O'Reilly logo

Sams Teach Yourself J2EE™ in 21 Days by Peter Roxburgh, Andy Longshaw, Debbie Law, Dan Haywood, Martin Bond

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Q&A

Q1:What are six different aspects of security?
A1: Six aspects of security are
  • Authentication

  • Authorization

  • Confidentiality

  • Integrity

  • Non-repudiation

  • Auditing

Q2:What are the three participants of the J2EE security domain?
A2: Principal represents an entity (typically a user) in the authentication system of the target environment. Role represents a security role within the application. Role Reference is used to map a coded role name onto an actual role.
Q3:What are the two methods of defining J2EE security?
A3: Declarative and programmatic.
Q4:What are the two EJB context methods and three HTTP Request methods used in programmatic security?
A4:

EJBContext.isCallerInRole()

EJBContext.getCallerPrincipal()

HttpServletRequest.isUserInRole()

HttpServletRequest.getUserPrincipal() ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required