Tag: technology

Questions Related to technology

  1. Security is handled at OS level by giving only read level privilege so no need to put an extra check here

  2. Only problem here is that fileName may not be syntactically incorrect so it should be validated before using it in the function

  3. This code can lead to information disclosure attack

  4. Java provides enough security by default for IO operations so this code is not vulnerable.


Correct Option: C
  1. Subject.doAs()

  2. AccessController.checkPermission()

  3. SecurityManager.checkAccess()

  4. None of the above


Correct Option: A

Please select which of the following statements regarding Java 2 Security is TRUE?

  1. The type safety mechanism in the Java language prevents the execution of malicious code

  2. Two classes with the same fully qualified name but which are defined by different instances of a class loader are NOT of the same type

  3. All signed classes are implicitly trusted and granted full access

  4. The principal role of a TrustManager is to determine if presented authentication credentials should be trusted

  5. Option 1 AND Option 4

  6. Option 2 AND Option 4


Correct Option: F
  1. Create a hash of the document and encrypt the resulting hash using the signer's private key

  2. Encrypt the document using the signer's private key

  3. Encrypt the document using the signer's private key and create a hash of the encrypted document

  4. Encrypt the document using the signer's public key


Correct Option: A

How many of security code review tools available in following list • OWASP WebScarab • Fortify • WebInspect • AppScan • Nikto • FindBugs

  1. 1

  2. 2

  3. 4

  4. 6


Correct Option: B

Which of the following framework provides an annotation based validation mechanism?

  1. Struts 1.1

  2. Struts 1.2

  3. Struts 2

  4. JSF


Correct Option: C

Sequences are accessed using

  1. Prevval

  2. Currval

  3. Newval

  4. Lastval


Correct Option: B