This week's giveaway is in the Testing forum.
We're giving away four copies of TDD for a Shopping Website LiveProject and have Steven Solomon on-line!
See this thread for details.
Win a copy of TDD for a Shopping Website LiveProject this week in the Testing forum!
  • Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Paul Clapham
  • Ron McLeod
  • Jeanne Boyarsky
  • Tim Cooke
Sheriffs:
  • Liutauras Vilda
  • paul wheaton
  • Henry Wong
Saloon Keepers:
  • Tim Moores
  • Tim Holloway
  • Stephan van Hulst
  • Carey Brown
  • Frits Walraven
Bartenders:
  • Piet Souris
  • Himai Minh

HFSJ final mock exam question

 
Ranch Hand
Posts: 147
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Your web application has a valid deplyment descriptor in which student and sensei are the only security roles that have been defined.The deployment descriptor contains two security constraints that declare the same resource to be constrained.The first security constraint contains:

234. <auth-constraint>
235. <role-name>student</role-name>
236. </auth-constraint>

And the second security constraint contains:
<auth-constraint/>

which are true?(choose all that apply)

A. As the deployment descriptor stands now,the constrained resource can be accessed by both rules.

B. As the deployment descriptor stands now,the constrained resource can be accessed only by sensei users.

C. As the deployment descriptor stands now,the constrained resource can be accessed only by student users.

D. If the second <auth-constraint> tag is removed , the constrained resource can be accessed by both roles.

E. If the second <auth-constraint> tag is removed , the constrained resource can be accessed only by senseiusers.

F. If the second <auth-constraint> tag is removed , the constrained resource can be accessed only by studentusers.

Can some one answer this please?


Archana
 
Greenhorn
Posts: 26
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
I think the answer is 'D'.

<auth-constraint/> has the final word.It means no users are allowed. So if the <auth-constraint/> tag is removed.It means it the resource is open to all users.
 
Ranch Hand
Posts: 46
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator

F is the answer , I think.

When <auth-constraint/> removed , the access is specified only for student roles.
 
Where all the women are strong, all the men are good looking and all the tiny ads are above average:
Free, earth friendly heat - from the CodeRanch trailboss
https://www.kickstarter.com/projects/paulwheaton/free-heat
reply
    Bookmark Topic Watch Topic
  • New Topic