exam 5: Java Programming Security
Exam 1: Introduction to Security Concepts42 Questions
Exam 2: Software Engineering and Security42 Questions
Exam 3: Essential Public Key Infrastructure42 Questions
Exam 4: Trust and Threat Model42 Questions
Exam 5: Java Programming Security42 Questions
Exam 6: Java Api-Level Security Features42 Questions
Exam 7: Authentication and Authorization With Java42 Questions
Exam 8: Secure Programming With C and Openssl42 Questions
Exam 9: Secure Programming With Perl42 Questions
Exam 10: Identity Management42 Questions
Exam 11: Security Topics42 Questions
Select questions type
____________________ builds an environment that provides separate name spaces for classes loaded from different locations.
(Short Answer)
4.8/5
(31)
The ____ security model is used as the original Java security model.
(Multiple Choice)
4.8/5
(38)
____ generation is defined as objects allocated in a generation for shorter-lived objects in memory.
(Multiple Choice)
4.7/5
(41)
The JVM relies on the platform and various software technologies to present a secure location where Java programs run. This secure location is called a(n) ____ in JVM terminology.
(Multiple Choice)
4.9/5
(33)
When a class is presented to run in a JVM, the ____ finds the class, loads the byte codes, performs verification, executes its main method, and then loads any supplemental classes.
(Multiple Choice)
4.9/5
(36)
A(n) ____________________ serves as a group that contains objects that have the same accessibility and protection.
(Short Answer)
4.8/5
(32)
Match each item with a statement below:
Correct Answer:
Premises:
Responses:
(Matching)
4.9/5
(33)
The ____ provides fine-grained control on what operation can be run within the JVM.
(Multiple Choice)
4.8/5
(33)
The Java programming language is a multiplatform programming language.
(True/False)
4.9/5
(27)
To build a secure and efficient Java program, a developer should always try the collector chosen by the JVM on the application first.
(True/False)
4.7/5
(40)
A ____ object is defined as an object that is no longer be reached from any pointer in running programs under a JVM.
(Multiple Choice)
4.8/5
(34)
In Java, a sandbox provides strong protection against nuisances and denial of service (DOS) attacks.
(True/False)
4.8/5
(38)
Calling the ____ method instructs the JVM to recycle unused objects in order to make the memory available for quick reuse.
(Multiple Choice)
4.8/5
(36)
____ is used to load classes and resources from a search path of URLs referring to both Java archive (JAR) files and directories.
(Multiple Choice)
4.8/5
(32)
All Java programs run on a common platform called the ____________________.
(Short Answer)
4.8/5
(36)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)