Coffee Cram: Mock Exam Chapter 12

  1. Which security mechanisms always operate independently of the transport layer? (Choose all that apply.)

    A.

    authorization

    B.

    data integrity

    C.

    authentication

    D.

    confidentiality

  2. Given a deployment descriptor with three valid <security-constraint> elements, all constraining web resource A, whose respective <auth-constraint> sub-elements are:

    <auth-constraint>
        <role-name>Bob</role-name>
    </auth-constraint>
    <auth-constraint/>
    <auth-constraint>
        <role-name>Alice</role-name>
    </auth-constraint>

    Who can access resource A?

    A.

    no one

    B.

    anyone

    C.

    only Bob

    D.

    only Alice

    E.

    only Bob and Alice

    F.

    anyone ...

Get Head First Servlets and JSP, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.