Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

QUESTION 1 Initialization of a class consists of executing its Medium static initializers Static variable Low 2 points QUESTION 2 The remediation cost for DCL01-J

QUESTION 1

Initialization of a class consists of executing its

Medium

static initializers

Static variable

Low

2 points

QUESTION 2

The remediation cost for DCL01-J is -------

High

Low

Medium

2 points

QUESTION 3

To protect against injection attacks What steps must programs take:

Validation

Sanitization

Canonicalization & Normalization

Interrogation

All of the above

2 points

QUESTION 4

In java, Interfaces, classes, and class members (such as fields and methods are

access-controlled

variables

initializers

None of the above

2 points

QUESTION 5

------- Can occur when resource usage is disproportionately large in comparison to the input data that causes the resource usage?

)Denial of service

)Leaking capabilities

)Liking Sencitive data

none of the about.

2 points

QUESTION 6

What kind of injection attack utilizes database commands?

Command Line Injection

Email Injection

SQL Injection

IV Injection

2 points

QUESTION 7

Java's type safety means that fields that are declared private or protected or that have default (package) protection should not be

globally accessible

locally accessible

all of the above

none of the above

QUESTION 8

What is Validation?

process of ensuring that input data falls within the expected domain of valid program input

process of lossless reduction of the input to its equivalent simplest known form

process of ensuring that data conforms to the requirements of the subsystem to which it is passed

2 points

QUESTION 9

What is a security manager?

a Java class that defines a security policy for Java code.

a mechanism for reducing contention in most practical environments

a memory that can be shared between threads.

2 points

QUESTION 10

In java, Interfaces, classes, and class members (such as fields and methods are

access-controlled

variables

initializers

None of the above

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Pro Database Migration To Azure Data Modernization For The Enterprise

Authors: Kevin Kline, Denis McDowell, Dustin Dorsey, Matt Gordon

1st Edition

1484282299, 978-1484282298

More Books

Students also viewed these Databases questions

Question

Are these written ground rules?

Answered: 1 week ago

Question

How do Excel Pivot Tables handle data from non OLAP databases?

Answered: 1 week ago