Notice: Undefined index: exam_geven in /home/ksv69uw2i08d/public_html/onlineexam/exam.php on line 18
J2EE Online Examination
Sreejobs Logo
   For Latest Job Updates  
sreenutech.com Online Exams
Home Govt Jobs IT Fresher Jobs IT Exp Jobs IT Walk-Ins MBA Jobs BPO Jobs Register FAQ’s Post Job Contact Us
Search:
SreeJob Fees   Job Feeds
Hot Jobs
Welcome Guest
Login | Register
Total No Of Questions: 50.
1) Which retrieves all cookies sent in a given HttpServletRequest request?


2) A developer is designing a multi-tier web application and discovers a need to hide the details of establishing and maintaining remote communications from the client. In addition, the application needs to find, in a transparent manner, the heterogeneous business components used to service the client's requests. Which design patterns, working together, address these issues?


3) The Squeaky Bean company has decided to port their web application to a new J2EE 1.4 container. While reviewing the application, a developer realizes that in multiple places within the current application, nearly duplicate code exists that finds enterprise beans. Which pattern should be used to eliminate this duplicate code?


4) You have been contracted to create a web site for a free dating service. One feature is the ability for one client to send a message to another client, which is displayed in the latter client's private page. Your contract explicitly states that security is a high priority. Therefore, you need to prevent cross-site hacking in which one user inserts JavaScript code that is then rendered and invoked when another user views that content. Which two JSTL code snippets will prevent cross-site hacking in the scenario above? (Choose two.)


5) Which two statements about tag files are true? (Choose two.)


6)

Developer has used this code within a servlet:

62. if(request.isUserInRole("vip")) {

63. // VIP-related logic here

64. }

What else must the developer do to ensure that the intended security goal is achieved?


7) Which two are valid and equivalent? (Choose two.)


8)

Given this fragment in a servlet:

23. if(req.isUserInRole("Admin")) {

24. // do stuff

25. }

And the following fragment from the related Java EE deployment descriptor:

812. <security-role-ref>

813. <role-name>Admin</role-name>

814. <role-link>Administrator</role-link>

815. </security-role-ref>

900. <security-role>

901. <role-name>Admin</role-name>

902. <role-name>Administrator</role-name>

903. </security-role>

What is the result?


9)

You are developing several tag libraries that will be sold for development of third-party web applications. You are about to publish the first three libraries as JAR files:container-tags.jar, advanced-html-form-tags.jar, and basic-html-form-tags.jar. Which two techniques are appropriate for packaging the TLD files for these tag libraries? (Choose two.)



10) What is the purpose of session management?

Notice: Undefined offset: 50 in /home/ksv69uw2i08d/public_html/onlineexam/exam.php on line 418
Page 1 of 5
Home | Register for Job Updates | Contact Us