多选题Which two are characteristics of the Intercepting Filter pattern?()Ait provides centralized request handling for incoming requests.BIt forces resource authentication to be distributed across web components.CIt reduces coupling between presentation-tier clients and underlying business services.DIt can be added and removed unobtrusively, without requiring changes to existing code.EIt allows preprocessing and postprocessing on the incoming requests and outgoing responses.
多选题
Which two are characteristics of the Intercepting Filter pattern?()
A
it provides centralized request handling for incoming requests.
B
It forces resource authentication to be distributed across web components.
C
It reduces coupling between presentation-tier clients and underlying business services.
D
It can be added and removed unobtrusively, without requiring changes to existing code.
E
It allows preprocessing and postprocessing on the incoming requests and outgoing responses.
参考解析
解析:
暂无解析
相关考题:
Which two statements are true about the Websense redirect Web filter solution? ()(Choose two.) A. The Websense redirect Web filter solution does not require a license on the SRX device.B. The Websense server provides the SRX device with a category for the URL and the SRX device then matches the category decides to permit or deny the URL.C. The Websense server provides the SRX device with a decision as to whether the SRX device permits or denies the URL.D. When the Websense server does not know the category of the URL, it sends a request back to the SRX device SurfControl server in the cloud.
What are two characteristics of GSS?() A. It helps verify end-to-end path availability.B. It provides traffic rerouting in case of disaster.C. HSRP, GLBP, and VRRP can be clients of GSS.D. BGP must be the routing protocol between the distributed data centers.E. DNS responsiveness is improved by providing centralized domain management.
Cloud computing provides on-demand service to users by using distributed computing and( )resource management. A.network B.virtual C.centralized D.specializeD.
Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()A、 the URL pattern that requires authorizationB、 the HTTP methods that require authorizationC、 the users allowed access to the web resourceD、 the J2EE roles allowed access to the web resourceE、 the authentication mechanism required by the web resource
Which is characteristic of the Business Delegate pattern?()A、 It decreases complexity by removing a layer of proxy classes.B、 It reduces coupling between tiers by hiding implementation details.C、 It decreases performance due to the lack of caching of remote data.D、 It forces business-tier expectations to be dealt with in the presentation-tier.
A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A、Transfer ObjectB、Session FacadeC、Intercepting FilterD、Template MethodE、Model-View-Controller
A Company.com developer is designing a multi-tier web application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, because the business and resource tiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing client requests. Which design patterns, working together, address these issues?()A、 Front Controller and Transfer ObjectB、 Front Controller and Service LocatorC、 Business Delegate and Transfer ObjectD、 Business delegate and Intercepting FilterE、 Model-View-Controller and Intercepting Filter
A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()A、 Transfer ObjectB、 Service LocatorC、 Front ControllerD、 Intercepting FilterE、 Business DelegateF、 Model-View-Controller
Which three characteristics are true of the ProtectLink Gateway product?()A、protects from spyware and phishing attacksB、provides web server content filteringC、provides encryption between a browser and a web serverD、is bundled in the SPS platformE、blocks 97% of SPAMF、provides content filtering for e-mail
Which two are characteristics of the Intercepting Filter pattern?()A、 it provides centralized request handling for incoming requests.B、 It forces resource authentication to be distributed across web components.C、 It reduces coupling between presentation-tier clients and underlying business services.D、 It can be added and removed unobtrusively, without requiring changes to existing code.E、 It allows preprocessing and postprocessing on the incoming requests and outgoing responses.
A developer is designing a multi-tier web application and discovers a need to log each incoming clientrequest. Which two patterns, taken independently, provide a solution for this problem?()A、Transfer ObjectB、Service LocatorC、Front ControllerD、Intercepting FilterE、Business Delegate
Which the two are characteristics of the Service Locator pattern?()A、 It encapsulates component lookup proceduresB、 It increases source code duplication and decreases reuseC、 It improves client performance by caching context and factory objectsD、 It degrades network performance due to increased access to distributed lookup services
A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()A、Remote ProxyB、Front ControllerC、Service ActivatorD、Intercepting FilterE、Business Delegate
Which two are characteristics of the Front Controller pattern?()A、It simplifies remote interfaces to distributed objects.B、It promotes cleaner application partitioning and encourages reuse.C、It provides an initial point of contact for handling all related requests.D、It reduces maintainability due to the increased complexity of the design.E、It provides loosely coupled handlers that can be combined in various permutations.
多选题Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()Athe URL pattern that requires authorizationBthe HTTP methods that require authorizationCthe users allowed access to the web resourceDthe J2EE roles allowed access to the web resourceEthe authentication mechanism required by the web resource
多选题Which two statements are true about Oracle ActiveCache ?()Ait supports very large data-sets such as the result-sets from large search queries to be held in memoryBit provides a set of management tools that enables automation of configurationCit provides enhanced visibility across the entire application infrastructureDit significantly increases the performance of Web-based applications with no code change
多选题Which the two are characteristics of the Service Locator pattern?()AIt encapsulates component lookup proceduresBIt increases source code duplication and decreases reuseCIt improves client performance by caching context and factory objectsDIt degrades network performance due to increased access to distributed lookup services
多选题What are two characteristics of GSS?()AIt helps verify end-to-end path availability.BIt provides traffic rerouting in case of disaster.CHSRP, GLBP, and VRRP can be clients of GSS.DBGP must be the routing protocol between the distributed data centers.EDNS responsiveness is improved by providing centralized domain management.
单选题A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()A Transfer ObjectB Service LocatorC Front ControllerD Intercepting FilterE Business DelegateF Model-View-Controller
多选题Which two statements are true about Oracle Real Applications Insight ?()Ait provides enhanced visibility across the entire application infrastructureBit provides a set of management tools that enable automation of configuraionCit significantly increases the performance of Web-based applications with no code changeDit dramatically reduces costs associated with diagnostics, configuration, and deployment on production servers
多选题Which two are characteristics of the Transfer Object design pattern?()AIt reduces network traffic by collapsing multiple remote requests into one.BIt increases the complexity of the remote interface by removing coarse-grained methods.CIt increases the complexity of the design due to remote synchronization and version control issues.DIt increases network performance introducing multiple fine-grained remote requests which return verysmall amounts of data.
多选题Which two are characteristics of the Service Locator pattern?()AIt encapsulates component lookup procedures.BIt increases source code duplication and decreases reuse.CIt improves client performance by caching context and factory objects.DIt degrades network performance due to increased access to distributed lookup services.
单选题Which is characteristic of the Business Delegate pattern?()A It decreases complexity by removing a layer of proxy classes.B It reduces coupling between tiers by hiding implementation details.C It decreases performance due to the lack of caching of remote data.D It forces business-tier expectations to be dealt with in the presentation-tier.
单选题A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()ARemote ProxyBFront ControllerCService ActivatorDIntercepting FilterEBusiness Delegate
多选题Which two are characteristics of the Front Controller pattern?()AIt simplifies remote interfaces to distributed objects.BIt promotes cleaner application partitioning and encourages reuse.CIt provides an initial point of contact for handling all related requests.DIt reduces maintainability due to the increased complexity of the design.EIt provides loosely coupled handlers that can be combined in various permutations.
单选题A Company.com developer is designing a multi-tier web application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, because the business and resource tiers are distributed, the application needs to minimize the inter-tier network traffic related to servicing client requests. Which design patterns, working together, address these issues?()A Front Controller and Transfer ObjectB Front Controller and Service LocatorC Business Delegate and Transfer ObjectD Business delegate and Intercepting FilterE Model-View-Controller and Intercepting Filter
多选题Which two statements are true about the Websense redirect Web filter solution? ()(Choose two.)AThe Websense redirect Web filter solution does not require a license on the SRX device.BThe Websense server provides the SRX device with a category for the URL and the SRX device then matches the category decides to permit or deny the URL.CThe Websense server provides the SRX device with a decision as to whether the SRX device permits or denies the URL.DWhen the Websense server does not know the category of the URL, it sends a request back to the SRX device SurfControl server in the cloud.