< >
Join now to discover more
or create your own Quizzes
GoConqr is a social learning network with free tools, resources, courses and groups.
already a member? Log in

Java - Mix

Question 1 of 10

Medal-premium 1

Indicate which of the statements is the one that corresponds to input validation stored procedures ?.

Select one of the following:

  • Determines whether the input is given by a real user or a computer program

  • This tecniques is used to prevent the client applications from manipulating the contents of server data

  • Prepared statements support parameterized queries that prevent SQL injection

  • Increased performance of the code in case of repeated SQL statements

Question 2 of 10

Medal-premium 1

In character encoding, one of the following is not a rule for validation of input data

Select one of the following:

  • Each character is passed dynamically to the encoding function

  • Limit exact matches

  • Accept desirable known

  • Sanitize known undesirable matches

  • Reject known undesirables

Question 3 of 10

Medal-premium 1

It is not a principle to implement in code when you want to validate with Struts Validator

Select one of the following:

  • Implements struts validator class

  • Check for similar number de fields in Action Form and Validation Form

  • Struts validation is done to prevent attacks caused through unchecked input

  • Avoid duplicate validation forms int he validation xml file

  • Enable the Struts Validator in the action form mapping

Question 4 of 10

Medal-premium 1

In regular expressions, the following expression "(0-9 && (^ 4 5 6 7)" corresponds to:

Select one of the following:

  • A Single digit 0, 1, or 9

  • Any digit number from 0 -9

  • A single digit that is 4, 5 , 6, or 7

  • A single character that is either a lowercase letter or a digit

  • A single digit that is 0, 1, 2, 3, 8, or 9

Question 5 of 10

Medal-premium 1

Which of the following statements is not a technique for data validation?

Select one of the following:

  • Encode Known Bad

  • Known Good

  • Reject Known bad

  • Accepting Exact Match

  • Accept any unknown

Question 6 of 10

Medal-premium 1

That considerations should know to implement Servlet filters. Check the wrong choice

Select one of the following:

  • input validation through servlet filters in Java web application is effective due to minor modifications needed for input validation and servlets filters not are centralized in nature

  • Input validation in servlets is through multipart encoded content by handling multipart requests

  • Modern frameworks facilitate to provide input validation in the application itself

  • Servlet can be configured on an application if it does not require multipart request where automatic multipart request should be disabled

  • Application should rely only on one of defense.

Question 7 of 10

Medal-premium 1

Not a member of the superclass InputStream java.io package

Select one of the following:

  • ByteArrayInputStream

  • FileInputStream

  • FilterInputStream

  • InputStream

  • ObjectInput

Question 8 of 10

Medal-premium 1

Select the correct statement about Reader Class:

Select one of the following:

  • Writer class is the base class of all the java IO Writer APIs

  • Subclasses include PrintWriter, BuferedWriter, etc

  • Subclasses include PushbackReader, BufferedReader, etc

  • Subclasses include StreamReader, PrintReader, etc

Question 9 of 10

Medal-premium 1

To prevent exposure of buffers used by untrusted code:

Select one of the following:

  • getbuffercopy()

  • CharBuffer.wrap(data_array)

  • CharBuffer.wrap(data_array).asReadOnlyBuffer()

  • BufferedInputStream(system.input_strm)

Question 10 of 10

Medal-premium 1

Indicate which of the following statements is not a baseline for designing secured software:

Select one of the following:

  • Reduce the number of persons while granting the high privileges

  • Use only trusted interfaces to reduce the exposure of the data passed between software and its environment

  • Avoid having multiple subjects sharing mechanisms to grant access to a resource

  • Reduce the amont of time on holds onto its privileges


Java - Mix

Carlos Veliz
Quiz by , created about 2 years ago

Java - Mix

Eye 5
Pin 0
Balloon-left 0
Carlos Veliz
Created by Carlos Veliz about 2 years ago