多选题Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()AMANAGER can do a GET on resources in the /Bar/Baz directory.BMANAGER can do a POST on any resource in the /Bar/Baz directory.CMANAGER can do a TRACE on any resource in the /Bar/Baz directory.DDEVELOPER can do a GET on resources in the /Bar/Baz directory.EDEVELOPER can do only a POST on resources in the /Bar/Baz directory.FDEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.

多选题
Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()
A

MANAGER can do a GET on resources in the /Bar/Baz directory.

B

MANAGER can do a POST on any resource in the /Bar/Baz directory.

C

MANAGER can do a TRACE on any resource in the /Bar/Baz directory.

D

DEVELOPER can do a GET on resources in the /Bar/Baz directory.

E

DEVELOPER can do only a POST on resources in the /Bar/Baz directory.

F

DEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.


参考解析

解析: 暂无解析

相关考题:

Giventhetwosecurityconstraintsinadeploymentsecurity-constraint102.!--acorrecturl-patternandhttp-methodgoeshere--103.auth-constraintrole-nameSALES/role-name/auth-.auth-constraint104.role-nameSALES/role-name105./auth-constraint106./security-constraint107.security-constraint108.!--acorrecturl-patternandhttp-methodgoeshere--109.!--Insertanauth-constrainthere--110./security-constraintIfthetwosecurityconstraintshavethesameurl-patternandhttp-methodwhichtwo insertedindependentlyatline109,willallowuserswithrolenamesofeitherSALESorMARKETINGtoaccessthisresource?()

GiventhesecurityconstraintinaDD:101.security-constraint102.web-resource-collection103.web-resource-nameFoo/web-resource-name104.url-pattern/Bar/Baz/*/url-pattern105.http-methodPOST/http-method106./web-resource-collection107.auth-constraint108.role-nameDEVELOPER/role-name109./auth-constraint110./security-constraintAndgiventhatMANAGERisavalidrole-name,whichfouraretrueforthissecurityconstraint?()A.MANAGERcandoaGETonresourcesinthe/Bar/Bazdirectory.B.MANAGERcandoaPOSTonanyresourceinthe/Bar/Bazdirectory.C.MANAGERcandoaTRACEonanyresourceinthe/Bar/Bazdirectory.D.DEVELOPERcandoaGETonresourcesinthe/Bar/Bazdirectory.E.DEVELOPERcandoonlyaPOSTonresourcesinthe/Bar/Bazdirectory.F.DEVELOPERcandoaTRACEonanyresourceinthe/Bar/Bazdirectory.

Which four are valid Oracle constraint types? () A. CASCADEB. UNIQUEC. NONUNIQUED. CHECKE. PRIMARY KEYF. CONSTANTG. NOT NULL

What type of constraint can be used to ensure that, in any given row in a table, the value of one column never exceeds the value of another column?() A.CheckB.RangeC.ReferentialD.Informational

What type of constraint can be used to ensure that, in any given row in a table, the value of one column never exceeds the value of another column?()A、CheckB、RangeC、ReferentialD、Informational

An airline is building a booking system for its premium and general customers. The goal is to ensure premium members are given higher access priority when user traffic is high.    What configuration will achieve this goal?()A、Configure a Work Manager for premium users with a Minimum Thread Constraint.B、Configure a Work Manager for premium users with a higher fair-share-request-class.C、Configure a Work Manager for premium users with a higher response-time-request-class.D、Configure a Work Manager general users with a Maximum Thread Constraint.E、Configure a Work Manager for premium users with a custom request-class.

Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()A、Every  tag must have at least one  tag.B、A  tag can have many  tags.C、A given  tag can apply to only one  tag.D、A given  tag can contain from zero to many  tags.E、It is possible to construct a valid  tag such that,for a given resource,no user rolescan access that resource.

Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()A、MANAGER can do a GET on resources in the /Bar/Baz directory.B、MANAGER can do a POST on any resource in the /Bar/Baz directory.C、MANAGER can do a TRACE on any resource in the /Bar/Baz directory.D、DEVELOPER can do a GET on resources in the /Bar/Baz directory.E、DEVELOPER can do only a POST on resources in the /Bar/Baz directory.F、DEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.

Given the two security constraints in a deployment descriptor: 101. 102.  103.SALES 104.SALES 105. 106. 107. 108.  109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()A、auth-constraint/B、auth-constraintrole-name*/role-name/auth-constraintC、auth-constraintrole-nameANY/role-name/auth-constraintD、auth-constraintrole-nameMARKETING/role-name/auth-constraint

Which statements concerning the relationships between the following classes are true?()   class Foo {  int num;   Baz comp = new Baz();   }   class Bar {  boolean flag;   }   class Baz extends Foo {   Bar thing = new Bar();   double limit;   }  A、A Bar is a Baz.B、A Foo has a Bar.C、A Baz is a Foo.D、A Foo is a Baz.E、A Baz has a Bar.

Given: 3.class MyServlet extends HttpServlet { 4.public void doPut(HttpServletRequest req, HttpServletResponse resp) throws ServletException,IOException { 5.// servlet code here ... 26.} 27.} If the DD contains a single security constraint associated with MyServlet and its only  tagsand  tags are:GETPUT Admin Which four requests would be allowed by the container?()A、A user whose role is Admin can perform a PUT.B、A user whose role is Admin can perform a GET.C、A user whose role is Admin can perform a POST.D、A user whose role is Member can perform a PUT.E、A user whose role is Member can perform a POST.F、A user whose role is Member can perform a GET.

Which two statements are true about the primary key constraint in a table? ()A、It is not possible to disable the primary key constraint.B、It is possible to have more than one primary key constraint in a single table.C、The primary key constraint can be referred by only one foreign key constraint.D、The primary key constraint can be imposed by combining more than one column.E、The non-deferrable primary key constraint creates an unique index on the primary key column if it is not already indexed.

Examine the following statement that is used to modify the constraint on the SALES table: SQL ALTER TABLE SALES MODIFY CONSTRAINT pk DISABLE VALIDATE; Which three statements are true regarding the above command()A、The constraint remains valid.B、The index on the constraint is dropped.C、It allows the loading of data into the table using SQL*Loader.D、New data conforms to the constraint, but existing data is not checkedE、It allows the data manipulation on the table using INSERT/UPDATE/DELETE SQL statements.

In a Java EE messaging application, one MDB is consuming a lot of memory at high traffic.    What configuration should you use to prevent possible out-of-memory error at high traffic and at the same time not losing messages?()A、Configure a Work Manager for the MDB with a Maximum Thread Constraint.B、Configure a Work Manager for the MDB with a Minimum Thread Constraint.  C、Configure a Work Manager for the MDB with a Maximum Thread Constraint and a Capacity Constraint. D、Configure a Work Manager for the MDB with a Minimum Thread Constraint and a Capacity Constraint. E、Configure a Work Manager for the MDB with both a Maximum Thread Constraint and Minimum Thread Constraint.

多选题Given the security constraint in a DD:// 101. 102. 103.Foo 104./Bar/Baz/* 105.POST 106. 107. 108.DEVELOPER 109. 110. And given that "MANAGER" is a valid role-name,which four are true for this security constraint?()AMANAGER can do a GET on resources in the /Bar/Baz directory.BMANAGER can do a POST on any resource in the /Bar/Baz directory.CMANAGER can do a TRACE on any resource in the /Bar/Baz directory.DDEVELOPER can do a GET on resources in the /Bar/Baz directory.EDEVELOPER can do only a POST on resources in the /Bar/Baz directory.FDEVELOPER can do a TRACE on any resource in the /Bar/Baz directory.

多选题Given the two security constraints in a deployment descriptor: 101. 102.  103.SALES 104.SALES 105. 106. 107. 108.  109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()Aauth-constraint/Bauth-constraintrole-name*/role-name/auth-constraintCauth-constraintrole-nameANY/role-name/auth-constraintDauth-constraintrole-nameMARKETING/role-name/auth-constraint

多选题Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()AEvery  tag must have at least one  tag.BA  tag can have many  tags.CA given  tag can apply to only one  tag.DA given  tag can contain from zero to many  tags.EIt is possible to construct a valid  tag such that,for a given resource,no user rolescan access that resource.

多选题Given the two security constraints in a deployment descriptor: 101. 102.  103.SALES 104.SALES 105. 106. 107. 108.  109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()Aauth-constraint/Bauth-constraintrole-name*/role-name/auth-constraintCauth-constraintrole-nameANY/role-name/auth-constraintDauth-constraintrole-nameMARKETING/role-name/auth-constraint

多选题Which three statements are true when working with high-availability clusters?()AThe valid cluster-id range is between 0 and 255.BJUNOS security devices can belong to more than one cluster if cluster virtualization is enabled.CIf the cluster-id value is set to 0 on a JUNOS security device, the device will not participate in the cluster.DA reboot is required if the cluster-id or node value is changed.EJUNOS security devices can belong to one cluster only.

多选题You need to configure port security on switch R1.  Which two statements are true about this  technology? ()APort security can be configured for ports supporting VoIP.BWith port security configured, four MAC addresses are allowed by default.CThe network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.DWithsecurity configured, only one MAC addresses is allowed by default.EPort security cannot be configured for ports supporting VoIP.

多选题Which two management-software applications can you use to manage the Cisco Catalyst Express 500 Series Switches?()ACisco Network AssistantBCisco Security Device ManagerCCisco Device ManagerDCisco Adaptive Security Device Manager

多选题Which two statements are true about the primary key constraint in a table? ()AIt is not possible to disable the primary key constraint.BIt is possible to have more than one primary key constraint in a single table.CThe primary key constraint can be referred by only one foreign key constraint.DThe primary key constraint can be imposed by combining more than one column.EThe non-deferrable primary key constraint creates an unique index on the primary key column if it is not already indexed.

多选题Examine the following statement that is used to modify the constraint on the SALES table: SQL ALTER TABLE SALES MODIFY CONSTRAINT pk DISABLE VALIDATE; Which three statements are true regarding the above command()AThe constraint remains valid.BThe index on the constraint is dropped.CIt allows the loading of data into the table using SQL*Loader.DNew data conforms to the constraint, but existing data is not checkedEIt allows the data manipulation on the table using INSERT/UPDATE/DELETE SQL statements.

多选题Given: 3.class MyServlet extends HttpServlet { 4.public void doPut(HttpServletRequest req, HttpServletResponse resp) throws ServletException,IOException { 5.// servlet code here ... 26.} 27.} If the DD contains a single security constraint associated with MyServlet and its only  tagsand  tags are:GETPUT Admin Which four requests would be allowed by the container?()AA user whose role is Admin can perform a PUT.BA user whose role is Admin can perform a GET.CA user whose role is Admin can perform a POST.DA user whose role is Member can perform a PUT.EA user whose role is Member can perform a POST.FA user whose role is Member can perform a GET.

多选题Which four are valid Oracle constraint types? ()ACASCADEBUNIQUECNONUNIQUEDCHECKEPRIMARY KEYFCONSTANTGNOT NULL

多选题Which statements concerning the relationships between the following classes are true?()   class Foo {  int num;   Baz comp = new Baz();   }   class Bar {  boolean flag;   }   class Baz extends Foo {   Bar thing = new Bar();   double limit;   }AA Bar is a Baz.BA Foo has a Bar.CA Baz is a Foo.DA Foo is a Baz.EA Baz has a Bar.

多选题Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()AIt can be invoked only from the doGet or doPost methods.BIt can be used independently of the getRemoteUser method.CCan return true even when its argument is NOT defined as a valid role name in the deployment descriptor.DUsing the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.