Which of the following declarations are the valid declaration for the
Each correct answer represents a complete solution. Choose all that apply.
Which of the following methods are used to customize object serialization so that the objects will be able to apply default serialization?
Each correct answer represents a complete solution. Choose two.
You develop an application. Now you want to ensure that data is sent between client and server in such a way that it cannot be changed in transit. Which of the following element declarations will be specified to satisfy the requirement of the application?
Which of the following methods performs the authentication of subject and, if successful, associates Principals and Credentials with the authenticated Subject?
You work as a programmer for PassGuide.Inc. You have a session object named session1 with an attribute named Attribute1, and an HttpSessionBindingEvent object binding1 bound to session1.
Which of the following will be used to retrieve Attribute1?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following statements about data integrity of a container are true?
Each correct answer represents a complete solution. Choose two.
Which of the following methods are used in the verification of a signature?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following pieces of codes will be placed at the line XXX to successfully compile the given class?
public interface Publication
{
String GetDetails();
}
public class Book implements Publication
{
//line XXX
}
Which of the following statements are true about the doAs() and doAsPrivileged() methods?
Each correct answer represents a complete solution. Choose all that apply.