Within the web application deployment descriptor, which defines a valid JNDI environment entry()
A.A B.B C.C D.D
单项选择题Whichpath,relativetoawebapplication’sroot,identifiesthewebapplication’sdeploymentdescriptor?()
A. /conf/web.xml B. /WEB-INF/web.xml C. /conf/server.xml D. /META-INF/web.xml E. /WEB-INF/rules.xml F. /META-INF/server. Xml
多项选择题Which two are true()
A. Line 13 is not valid for a servlet declaration B. Line 14 is not valid for a servlet declaration C. One instance of the servlet will be loaded at startup D. Ten instance of the servlet will be loaded at start up E. the servlet will be referenced by the name catalog in mappings
单项选择题WhenusingFormBasedAuthentication,whichpairoffieldsmustbeusedintheloginform?()
A. j_user and j_id B. j_id and j_password C. j_users and j_password D. j_user and j_password E. j_login and j_password F. j_username and j_password
单项选择题What else must the developer do to ensure that the intended security goal is achieved()?
A. Create a user called vip in the security realm B. Define a group within the security realm and call it vip C. Define a security-role named vip in the development descriptor D. Declare a security-role-ref for vip in the deployment descriptor
多项选择题Whichtwoauthenticationmechanismsprovideweakerprotectionthanothermechanisms?()
A. HTTP Basic Authentication B. Form Based Authentication C. HTTP Digest Authentication D. HTTPS Client Authentication