单选题A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()ATransfer ObjectBSession FacadeCIntercepting FilterDTemplate MethodEModel-View-Controller

单选题
A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()
A

Transfer Object

B

Session Facade

C

Intercepting Filter

D

Template Method

E

Model-View-Controller


参考解析

解析: 暂无解析

相关考题:

A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?() A.User ID/password fileB.Communications layerC.Client applicationsD.Operating system

A developer has created a web application that includes a servlet for each use case in the application.These servlets have become rather difficult to maintain because the request processing methods havebecome very large. There is also common processing code in many servlets because these use cases arevery similar. Which two design patterns can be used together to refactor and simplify this web application?()A、ProxyB、View HelperC、Front ControllerD、Session FacadeE、Business DelegateF、Model-View-Controller

A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A、Transfer ObjectB、Session FacadeC、Intercepting FilterD、Template MethodE、Model-View-Controller

A developer is designing a web application which extensively uses EJBs and JMS.  The developer finds that there is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further, because of the complexity, there are numerous errors in the code.  Which J2EE design pattern provides a solution for this problem?()A、 CommandB、 Transfer objectC、 Service locatorD、 Session FaçadeE、 Business delegateF、 Data access object

A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()A、 Transfer ObjectB、 Service LocatorC、 Front ControllerD、 Intercepting FilterE、 Business DelegateF、 Model-View-Controller

A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()A、User ID/password fileB、Communications layerC、Client applicationsD、Operating system

A developer is designing a web application which extensively uses EJBs and JMS. The developer finds thatthere is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further,because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides asolution for this problem?()A、CommandB、Transfer ObjectC、Service LocatorD、Session FacadeE、Business Delegate

A developer has created a special servlet that is responsible for generating XML content that is sent to adata warehousing subsystem. This subsystem uses HTTP to request these large data files, which are compressed by the servlet to save internal network bandwidth. The developer has received a request frommanagement to create several more of these data warehousing servlets. The developer is about to copyand paste the compression code into each new servlet. Which design pattern can consolidate thiscompression code to be used by all of the data warehousing servlets?()A、FacadeB、View HelperC、Transfer ObjectD、Intercepting FilterE、Composite Facade

A developer is designing a web application that must support multiple interfaces,including: an XML web service for B2B HTML for web-based clients WML for wireless customers. Which designpattern provides a solution for this problem?()A、Session FacadeB、Business DelegateC、Data Access ObjectD、Model-View-ControllerE、Chain of Responsibility

A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A、 FlyweightB、 Transfer ObjectC、 Service LocatorD、 Dispatcher ViewE、 Business DelegateF、 Model-View-Controller

A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A、FlyweightB、Transfer ObjectC、Service LocatorD、Dispatcher ViewE、Business DelegateF、Model-View-Controller

Which the statement is true about web container session management()?A、 Access to session-scoped attributes is guaranteed to be thread-safe by the web container.B、 To activate URL rewriting, the developer must use the HttpServletResponse.setURLRewriting method.C、 If the web application uses HTTPS, then the web container may use the data on the HTTPS request stream to identify the client.D、 The JSESSIONID cookie is stored permanently on the client so that a user may return to the web application and the web container will rejoin that session.

A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()A、Remote ProxyB、Front ControllerC、Service ActivatorD、Intercepting FilterE、Business Delegate

A Company.com developer has created a web application that includes a servlet for each use case in the application. These servlets have become rather difficult to maintain because the request processing methods have become very large. There is also common processing code in many servlets because these use cases are very similar.  Which two design patterns can be used together to refactor and simplify this web application? ()A、 ProxyB、 View HelperC、 Front ControllerD、 Session FaçadeE、 Business DelegateF、 Model-View-Controller

A developer is designing a web application that must support multiple interfaces, including:   • an XML web service for B2B • HTML for web-based clients • WML for wireless customers   Which design pattern provides a solution for this problem?( )A、 Session FaçadeB、 Business DelegateC、 Data Access ObjectD、 Model-View-ControllerE、 Chain of Responsibility

单选题A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A FlyweightB Transfer ObjectC Service LocatorD Dispatcher ViewE Business DelegateF Model-View-Controller

单选题A developer has created a special servlet that is responsible for generating XML content that is sent to adata warehousing subsystem. This subsystem uses HTTP to request these large data files, which are compressed by the servlet to save internal network bandwidth. The developer has received a request frommanagement to create several more of these data warehousing servlets. The developer is about to copyand paste the compression code into each new servlet. Which design pattern can consolidate thiscompression code to be used by all of the data warehousing servlets?()AFacadeBView HelperCTransfer ObjectDIntercepting FilterEComposite Facade

单选题Your company has an internal Web application that uses a self-signed SSL certificate.  The company has an internal certification authority (CA) with autoenrollment.When users attempt to start the Web application, Internet Explorer displays an error message that recommends closing the Web page rather than continuing to the application.    You need to ensure that Internet Explorer does not display the error message.   What should you do?()AIssue a certificate from the internal CA and install it on the application serverBInstall the Web application’s certificate into the computer store on each client computerCInstall the Web application’s certificate into the personal store on each client computer. Add the application’s URL to the Trusted Sites zone in Internet ExplorerDPurchase a commercial certificate and install it on the internal CA

单选题Which statement is true about web container session management?()AAccess to session-scoped attributes is guaranteed to be thread-safe by the web container.BTo activate URL rewriting, the developer must use the HttpServletResponse.setURLRewriting method.CIf the web application uses HTTPS, then the web container may use the data on the HTTPS request stream to identify the client.DThe JSESSIONID cookie is stored permanently on the client so that a user may return to the web application and the web container will rejoin that session.

单选题A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()A Transfer ObjectB Service LocatorC Front ControllerD Intercepting FilterE Business DelegateF Model-View-Controller

单选题A developer is designing a web application which extensively uses EJBs and JMS. The developer finds thatthere is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further,because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides asolution for this problem?()ACommandBTransfer ObjectCService LocatorDSession FacadeEBusiness Delegate

单选题A developer is designing a web application that must support multiple interfaces, including: an XML web service for B2B HTML for web-based clients WML for wireless customers. Which designpattern provides a solution for this problem?()ASession FacadeBBusiness DelegateCData Access ObjectDModel-View-ControllerEChain of Responsibility

单选题A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()ARemote ProxyBFront ControllerCService ActivatorDIntercepting FilterEBusiness Delegate

单选题A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()AFlyweightBTransfer ObjectCService LocatorDDispatcher ViewEBusiness DelegateFModel-View-Controller

单选题A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()ATransfer ObjectBSession FacadeCIntercepting FilterDTemplate MethodEModel-View-Controller

单选题A developer is designing a web application that must support multiple interfaces, including:   • an XML web service for B2B • HTML for web-based clients • WML for wireless customers   Which design pattern provides a solution for this problem?( )A Session FaçadeB Business DelegateC Data Access ObjectD Model-View-ControllerE Chain of Responsibility

单选题A developer is designing a web application which extensively uses EJBs and JMS.  The developer finds that there is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further, because of the complexity, there are numerous errors in the code.  Which J2EE design pattern provides a solution for this problem?()A CommandB Transfer objectC Service locatorD Session FaçadeE Business delegateF Data access object

单选题A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()AUser ID/password fileBCommunications layerCClient applicationsDOperating system