Question: QUESTION 11 Programs must take steps to ensure that data received across a trust boundary is . appropriate and not malicious not appropriate and malicious

QUESTION 11

  1. Programs must take steps to ensure that data received across a trust boundary is .

appropriate and not malicious

not appropriate and malicious

complex and classified

2 points

QUESTION 12

  1. Initialization of a class consists of executing its

Medium

static initializers

Static variable

Low

2 points

QUESTION 13

  1. What method from the Executor class returns a fixed-size thread pool with an upper limit on the number of concurrently executing tasks and maintains an unbounded queue for holding tasks while the thread pool is full?

) newFixedThreadPool()

) newPool()

) FixedThreadPool()

) newThread()

2 points

QUESTION 14

  1. Java's type safety means that fields that are declared private or protected or that have default (package) protection should not be

globally accessible

locally accesible

all of the above

none of the above

2 points

QUESTION 15

  1. Prevent class initialization cycles is represented by rule ........

DCL00-J

DCL01-J.

DCL02-J.

DCL03-J.

2 points

QUESTION 16

  1. Programs must take steps to ensure that data received across a trust boundary is .

appropriate and not malicious

not appropriate and malicious

complex and classified

2 points

QUESTION 17

  1. The remediation cost for DCL01-J is -------

High

Low

Medium

2 points

QUESTION 18

  1. The severity for DCL02-J is

medium

high

Low

none of the above

2 points

QUESTION 19

  1. systems security policy determines which information?

Vulnerable

Valuable

Malicious

Sensitive

2 points

QUESTION 20

  1. there are a ------------------------ built in to Java that enable protected or that have default protection to be overcome such as the misuse of Java reflection

number of vulnerabilities

number of issues

number of problems

None of the above

2 points

QUESTION 21

  1. Prevent class initialization cycles is represented by rule ........

DCL00-J

DCL01-J.

DCL02-J.

DCL03-J.

2 points

QUESTION 22

  1. What is Serialization?

is the process of converting an object into a stream of bytes to store the object or transmit it to memory, a database, or a file.

A correctly synchronized program is one whose sequentially consistent executions lack data races.

Java class that denes a security policy for Java code.

2 points

QUESTION 23

  1. systems security policy determines which information?

Vulnerable

Valuable

Malicious

Sensitive

2 points

QUESTION 24

  1. Declaring shared variables as ___ ensures visibility and limits reordering of access.

int

volatile

virtual

bool

2 points

QUESTION 25

  1. ------- Can occur when resource usage is disproportionately large in comparison to the input data that causes the resource usage?

)Denial of service

)Leaking capabilities

)Liking Sencitive data

none of the about.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!