GIAC Secure Software Programmer – Java
Last Update May 18, 2024
Total Questions : 275
We are offering FREE GSSP-Java GIAC exam questions. All you do is to just go and sign up. Give your details, prepare GSSP-Java free exam questions and then go for complete pool of GIAC Secure Software Programmer – Java test questions that will help you more.
Identify whether the given statement is true or false.
"When an exception occurs in a try block, each catch statement following the try block is inspected in sequential order, and the last one whose type matches that type of exception is executed."
You work as a programmer for PassGuide.Inc. You have a session object named session1 with an attribute named Attribute1, and an HttpSessionBindingEvent object binding1 bound to session1.
Which of the following will be used to retrieve Attribute1?
Each correct answer represents a complete solution. Choose all that apply.
Identify whether the given statement is true or false.
"JAR files can be used while compiling but not while executing other files."
Which of the following security related elements of the deployment descriptor matches the argument to the isCallerInRole() method?
Which of the following methods of the HttpServletResponse interface is used for URL rewriting?
Each correct answer represents a complete solution. Choose all that apply.
John works as a Programmer for Technostar Inc. He writes the following code using Java.
1. class WrapperClass{
2. public static void main(String[] argv){
3. String str2 = Double.toString(12);
4. String str1 = Double.toHexString(12);
5. System.out.println(str1+str2);
6. }
7. }
What will happen when John attempts to compile and execute the code?
Which of the following methods of the HttpServletResponse interface is used for URL rewriting?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following methods is used to authenticate the users, and if the user has not been authenticated, the method returns false?
Which of the following methods returns a Cipher object that implements the specified transformation?
Mark works as a Programmer for InfoTech Inc. He wants to develop a JMS API application that is used as a messaging service application. He writes the following createSession() method.
session = connection.createSession(false, 2);
Which of the following statements are true about the syntax?
Each correct answer represents a complete solution. Choose all that apply.
You write the following code.
class Father {public void Method() {System.out.println("I am Father");}}
public class Son extends Father {public static void main(String argv[]) {Son son = new Son();son.Method();}
private void Method() {System.out.println("I am Son");}}
Which of the following will be the result, when you try to compile and run the code?
You work as a Software Developer for UcTech Inc. You want to write a filter that will implement the Filter interface. Which of the following methods will you use to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are valid thread state transitions?
Each correct answer represents a complete solution. Choose all that apply.
You work as a programmer for PassGuide.Inc. You have a session object named session1 with an attribute named Attribute1, and an HttpSessionBindingEvent object binding1 bound to session1.
Which of the following will be used to retrieve Attribute1?
Each correct answer represents a complete solution. Choose all that apply.
Sam works as a Software Developer for Gentech Inc. He writes the following code.
1. class TryFinallyTest {
2. public static void main(String[] args) {
3. try {
4. int i=15/0;
5. System.out.println("Testing Try");
6. }
7. catch(ArithmeticException ae) {
8. System.out.println("Arithmetic exception");
9. }
10. System.out.println("Correct");
11. finally {
12. System.out.println("Must execute");
13. }
14. }
15. }
What will happen when he attempts to compile and execute the code?
Which of the following methods can be invoked from the ejbStore() method of an entity bean class?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following methods is used to encrypt or decrypt data in a single step?
Which of the following rules must be followed while determining a class loader?
Each correct answer represents a complete solution. Choose all that apply.
Mary works as a Software Developer for XYZ Inc. She writes the following code.
1. class Alpha {
2. public static class Beta { }
3. }
4. class Delta {
5. // insert code here
6. }
Which of the following code statements can be inserted at line 5 to create an instance of the Beta class defined in the class Alpha?
Samantha works as a Software Developer for Bluetech Inc. She develops a class Warden that needs to access the Hostel class. The Hostel class is deployed in a JAR named City.JAR. What should be done so that during compilation the Warden class has access to the Hostel class?
Which of the following statements are correct about the code given below?
Each correct answer represents a complete solution. Choose all that apply.
Mark develops an application using Java language. He writes the following code snippet in the application.
public class mClass{
public static void main(String args[]){
try{
return;
}
finally{System.out.print("Finally");}}}
What will happen when Mark attempts to compile and execute the code snippet?
Which of the following statements about various authentication mechanisms in J2EE are true?
Which of the following code fragments will compile without error?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following methods is used to preallocate room for a certain number of characters after a StringBuffer has been constructed?
You work as a Software Developer for UcNet Inc. You write the following code using Java.
class StringTest
{
public static void main(String args[])
{
String s = "Hi";
s.concat("There");
System.out.println(s);
}
}
What will happen when you try to compile and execute the code?
Peter works as a Programmer in Magi Net Inc. He writes the following code.
1. class Ques0190{
2. public static void main(String[] argv){
3. byte a = 100;
4. switch(a){
5. case 10.
6. System.out.println("ten");
7. case 100.
8. System.out.println("hundred");
9. case 1000.
10. System.out.println("thousand");
11. }
12. }
13. }
What will happen when Peter attempts to compile and execute the code?
Which of the following validates an HTML form at client-side before submitting it to the server?
You work as a Software Developer for Developer Inc. You write the following code.
interface A {public boolean b = false;}
class C implements A {public static void main(String args[]) {b = true;System.out.println(b);}}
Which of the following will be the result, when you try to compile and execute the above code?
Which of the following statements about the isUserInRole() method are true?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Software Developer for UcTech Inc. You want the deployment descriptor to contain entries for the authentication type and the security realm. In order to accomplish this, you have to use the sub-elements of the
Each correct answer represents a complete solution. Choose all that apply.
Identify whether the given statement is true or false.
"When a Java program starts up, one thread begins running immediately."
Which of the following methods is used by the AccessController to determine whether or not a requested permission is used by another permission that is known to be valid in the current execution context?
Which of the following methods evaluates the global policy for the permissions granted to the
ProtectionDomain and tests whether the permission is granted?
Which of the following will be returned by the expression "string" instanceof String?
Which of the following statements are true?
Each correct answer represents a complete solution. Choose all that apply.
Identify whether the given statement is true or false.
"If the isUserInRole() method is called on an unauthenticated user, the container returns false."
In which of the following locations the helper classes of a session bean class reside?