Question 6 of 275

Mark works as a Programmer for InfoTech Inc. He develops the following deployment descriptor code.

<web-app . . . .>

<display-name>A Secure Application</display-name><servlet>

...

<security-role-ref >

<role-name>Manager</role-name>

<role-link>Admin</role-link>

</security-role-ref>

</servlet>

<security-role>

<role-name>Programmer</role-name>

</security-role>

<security-role>

<role-name>Admin</role-name>

</security-role>

<security-role>

<role-name>Employee</role-name>

</security-role>

</web-app>

Which of the following is a valid isUserInRole() method call that can be made if request is theHttpServletRequest request?

Answer

Suggested Answer

The suggested answer is B.

Question 7 of 275

Which of the following methods of the EJBContext interface can be called by both the BMT and CMT beans?

Each correct answer represents a complete solution. Choose all that apply.

Answer

Suggested Answer

The suggested answer is A, D.

Question 8 of 275

Mark works as a Programmer for InfoTech Inc. He develops a deployment descriptor code that contains three valid

<security-constraint> elements.All of them constraining a Web resource Res1, the

<auth-constraint> sub-element of the <security-constraint> elements are as follows.

<auth-constraint> Admin</auth-constraint>

<auth-constraint> Manager</auth-constraint>

<auth-constraint/>

Which of the following can access the resource Res1?

Answer

Suggested Answer

The suggested answer is B.

Question 9 of 275

Which of the following statements correctly describe the features of the singleton pattern?

Each correct answer represents a complete solution. Choose all that apply.

Answer

Suggested Answer

The suggested answer is A, C, D.

Question 10 of 275

Which of the following deployment descriptor elements must contain the <transport-guarantee> element as its mandatory sub-element?

Answer

Suggested Answer

The suggested answer is A.