多选题Which statements about Java code security are true?()AThe bytecode verifier loads all classes needed for the execution of a program.BExecuting code is performed by the runtime interpreter.CAt runtime the bytecodes are loaded, checked and run in an interpreter.DThe class loader adds security by separating the namespaces for the classes of the local file system from those imported from network sources.

多选题
Which statements about Java code security are true?()
A

The bytecode verifier loads all classes needed for the execution of a program.

B

Executing code is performed by the runtime interpreter.

C

At runtime the bytecodes are loaded, checked and run in an interpreter.

D

The class loader adds security by separating the namespaces for the classes of the local file system from those imported from network sources.


参考解析

解析: SL275中描述的Java程序运行的过程是这样的:类加载器(class loader)加载程序运行所需要的所有类,它通过区分本机文件系统的类和网络系统导入的类增加安全性,这可以限制任何的特洛伊木马程序,因为本机类总是先被加载,一旦所有的类被加载完,执行文件的内存划分就固定了,在这个时候特定的内存地址被分配给对应的符号引用,查找表(lookuo table)也被建立,由于内存划分发生在运行时,解释器在受限制的代码区增加保护防止未授权的访问;然后字节码校验器(byte code verifier)进行校验,主要执行下面的检查:类符合JVM规范的类文件格式,没有违反访问限制,代码没有造成堆栈的上溢或者下溢,所有操作 代码的参数类型都是正确的,没有非法的数据类型转换(例如将整型数转换成对象类型)发生;校验通过的字节码被解释器(interpreter)执行,解释器在必要时通过运行时系统执行对底层硬件的合适调用。后三个答案是SL275中的原话。

相关考题:

Which of the following statements about Leopold and Rudolph Blaschka is TRUE?A. They were brothers.B. They were artists.C. They were florists.D. They were farmers.

Click the Exhibit button. Given:Which two statements are true if a NullPointerException is thrown on line 3 of class C? () A.The application will crash.B.The code on line 29 will be executed.C.The code on line 5 of class A will execute.D.The code on line 5 of class B will execute.E.The exception will be propagated back to line 27.

Which two statements about the use of VLANs to segment a network are true?() A. VLANs increase the size of collision domains.B. VLANs allow logical grouping of users by function.C. VLANs simplify switch administration.D. VLANs enhance network security.

In HDLC Protocol, when Supervisory Frame's type code is '00'.About the following statements, which is correct.A.Receive ReadyB.Receive not ReadyC.RejectD.Selective Reject

Which of the following statements about language is NOT true?A.Language is a system B.Language is symbol C.Animals also have language D.Language is arbitrary

Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC

Which statements about Java code security are true?() A、 The bytecode verifier loads all classes needed for the execution of a program.B、 Executing code is performed by the runtime interpreter.C、 At runtime the bytecodes are loaded, checked and run in an interpreter.D、 The class loader adds security by separating the namespaces for the classes of the local file system from those imported from network sources.

Which two statements about the Cisco Nexus 1000V VSM are true?()A、It performs switching decisions and forwarding for the VEMB、It can be run on a virtual machineC、It can be used for remote VEM switching Iine cards

You need to configure port security on switch R1.  Which two statements are true about this  technology? ()A、 Port security can be configured for ports supporting VoIP.B、 With port security configured, four MAC addresses are allowed by default.C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.D、Withsecurity configured, only one MAC addresses is allowed by default.  E、 Port security cannot be configured for ports supporting VoIP.

Which of the following statements is true about a router's eBGP peers that is not also true about that same router's iBGP peers?()A、The eBGP peer neighborship uses TCPB、The eBGP peer uses port 180 (default)C、The eBGP peer uses the same ASN as the local routerD、The eBGP peer updates its AS_Path PA before sending updates to this router

Which two statements about the use of VLANs to segment a network are true? ()A、VLANs increase the size of collision domains.B、VLANs allow logical grouping of users by function.C、VLANs simplify switch administration.D、VLANs enhance network security.

public class Team extends java.util.LinkedList {  public void addPlayer(Player p) {  add(p);  }  public void compete(Team opponent) { /* more code here */ }  }  class Player { /* more code here */ }  Which two are true?()A、 This code will compile.B、 This code demonstrates proper design of an is-a relationship.C、 This code demonstrates proper design of a has-a relationship.D、 A Java programmer using the Team class could remove Player objects from a Team object.

Which statements about inheritance are true?()         A、 In Java programming language only allows single inheritance.B、 In Java programming language allows a class to implement only one interface.C、 In Java programming language a class cannot extend a class and implement a interface together.D、 In Java programming language single inheritance makes code more reliable.

Which statements about the garbage collection are true?() A、 The program developer must create a thread to be responsible for free the memory.B、 The garbage collection will check for and free memory no longer needed.C、 The garbage collection allow the program developer to explicity and immediately free the memory.D、 The garbage collection can free the memory used java object at expect time.

Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()A、It can be invoked only from the doGet or doPost methods.B、It can be used independently of the getRemoteUser method.C、Can return "true" even when its argument is NOT defined as a valid role name in the deployment descriptor.D、Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.

Which three statements about subqueries are true? ()A、Asinglerowsubquerycanretrieveonlyonecolumnandonerow.B、Asinglerowsubquerycanretrieveonlyonerowbutmanycolumns.C、Amultiplerowsubquerycanretrievemultiplerowsandmultiplecolumns.D、Amultiplerowsubquerycanbecomparedusingthe";;";operator.E、AsinglerowsubquerycanusetheINoperator.F、Amultiplerowsubquerycanusethe";=";operator.

单选题Which of the following statements about the golf club is NOT true?AIt’s at the top of the cliff.BThey were not allowed to be in the club.CThey parked the car near the club.

多选题Which two statements are true about the security-related tags in a valid Java EE deployment descriptor?()AEvery  tag must have at least one  tag.BA  tag can have many  tags.CA given  tag can apply to only one  tag.DA given  tag can contain from zero to many  tags.EIt is possible to construct a valid  tag such that,for a given resource,no user rolescan access that resource.

多选题public class Team extends java.util.LinkedList {  public void addPlayer(Player p) {  add(p);  }  public void compete(Team opponent) { /* more code here */ }  }  class Player { /* more code here */ }  Which two are true?()AThis code will compile.BThis code demonstrates proper design of an is-a relationship.CThis code demonstrates proper design of a has-a relationship.DA Java programmer using the Team class could remove Player objects from a Team object.

多选题What two statements are true about Oracle Enterprise Manager’s Java Diagnostic tool, which makes the tool suitable for production server diagnostics ?()Avirtually zero overhead for application running in the JVMBno stalling of running JVM when taking a heap dump for memory analysisCno need of modification, changes, or instrumentation of the application since is uses Network Protocol Analysis (NPA technology)Dprovides Byte Code Instrumentation for Java

多选题You need to configure port security on switch R1.  Which two statements are true about this  technology? ()APort security can be configured for ports supporting VoIP.BWith port security configured, four MAC addresses are allowed by default.CThe network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.DWithsecurity configured, only one MAC addresses is allowed by default.EPort security cannot be configured for ports supporting VoIP.

多选题Which two statements are true about Oracle Real Applications Insight ?()Ait provides enhanced visibility across the entire application infrastructureBit provides a set of management tools that enable automation of configuraionCit significantly increases the performance of Web-based applications with no code changeDit dramatically reduces costs associated with diagnostics, configuration, and deployment on production servers

多选题Which statements about inheritance are true?()AIn Java programming language only allows single inheritance.BIn Java programming language allows a class to implement only one interface.CIn Java programming language a class cannot extend a class and implement a interface together.DIn Java programming language single inheritance makes code more reliable.

多选题Which two statements are true about Oracle ActiveCache ?()Ait supports very large data-sets such as the result-sets from large search queries to be held in memoryBit provides a set of management tools that enables automation of configurationCit provides enhanced visibility across the entire application infrastructureDit significantly increases the performance of Web-based applications with no code change

单选题Which statements about the garbage collection are true?()A The program developer must create a thread to be responsible for free the memory.B The garbage collection will check for and free memory no longer needed.C The garbage collection allow the program developer to explicity and immediately free the memory.D The garbage collection can free the memory used java object at expect time.

多选题Which three statements about subqueries are true? ()AAsinglerowsubquerycanretrieveonlyonecolumnandonerow.BAsinglerowsubquerycanretrieveonlyonerowbutmanycolumns.CAmultiplerowsubquerycanretrievemultiplerowsandmultiplecolumns.DAmultiplerowsubquerycanbecomparedusingthe;;;operator.EAsinglerowsubquerycanusetheINoperator.FAmultiplerowsubquerycanusethe;=;operator.

多选题Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()AIt can be invoked only from the doGet or doPost methods.BIt can be used independently of the getRemoteUser method.CCan return true even when its argument is NOT defined as a valid role name in the deployment descriptor.DUsing the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.