• Post Reply Bookmark Topic Watch Topic
  • New Topic
programming forums Java Mobile Certification Databases Caching Books Engineering Micro Controllers OS Languages Paradigms IDEs Build Tools Frameworks Application Servers Open Source This Site Careers Other Pie Elite all forums
this forum made possible by our volunteer staff, including ...
Marshals:
  • Campbell Ritchie
  • Jeanne Boyarsky
  • Ron McLeod
  • Paul Clapham
  • Liutauras Vilda
Sheriffs:
  • paul wheaton
  • Rob Spoor
  • Devaka Cooray
Saloon Keepers:
  • Stephan van Hulst
  • Tim Holloway
  • Carey Brown
  • Frits Walraven
  • Tim Moores
Bartenders:
  • Mikalai Zaikin

Some Java Secure Programming Concepts Questions - Need Answer

 
Greenhorn
Posts: 1
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Q1) a non sealed/non final method or class can be
a)inherited
b)hashed
c)encrypted
d)volatile

Q2)How is plain text protected while in transmit over network?
a)By being place in cookie
b)By being encrypted and/or using SSL
c)By using secret code
d)by using XML

Q3)--------is keeping track of user activity while the user is logger in?
a)session management
b)l ogging
c)scanning
d)validation

Q4)how can direct access of JSP can be prevented ?
a)put the JSP pages in a directory under WEB-INF , for example ,WEB-INF/jsp
b)use container security
c)none
d)both a) and b)

Q5)Failing to --- output makes the application vulnerable to cross site scripting ?
a)decode
b)validate
c)encode
d)test

Q6)The option “remember me in this system “ is an example of
a)logging
b)authorization
c)authentication
d)session management

Q7)____________is keeping track of user activities when the user is logged in
Seesion mngt
Logging
Scanning
Validation

Q8)How passwords stored
Encrypted
Hashed
Plain text
None

Q9)which of the following is a valid programming error category Risky Resource Management ?
a)proper initialization
b)Trusted search path
C)Improper initialization
d)correct calculation

Q10)which of the following is a valid programming error category insecure Interaction between components ?
a)Proper input validation
b)Improper input validation
c)proper output validation
d)proper data validation

Q11)which of the following is the most affected by denial-of-service attacks?
a)Availability
b)Confidentially
c)Integrity
d)authenticity
 
Sheriff
Posts: 5555
326
IntelliJ IDE Python Java Linux
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
This smells like homework. I'm afraid nobody here is going to do it for you. To find out why, please read --> DoYourOwnHomework.
 
Tim Cooke
Sheriff
Posts: 5555
326
IntelliJ IDE Python Java Linux
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
And welcome to the Ranch!

Perhaps you could start by picking one question and telling us what you think the answer is and why. You might get some discussion going that way.
 
Rancher
Posts: 43081
77
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Why don't you start by telling us what you think the answers are, and why, and then we can chime in afterwards.
 
Tim Cooke
Sheriff
Posts: 5555
326
IntelliJ IDE Python Java Linux
  • Mark post as helpful
  • send pies
    Number of slices to send:
    Optional 'thank-you' note:
  • Quote
  • Report post to moderator
Also, cross-posted. Please see our policy on that --> BeForthrightWhenCrossPostingToOtherSites
reply
    Bookmark Topic Watch Topic
  • New Topic