Question: QUESTION 11 Programs must take steps to ensure that data received across a trust boundary is . appropriate and not malicious not appropriate and malicious
QUESTION 11
- Programs must take steps to ensure that data received across a trust boundary is .
| appropriate and not malicious | ||
| not appropriate and malicious | ||
| complex and classified |
2 points
QUESTION 12
- Initialization of a class consists of executing its
| Medium | ||
| static initializers | ||
| Static variable | ||
| Low |
2 points
QUESTION 13
- What method from the Executor class returns a fixed-size thread pool with an upper limit on the number of concurrently executing tasks and maintains an unbounded queue for holding tasks while the thread pool is full?
| ) newFixedThreadPool() | ||
| ) newPool() | ||
| ) FixedThreadPool() | ||
| ) newThread() |
2 points
QUESTION 14
- Java's type safety means that fields that are declared private or protected or that have default (package) protection should not be
| globally accessible | ||
| locally accesible | ||
| all of the above | ||
| none of the above |
2 points
QUESTION 15
- Prevent class initialization cycles is represented by rule ........
| DCL00-J | ||
| DCL01-J. | ||
| DCL02-J. | ||
| DCL03-J. |
2 points
QUESTION 16
- Programs must take steps to ensure that data received across a trust boundary is .
| appropriate and not malicious | ||
| not appropriate and malicious | ||
| complex and classified |
2 points
QUESTION 17
- The remediation cost for DCL01-J is -------
| High | ||
| Low | ||
| Medium |
2 points
QUESTION 18
- The severity for DCL02-J is
| medium | ||
| high | ||
| Low | ||
| none of the above |
2 points
QUESTION 19
- systems security policy determines which information?
| Vulnerable | ||
| Valuable | ||
| Malicious | ||
| Sensitive |
2 points
QUESTION 20
- there are a ------------------------ built in to Java that enable protected or that have default protection to be overcome such as the misuse of Java reflection
| number of vulnerabilities | ||
| number of issues | ||
| number of problems | ||
| None of the above |
2 points
QUESTION 21
- Prevent class initialization cycles is represented by rule ........
| DCL00-J | ||
| DCL01-J. | ||
| DCL02-J. | ||
| DCL03-J. |
2 points
QUESTION 22
- What is Serialization?
| is the process of converting an object into a stream of bytes to store the object or transmit it to memory, a database, or a file. | ||
| A correctly synchronized program is one whose sequentially consistent executions lack data races. | ||
| Java class that denes a security policy for Java code. |
2 points
QUESTION 23
- systems security policy determines which information?
| Vulnerable | ||
| Valuable | ||
| Malicious | ||
| Sensitive |
2 points
QUESTION 24
- Declaring shared variables as ___ ensures visibility and limits reordering of access.
| int | ||
| volatile | ||
| virtual | ||
| bool |
2 points
QUESTION 25
- ------- Can occur when resource usage is disproportionately large in comparison to the input data that causes the resource usage?
| )Denial of service | ||
| )Leaking capabilities | ||
| )Liking Sencitive data | ||
| none of the about. |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
