In the JAAS architecture, which of the following modules does not correspond to the login modules?
What is the correct order of steps to implement the authorization JASS?
Subject - Security Manager - Permission - Access Controller - Protected Domain - Permission Collection - Policy - Policy File
Permission - Subject - Access Controller - Protected Domain - Permission Collection - Policy
Subject - Permission - Access Controller - Protected Domain - Permission Collection - Policy
Subject - Permission - Security Manager - AccessControl Context - Access Controller - Permission Collection - Protected Domain - Policy File - Policy
Subject - Permission - Security Manager - Access Controller - AccessControl Context - Protected Domain - Permission Collection - Policy - Policy File
Flag, specifies the way to respond when the current login module gives an authentication failure. Which of the following values can be set to flag?
True and False
Which of the terms is not part of the implementation of Login Module?
The description: "Removes all the Principals and credentials associated with the Subject". It corresponds to the method:
In the architecture of JAVA EE. Which of the following statements belong to the DATA Tier?
Web Services Client
Which of the following is not a popular Java EE server?
What is the default port for the Tomcat server shutdown?
Indicate the statement which he considers a good practice to ensure tomcat server
Delete everithing from path HOME/webapps
Delete everithing from path HOME/server/webapps
Ensure that the default web servlet configuration does not serve the index pages in the absense of a welcome page
Clear all text password from HOME/conf/server.xml
All of the above
Declaring roles. Which of the following does not belong to the method annotations?