Question
QUESTION 1 Initialization of a class consists of executing its Medium static initializers Static variable Low 2 points QUESTION 2 The remediation cost for DCL01-J
QUESTION 1
Initialization of a class consists of executing its
Medium | ||
static initializers | ||
Static variable | ||
Low |
2 points
QUESTION 2
The remediation cost for DCL01-J is -------
High | ||
Low | ||
Medium |
2 points
QUESTION 3
To protect against injection attacks What steps must programs take:
Validation | ||
Sanitization | ||
Canonicalization & Normalization | ||
Interrogation | ||
All of the above |
2 points
QUESTION 4
In java, Interfaces, classes, and class members (such as fields and methods are
access-controlled | ||
variables | ||
initializers | ||
None of the above |
2 points
QUESTION 5
------- Can occur when resource usage is disproportionately large in comparison to the input data that causes the resource usage?
)Denial of service | ||
)Leaking capabilities | ||
)Liking Sencitive data | ||
none of the about. |
2 points
QUESTION 6
What kind of injection attack utilizes database commands?
Command Line Injection | ||
Email Injection | ||
SQL Injection | ||
IV Injection |
2 points
QUESTION 7
Java's type safety means that fields that are declared private or protected or that have default (package) protection should not be
globally accessible | ||
locally accessible | ||
all of the above | ||
none of the above |
QUESTION 8
What is Validation?
process of ensuring that input data falls within the expected domain of valid program input | ||
process of lossless reduction of the input to its equivalent simplest known form | ||
process of ensuring that data conforms to the requirements of the subsystem to which it is passed |
2 points
QUESTION 9
What is a security manager?
a Java class that defines a security policy for Java code. | ||
a mechanism for reducing contention in most practical environments | ||
a memory that can be shared between threads. |
2 points
QUESTION 10
In java, Interfaces, classes, and class members (such as fields and methods are
access-controlled | ||
variables | ||
initializers | ||
None of the above |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started