Skip to Content
Head First Servlets and JSP, 2nd Edition
book

Head First Servlets and JSP, 2nd Edition

by Bryan Basham, Kathy Sierra, Bert Bates
March 2008
Intermediate to advanced
911 pages
20h 31m
English
O'Reilly Media, Inc.
Content preview from Head First Servlets and JSP, 2nd Edition

Coffee Cram: Mock Exam Chapter 12

  1. Which security mechanisms always operate independently of the transport layer? (Choose all that apply.)

    A.

    authorization

    B.

    data integrity

    C.

    authentication

    D.

    confidentiality

  2. Given a deployment descriptor with three valid <security-constraint> elements, all constraining web resource A, whose respective <auth-constraint> sub-elements are:

    <auth-constraint>
        <role-name>Bob</role-name>
    </auth-constraint>
    <auth-constraint/>
    <auth-constraint>
        <role-name>Alice</role-name>
    </auth-constraint>

    Who can access resource A?

    A.

    no one

    B.

    anyone

    C.

    only Bob

    D.

    only Alice

    E.

    only Bob and Alice

    F.

    anyone ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Head First Java, 2nd Edition

Head First Java, 2nd Edition

Kathy Sierra, Bert Bates
Head First Java, 3rd Edition

Head First Java, 3rd Edition

Kathy Sierra, Bert Bates, Trisha Gee
Learning Java, 6th Edition

Learning Java, 6th Edition

Marc Loy, Patrick Niemeyer, Daniel Leuck

Publisher Resources

ISBN: 9780596516680Errata PageSupplemental Content