A. HTTP Basic Authentication B. Form Based Authentication C. HTTP Digest Authentication D. HTTPS Client Authentication
单项选择题Whenaddingaelementtoawebapplicationdeploymentdescriptor,theinclusionofwhichsub-elementrequiresthedefinitionofanerrorpage()?
A. <realm-name> B. <auth-metod> C. <auth-constraint> D. <form-login-config> E. <user-data-constaint>
单项选择题Whichsecuritymechanismcanbedirectedthroughtheelementinawebdeploymentdescriptor()?
A. authorization B. data integrity C. confidentiality D. authentication
多项选择题A Company.com developer has created a web application that includes a servlet for each use case in the application. These servlets have become rather difficult to maintain because the request processing methods have become very large. There is also common processing code in many servlets because these use cases are very similar. Which two design patterns can be used together to refactor and simplify this web application? ()
A. Proxy B. View Helper C. Front Controller D. Session Façade E. Business Delegate F. Model-View-Controller
单项选择题WhichischaracteristicoftheBusinessDelegatepattern?()
A. It decreases complexity by removing a layer of proxy classes. B. It reduces coupling between tiers by hiding implementation details. C. It decreases performance due to the lack of caching of remote data. D. It forces business-tier expectations to be dealt with in the presentation-tier.
单项选择题Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1 0 operation, which results in very poor performance. Which J2EE pattern can help with this performance issue?()
A. Transfer Object B. Service Locator C. Intercepting Filter D. Model-View-Controller