Carlos Veliz
Test por , creado hace más de 1 año

Java - Mix

33
0
0
Carlos Veliz
Creado por Carlos Veliz hace más de 9 años
Cerrar

Java - Mix

Pregunta 1 de 10

1

Indicate which of the statements is the one that corresponds to input validation stored procedures ?.

Selecciona una de las siguientes respuestas posibles:

  • Determines whether the input is given by a real user or a computer program

  • This tecniques is used to prevent the client applications from manipulating the contents of server data

  • Prepared statements support parameterized queries that prevent SQL injection

  • Increased performance of the code in case of repeated SQL statements

Explicación

Pregunta 2 de 10

1

In character encoding, one of the following is not a rule for validation of input data

Selecciona una de las siguientes respuestas posibles:

  • Each character is passed dynamically to the encoding function

  • Limit exact matches

  • Accept desirable known

  • Sanitize known undesirable matches

  • Reject known undesirables

Explicación

Pregunta 3 de 10

1

It is not a principle to implement in code when you want to validate with Struts Validator

Selecciona una de las siguientes respuestas posibles:

  • Implements struts validator class

  • Check for similar number de fields in Action Form and Validation Form

  • Struts validation is done to prevent attacks caused through unchecked input

  • Avoid duplicate validation forms int he validation xml file

  • Enable the Struts Validator in the action form mapping

Explicación

Pregunta 4 de 10

1

In regular expressions, the following expression "(0-9 && (^ 4 5 6 7)" corresponds to:

Selecciona una de las siguientes respuestas posibles:

  • A Single digit 0, 1, or 9

  • Any digit number from 0 -9

  • A single digit that is 4, 5 , 6, or 7

  • A single character that is either a lowercase letter or a digit

  • A single digit that is 0, 1, 2, 3, 8, or 9

Explicación

Pregunta 5 de 10

1

Which of the following statements is not a technique for data validation?

Selecciona una de las siguientes respuestas posibles:

  • Encode Known Bad

  • Known Good

  • Reject Known bad

  • Accepting Exact Match

  • Accept any unknown

Explicación

Pregunta 6 de 10

1

That considerations should know to implement Servlet filters. Check the wrong choice

Selecciona una de las siguientes respuestas posibles:

  • input validation through servlet filters in Java web application is effective due to minor modifications needed for input validation and servlets filters not are centralized in nature

  • Input validation in servlets is through multipart encoded content by handling multipart requests

  • Modern frameworks facilitate to provide input validation in the application itself

  • Servlet can be configured on an application if it does not require multipart request where automatic multipart request should be disabled

  • Application should rely only on one of defense.

Explicación

Pregunta 7 de 10

1

Not a member of the superclass InputStream java.io package

Selecciona una de las siguientes respuestas posibles:

  • ByteArrayInputStream

  • FileInputStream

  • FilterInputStream

  • InputStream

  • ObjectInput

Explicación

Pregunta 8 de 10

1

Select the correct statement about Reader Class:

Selecciona una de las siguientes respuestas posibles:

  • Writer class is the base class of all the java IO Writer APIs

  • Subclasses include PrintWriter, BuferedWriter, etc

  • Subclasses include PushbackReader, BufferedReader, etc

  • Subclasses include StreamReader, PrintReader, etc

Explicación

Pregunta 9 de 10

1

To prevent exposure of buffers used by untrusted code:

Selecciona una de las siguientes respuestas posibles:

  • getbuffercopy()

  • CharBuffer.wrap(data_array)

  • CharBuffer.wrap(data_array).asReadOnlyBuffer()

  • BufferedInputStream(system.input_strm)

Explicación

Pregunta 10 de 10

1

Indicate which of the following statements is not a baseline for designing secured software:

Selecciona una de las siguientes respuestas posibles:

  • Reduce the number of persons while granting the high privileges

  • Use only trusted interfaces to reduce the exposure of the data passed between software and its environment

  • Avoid having multiple subjects sharing mechanisms to grant access to a resource

  • Reduce the amont of time on holds onto its privileges

Explicación