All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
computer science
advanced java programming
Questions and Answers of
Advanced Java Programming
Compare Web Services with CORBA
Identify the purpose of envelope and encoding namespace.
Explain the role of XML in SOAP.
Describe the basic steps to develop a web service client.
What is the difference between SOAP and other remote access techniques?
What are the elements that should be contained in SOAP message?
What is the function of a SOAP body element?
What do you mean by SOAP encoding?
Give examples where SOAP is used.
What are Transport methods in SOAP?
What is the difference between a synchronous and asynchronous client?
What is the difference between an asynchronous polling and asynchronous callback?
Describe the basic steps to develop an asynchronous client.
Explain how to develop an asynchronous callback client?
Define Web Services.
What is the function of WSDL?
Describe the process of communication between Client and Web Service.
A cipher in cryptography is(a) An algorithm for performing encryption and decryption(b) An encrypted message(c) Both (a) and (b)(d) None of the above
Which one of the following is a cryptographic protocol used to secure HTTP connection?(a) Internet Protocol (IP)(b) Transmission Control Protocol (SCTP)(c) Transport Layer Security
In public key cryptography, the private key is kept by(a) Sender(b) Receiver(c) Both sender and receiver(d) None of the above
Which one of the following algorithms is not used in asymmetric-key cryptography?(a) Electronic code book algorithm(b) RSA algorithm(c) Diffie-hellman algorithm(d) None of the above
Which of the following is the most restricted access specifier?(a) Public(b) Private(c) Protected(d) Package
JCEKS stands for(a) Java Chiper Extension Key Store(b) Joint Cryptography Extension Key Store(c) Java Cryptography Expansion Key Store(d) Java Cryptography Extension Key Store
A security provider is represented by(a) Security class(b) SecurityProvider class(c) SecurityImplementer class(d) Provider class
Which of these packages is used for handling security-related issues in a program?(a) java.lang.security(b) java.security(c) javax.security(d) javax.sec
PKCS stands for(a) Private-Key Cryptography Standards(b) Public-Key Cryptography Standards(c) Public-Key Chiper Standards(d) Protected-Key Cryptography Standards
Which of the following uses a public key?(a) Symmetric key cryptography(b) Secret key cryptography(c) Private key cryptography(d) Public key cryptography
Which of the following is not a message digest algorithm?(a) DES(b) MD5(c) SHA-1(d) SHA-256
What is the full form of PEM?(a) Privacy-enhanced Electronic Mail(b) Privacy-enhanced Electronic Message(c) Private Electronic Mail(d) Public Electronic Mail
Which of the following is a certificate standard?(a) PKCS #12(b) JKS(c) JCEKS(d) X.509
Which of the following is not a signature algorithm?(a) DSA(b) RSA(c) DES(d) ECDSA
Which of the following packages is used for certificates?(a) javax.security.cert(b) java.security.cert(c) javax.cert(d) java.cert
SSL stands for(a) Short Socket Layer(b) Secure Session Layer(c) Secure Socket Layer(d) Short Session Layer
A key store can contain(a) Secret key(b) Certificate(c) Both a) and b)(d) None of the above
What is the full form of JKS?(a) Java Key Storage(b) Java Knowledge Store(c) Java Key Store(d) Joint Key Store
A signature is contained in a(a) Secret key(b) Certificate(c) Public key(d) None of the above
A certificate contains(a) Public key(b) Private key(c) Both a) and b)(d) None of the above
DER stands for(a) Double Encoding Rules(b) Distributed Encoding Rules(c) Distinguished Embedded Rules(d) Distinguished Encoding Rules
Which of the following is not a standard for key store?(a) PKCS #12(b) JKS(c) JCEKS(d) X.509
A trust store can contain(a) Secret key(b) Certificate(c) Both a) and b)(d) None of the above
In Java, which of the following tools is used to manipulate keystores?(a) keytool(b) javap(c) ktool(d) keychange
A public key is represented in Java by(a) PublicKey class(b) PKey class(c) GeneralKey class(d) None of the above
Which of the following is a certificate format?(a) DER(b) X.509(c) PKCS12(d) PKIX
The object’s integrity is ensured using(a) SealedObject(b) SignedObject(c) GuardedObject(d) None of the above
The object’s confidentiality is ensured using(a) SealedObject(b) SignedObject(c) GuardedObject(d) None of the above
The object level access control is provided by(a) SealedObject(b) SignedObject(c) GuardedObject(d) None of the above
Which of the following keys is used to sign an object?(a) Private key(b) Public key(c) Botha) and b)(d) None of the above
The integrity of a SignedObject is verified using(a) Private key(b) Public key(c) Both a) and b)(d) None of the above
Which of the following is true about SignedObject?(a) All objects can be signed(b) Only String objects can be signed(c) A SignedObject is a file(d) Only Serializable objects can be signed
Which of the following store type can store secret keys?(a) PKCS #12(b) JKS(c) JCEKS(d) None of the above
Which of the following options is used with keytool to display the content of a keystore?(a) -print(b) -display(c) -show(d) -list
Which of the following is true about sealed object?(a) Decryption key is required to extract the embedded object.(b) Private key is required to obtain the embedded object.(c) Public key is
Which of the following is true about signed object?(a) Private key is required to obtain the embedded object.(b) Public key is required to obtain the embedded object.(c) No key is required to
Which of the following options is used with keytool to display the content of a certificate?(a) -printcert(b) -displaycert(c) -showcert(d) -listcert
Which of the following options is used with keytool to generate a private/public key pair?(a) -getseckey(b) -genkey(c) -genkeypair(d) -genbothkey
Which of the following is not a secret key generation algorithm?(a) DES(b) AES(c) RC2(d) DSA
Which of the following is not a public key generation algorithm?(a) RSA(b) DSA(c) DH(d) DES
Which of the following methods is used to check the integrity of a signed object?(a) check()(b) compare()(c) verify()(d) doCheck()
Which of the following methods is used to obtain the original object from a signed object?(a) getOriginalObject()(b) getEmbeddedObject()(c) extractObject()(d) getObject()
What is the difference between a SignedObject and SealedObject?
Show how objects can be transferred over the network keeping object’s confidentiality and intrigrity.
What is the purpose of a GuardedObject?
What are the advantages of GuardedObject?
Explain how an RMI application can be made secured.
How will you write and use your own socket factories for RMI applications?
Explain how to make an XML-RPC application secured.
What does the tool jarsigner do?
Show the basic steps required to sign and verify a JAR file using jarsigner tool.
What properties does a message digest satisfy?
What do you mean by signing a JAR file multiple times? What is its usefulness?
Show the different procedures to install a security manager.
What is policy?
What are policy files?
Briefly describe the syntax of a policy file.
What is the purpose of a grant entry in a policy file?
What is the purpose of a permission entry in a policy file?
How do you write custom permission classes?
Which one of the following methods is called first on a servlet?(a) start()(b) initialize()(c) init()(d) doInit()
Which of the following is the name of a web server?(a) Netscape(b) Borland(c) W3C(d) Tomcat
Which is the top-level class/interface in the servlet class hierarchy?(a) javax.servlet.Servlet(b) javax.servlet.HttpServlet(c) javax.servlet.GenericServlet(d) javax.servlet.TopServlet
Which of the following statements is false regarding servlets?(a) The init() function is called only once during the instantiation of the servlet.(b) The HttpServlet class implements the Servlet
A servlet is instantiated when(a) a client makes a request for the first time(b) the web server starts up(c) the client makes a request(d) the source code is compiled
Which of the following interfaces must a single threaded servlet implement?(a) NoMultiThread(b) SingleThread(c) OneThreadModel(d) SingleThreadModel
How many arguments does the service() method take?(a) 1(b) 2(c) 3(d) 4
Which of the following methods is used to retrieve the value of a specified parameter?(a) getParameter()(b) retrieveParameter()(c) parameter()(d) getParam()
Which of the following tags is used to make a named servlet? (a) (b) (c) (d)
Which of the following tags maps a named servlet to a URL pattern? (a) (b)
Which of the following SSI directives displays the value of a variable?(a) Display(b) Print(c) Echo(d) Show
What is the full form of SSI?(a) Server Side Include(b) Server Side Integration(c) Same Side Include(d) Same Side Integration
Which of the following SSI directives is used to insert the content of a server-side program?(a) insert(b) include(c) paste(d) import
Which of the following methods is used to add a cookie to the response?(a) addCookie()(b) sendCookie()(c) installCookie()(d) insertCookie()
What is the name of the servlet configuration file?(a) servlet.xml(b) config.xml(c) web.xml(d) server.xml
Which of the following packages contains Servlet interface?(a) javax.server.servlet(b) javax.servlet(c) java.server.servlet(d) java.servlet
The servlet initialization parameters are specified in the __________ deployment descriptor file as part of a servlet element.(a) web.xml(b) web.doc(c) web.txt(d) web.ini
Which of the following identifies the correct method a servlet developer should use to retrieve data provided by the client?(a) getParameter() against the HttpServletRequest
Which package provides interfaces and classes for writing servlets?(a) javax.servlet(b) javax.java.servlet(c) javax.awt.servlet(d) javax.swing.servlet
The Web server that executes the servlet creates an __________ object and passes this to the servlet’s service method (which, in turn, passes it to doGet or doPost).(a) HttpRequest(b)
Which method can be used to access the ServletConfig object ?(a) getServletInfo()(b) getServletConfig()(c) getInitParameters()(d) getConfig()
What is a servlet?
What are the advantages of servlets over CGI?
Showing 300 - 400
of 1226
1
2
3
4
5
6
7
8
9
10
11
12
13