Question: QUESTION 40 The severity for DCL02-J is medium high Low none of the above 2 points QUESTION 41 ScheduledExecutor is not an interface of which
QUESTION 40
- The severity for DCL02-J is
| medium | ||
| high | ||
| Low | ||
| none of the above |
2 points
QUESTION 41
- ScheduledExecutor is not an interface of which of the following interfaces?
| ScheduledExecutorService | ||
| Executor | ||
| java.util.concurrent | ||
| ExecutorService |
2 points
QUESTION 42
- What is a security manager?
| a Java class that defines a security policy for Java code. | ||
| a mechanism for reducing contention in most practical environments | ||
| a memory that can be shared between threads. |
2 points
QUESTION 43
- What type of API requires data to be validated before being passed through?
| Trust boundary | ||
| Distrust boundary | ||
| all of the above | ||
| XML |
2 points
QUESTION 44
- A ___ program is one whose sequentially consistent executions lack data races.
| Correctly Synchronized | ||
| Utility | ||
| Final | ||
| Microcode |
2 points
QUESTION 45
- Declaring shared variables as ___ ensures visibility and limits reordering of access.
| int | ||
| volatile | ||
| virtual | ||
| bool |
2 points
QUESTION 46
- Principle of least privilege is ___.
| Executing with maximum privilegesb. | ||
| A program is one whose sequentially consistent executions lack data races | ||
| Executing with minimal privileges | ||
| A Java class that defines a security policy for Java code |
2 points
QUESTION 47
- sensitive information must not be stored in a public field because it could be compromised by anyone who could access the
| JVM running the program | ||
| acces the program | ||
| who ha the paword | ||
| All of the above |
2 points
QUESTION 48
- What kind of injection attack utilizes database commands?
| Command Line Injection | ||
| Email Injection | ||
| SQL Injection | ||
| IV Injection |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
