多选题Which two actions protect a resource file from direct HTTP access within a web application?()APlacing it in the /secure directoryBPlacing it in the /WEB-INF directoryCPlacing it in the /META-INF/secure directoryDCreating a  element within the deployment descriptor

多选题
Which two actions protect a resource file from direct HTTP access within a web application?()
A

Placing it in the /secure directory

B

Placing it in the /WEB-INF directory

C

Placing it in the /META-INF/secure directory

D

Creating a  element within the deployment descriptor


参考解析

解析: 暂无解析

相关考题:

You decided to use Direct NFS configuration in a non-RAC Oracle installation and created the oranfstab file in /etc. Which two statements are true regarding this oranfstab file? () A. Its entries are specific to a single database.B. It contains file systems that have been mounted by Direct NFS.C. It is globally available to all Oracle 11g databases on the machine.D. It contains file systems that have been mounted by the kernel NFS system.

Which two statements are true about the Oracle Direct Network File system (DNFS)?() A. It utilizes the OS file system cache.B. A traditional NFS mount is not required when using Direct NFS.C. Oracle Disk Manager can manage NFS on its own, without using the operating kernel NFS driver.D. Direct NFS is available only in UNIX platforms.E. Direct NFS can load-balance I/O traffic across multiple network adapters.

Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.) A. rate limiting of ICMPB. RADIUS authorizationsC. source address validationD. stateful firewall on the router

Which two statements are true regarding AppFlow? ()(Choose two.) A. Accelerates NFS file sharing, MAPI, and HTTP 1.0.B. Accelerates CIFS, MAPI, and additional TCP traffic specified by app rules.C. Accelerates Samba 3.0, Outlook communications in the enterprise, and HTTP.D. Accelerates Windows XP-based file sharing, MAPI, and access to the intranet web portal.

Which two services protect the ERX Edge Router from unauthorized CLI logins?() A.AB.BC.CD.D

Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()A、 the URL pattern that requires authorizationB、 the HTTP methods that require authorizationC、 the users allowed access to the web resourceD、 the J2EE roles allowed access to the web resourceE、 the authentication mechanism required by the web resource

Which two HTTP methods are used to process from data in a servlet? ()A、 do GETB、 do PutC、 do PostD、 do TraceE、 do SubmitF、 do Process

Your web application requires the ability to load and remove web files dynamically to the web container’s filesystem. Which two HTTP methods are used to perform these actions?()A、PUTB、POSTC、SENDD、DELETEE、REMOVE

Your database is in NOARCHIVELOG mode. After which two operations you should take the backup of control file?()A、adding a new user to the databaseB、dropping a user from the databaseC、dropping a table from the databaseD、dropping a data file from a tablespaceE、adding a new tablespace to the database

Which two client requests are captured during database replay Capture?() (Choose two)A、Flashback queriesB、Shared server requestsC、Login and logoff activities of sessionsD、Direct path load of data from external files by using utilities such as SQL *loaderE、Data definition language (DDL) and data manipulation language (DML) operations

You have a server named Server 1.Server1 runs Windows Server 2012 R2. Server1 has a thin provisioned disk named Disk1.You need to expand Disk1.Which two actions should you perform?()A、From File and Storage Services, extend Disk1B、From File and Storage Services, add a physical disk to the storage poolC、From Disk Management, extend the volumeD、From Disk Management, delete the volume, create a new volume, and then format the volumeE、From File and Storage Services, detach Disk1

Your network contains two Web servers named Web1 and Web2. Web1 hosts the companys corporate Web site. Web2 is a test server that contains a copy of the Web site.Users connect to Web1 by using the URL http://www.contoso.com.A Web developer named User1 plans to test updates to the Web site on Web2.You need to ensure that User1 connects to Web2 by using the URL http://www.contoso.com. The solution must ensure that all other computers connect to Web1.What should you do?()A、From User1s computer, create a record in the Hosts file.B、From User1s computer, create a record in the Lmhosts file.C、From a DNS server, create a new Host (A) resource record.D、From a DNS server, create a new Alias (CNAME) resource record.

You have a file server that runs Windows Server 2008. You configure quotas on the server. You need to view each users quota usage on a per folder basis. What should you do?()A、 From File Server Resource Manager, create a File ScreenB、 From File Server Resource Manager, create a Storage Management report.C、 From the command prompt, run dirquota.exe quota list.D、 From the properties of each volume, review the Quota Entries list.

In which order are job stream / job dependencies resolved? ()A、 predecessor - start time - prompt - file - resourceB、 start time - prompt - predecessor - resource - fileC、 prompt - predecessor - start time - file - resourceD、 file - start time - prompt - resource - predecessor

多选题Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)Arate limiting of ICMPBRADIUS authorizationsCsource address validationDstateful firewall on the router

多选题Which two pieces of information are needed when declaring the web resource collection in the deployment descriptor?()Athe URL pattern that requires authorizationBthe HTTP methods that require authorizationCthe users allowed access to the web resourceDthe J2EE roles allowed access to the web resourceEthe authentication mechanism required by the web resource

多选题Your web application requires the ability to load and remove web files dynamically to the web container’s filesystem. Which two HTTP methods are used to perform these actions?()APUTBPOSTCSENDDDELETEEREMOVE

多选题Your database is in NOARCHIVELOG mode. After which two operations you should take the backup of control file?()Aadding a new user to the databaseBdropping a user from the databaseCdropping a table from the databaseDdropping a data file from a tablespaceEadding a new tablespace to the database

多选题Which two policy actions are considered flow control actions?()ArejectBcommunity addCnext termDnext policy

单选题Which JSP standard action can be used to import content from a resource called foo.jsp?()Ajsp:import file=’foo.jsp’ /Bjsp:import page=’foo.jsp’ /Cjsp:include page=’foo.jsp’ /Djsp:include file=’foo.jsp’ /

多选题Which two HTTP methods are used to process from data in a servlet? ()Ado GETBdo PutCdo PostDdo TraceEdo SubmitFdo Process

单选题During maneuvering operations for a direct reversing large, low-speed, main propulsion diesel engine, which of the following actions is used to stop the shaft from turning prior to reversing the engine rotation?()AFlywheel inertiaBAdmission of starting airCThe way of the vesselDsecuring of fuel to the cylinders

多选题You decided to use Direct NFS configuration in a non-RAC Oracle installation and created the oranfstab file in /etc. Which two statements are true regarding this oranfstab file? ()AIts entries are specific to a single database.BIt contains file systems that have been mounted by Direct NFS.CIt is globally available to all Oracle 11g databases on the machine.DIt contains file systems that have been mounted by the kernel NFS system.

多选题You use Microsoft .NET Framework 4 to create a custom Windows Presentation Foundation (WPF) application. Your environment includes several WPF applications. The applications use the same logo and style configuration as part of a corporate standard. You need to ensure that the existing applications can be updated to use the same logo and style settings without recompiling. Which two actions should you perform?()AMark the resource as an embedded resource in each application.BCreate a resource in an XAML file that contains the logo and style configurations.CCreate a resource in a custom control that contains the logo and style configurations.DAdd the resource as a ResourceDictionary in the MergedDictionaries collection of each application.EUse ResourceManager to read the content of the resource. Manually assign the style configurations included in the resource file to the appropriate control in each application.

单选题In which order are job stream / job dependencies resolved? ()A predecessor - start time - prompt - file - resourceB start time - prompt - predecessor - resource - fileC prompt - predecessor - start time - file - resourceD file - start time - prompt - resource - predecessor

多选题Which two statements are true regarding AppFlow? ()(Choose two.)AAccelerates NFS file sharing, MAPI, and HTTP 1.0.BAccelerates CIFS, MAPI, and additional TCP traffic specified by app rules.CAccelerates Samba 3.0, Outlook communications in the enterprise, and HTTP.DAccelerates Windows XP-based file sharing, MAPI, and access to the intranet web portal.

单选题Where do you configure SCREEN options?()Azones on which an attack might arriveBzones you want to protect from attackCinterfaces on which an attack might arriveDinterfaces you want to protect from attack