Questionnaire
0
Votes
1
Ans
class Sample{ private double num = 1 00; private int square(int a){ return a*a; }}
219 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
_ and ___ are the access specifiers that can be applied to top level Class.
212 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
The statement causes the program execution to stop and JVM to shut down.
213 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
French curly braces {} is a must if the for loop executes more than one statement. State true or false- Select one:
218 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
You need to ensure that domain-linked GPOs are not blocked in subordinate OUs.What should you do?
775 viewsUday Haldkar Changed status to publish
0
Votes
1
Ans
Which of the following are the best practices for secure user authentication?
962 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which JDBC class can help to prevent SQL injection attacks?
1.01K viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What are the best practices for secure password storage?
921 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which of the following are the best practices for maintaining data confidentiality in Java?
945 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which of the following is true for secure caller access in Java?
1.07K viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which of the following should you do in development, but not in production code, when working with security contexts?
1.02K viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What is the default Java policy file?
1.02K viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What should programmers be aware of when using containers?
997 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which of the following are the best practices for working with doPrivileged?
943 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which of the following are true for the Java permissions model?
930 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
What are the best practices for implementing Secure Network Communications in Java applications?
921 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which statement regarding XSS attacks is correct?
957 viewsShubham Haldkar Changed status to publish
0
Votes
1
Ans
Which term best describes the problem associated with XSS?
969 viewsShubham Haldkar Changed status to publish