0% found this document useful (0 votes)
21 views25 pages

Joqpqphevj

The document covers various aspects of Java EE, design patterns, JSF, and Facelets, including their components, functionalities, and advantages. It includes direct questions and multiple-choice questions that test knowledge on the purpose of Java enterprise applications, design patterns, JSF features, and the lifecycle of JSF applications. Key concepts such as the middle tier, managed beans, and the benefits of using frameworks like JSF and Facelets are highlighted.

Uploaded by

msnjwko
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views25 pages

Joqpqphevj

The document covers various aspects of Java EE, design patterns, JSF, and Facelets, including their components, functionalities, and advantages. It includes direct questions and multiple-choice questions that test knowledge on the purpose of Java enterprise applications, design patterns, JSF features, and the lifecycle of JSF applications. Key concepts such as the middle tier, managed beans, and the benefits of using frameworks like JSF and Facelets are highlighted.

Uploaded by

msnjwko
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Unit 1

Direct Questions:
What is the purpose of the Java enterprise application model?
• Answer: It defines how various components of an enterprise application are
organized to ensure portability, security, and high developer productivity.

What is the function of the middle tier in a Java EE enterprise application?


• Answer: The middle tier manages business logic, processes data received
from the client with the help of the data tier, and returns processed data to
the client.

What are the three essential components widely used in Java EE applications?

• Answer: Application clients, web components, and enterprise components.

Multiple Choice Questions :


1. What ensures the portability and security of Java EE applications?
A) Java Server Pages
B) Enterprise Java Beans
C) Java programming language and Java Virtual Machine
D) HyperText Transfer Protocol
• Answer: C) Java programming language and Java Virtual Machine
2. What is the primary function of the middle tier in Java EE?
A) Rendering web pages
B) Handling business logic and managing data flow
C) Storing enterprise data
D) Managing user interfaces
• Answer: B) Handling business logic and managing data flow
3. What is NOT considered a web component in Java EE?
A) Servlets
B) Java Server Pages
C) Static HTML pages
D) Java Server Faces
• Answer: C) Static HTML pages
4. What protocol does a web server use to communicate with a client?
A) FTP
B) HTTP
C) SMTP
D) TCP
• Answer: B) HTTP
5. What does an enterprise bean primarily handle in a Java EE application?
A) Presentation logic
B) Business logic
C) Web page rendering
D) Security authentication
• Answer: B) Business logic
6. Which Java EE component is responsible for user interfaces?
A) Enterprise Beans
B) Web Components
C) Security Components
D) Database Components
• Answer: B) Web Components
7. What is the function of the enterprise information system tier?
A) Manage security constraints
B) Handle session management
C) Store and manage enterprise data
D) Process business logic
• Answer: C) Store and manage enterprise data
8. Which of the following is NOT a type of Java EE client?
A) Applets
B) Application clients
C) Web clients
D) Enterprise Beans
• Answer: D) Enterprise Beans
9. What mechanism does Java EE use to simplify security implementation?
A) Manual coding by developers
B) Built-in declarative access control rules
C) Third-party authentication services
D) Static HTML security pages
• Answer: B) Built-in declarative access control rules
10. Which of these components is responsible for processing user requests in a Java
EE web application?
A) Enterprise Beans
B) Servlets
C) Web Server
D) Database
• Answer: B) Servlets
11. What is the main advantage of the multitier architecture?
A) It increases development complexity
B) It enhances scalability and separation of concerns
C) It removes the need for client-server interaction
D) It replaces web browsers with applets
• Answer: B) It enhances scalability and separation of concerns
12. What is the function of a web container in Java EE?
A) Store enterprise data
B) Manage session state
C) Host web components
D) Perform security authentication
• Answer: C) Host web components

Unit 2
Direct Questions:
What is design patterns ,and list four primary categories of design patterns?

• Answer : A design pattern identifies a recurrently occurring problem in a


domain and offers a solution to the problem.
• four primary: Creational, Structural, Behavioral, and Concurrency patterns.

How does the Adapter pattern help in Java applications?


• Answer: It converts the interface of one class into an interface acceptable by
the clients, allowing two incompatible classes to work together.
What is the critical difference between layers and tiers in Java applications?
• Answer: Tiers refer to hardware components that may be on different
machines, while layers refer to the logical separation of components that may
or may not reside on the same machine.

Multiple Choice Questions :

1. What is the main purpose of Unified Modeling Language (UML) in Java


application design?

A) Writing Java code


B) Debugging Java programs
C) Modeling object interactions
D) Improving performance
Answer: C) Modeling object interactions
2. Which pattern ensures that only one instance of a class is created in Java?

A) Factory Pattern
B) Singleton Pattern
C) Observer Pattern
D) Proxy Pattern
Answer: B) Singleton Pattern
3. In a Singleton pattern, why is the constructor of the class made private?

A) To allow multiple instances


B) To prevent instantiation from outside the class
C) To increase performance
D) To make the class abstract
Answer: B) To prevent instantiation from outside the class
4. Which of the following is NOT a category of design patterns?

A) Structural Patterns
B) Creational Patterns
C) Algorithmic Patterns
D) Concurrency Patterns
Answer: C) Algorithmic Patterns
5. Which of the following patterns defines the interaction between objects?

A) Behavioral Patterns
B) Structural Patterns
C) Creational Patterns
D) MVC Patterns
Answer: A) Behavioral Patterns
6. Which of the following is a commonly used Structural Pattern?

A) Singleton Pattern
B) Observer Pattern
C) Factory Pattern
D) Adapter Pattern
Answer: D) Adapter Pattern
7. What role does the controller play in MVC architecture?

A) It manages database transactions


B) It translates data between the user interface and business
components
C) It renders the user interface
D) It stores user data
Answer: B) It translates data between the user interface and business
components
8. What is the purpose of the Integration Layer in Java applications?

A) To handle UI components
B) To define security policies
C) To enable communication between different components
D) To handle user requests
Answer: C) To enable communication between different components
9. Which of the following is NOT part of the MVC architecture?

A) Model
B) Controller
C) Observer
D) View
Answer: C) Observer
10. What kind of pattern is the Factory Pattern classified under?
A) Structural Pattern
B) Creational Pattern
C) Behavioral Pattern
D) Concurrency Pattern
Answer: B) Creational Pattern

Unit 7
Direct Questions:
What is JSF and list 3 Benefits of JSF?

• Answer: SF is a Java-based framework used to build and maintain server-side


user interface components of web applications.
Benefits of JSF:
JSF separates the presentation layer and application logic of the application.
JSF does not limit the developer in terms of using a specific scripting language
or markup language.
JSFs can be used as an additional layer over JSPs of the application or as a
layer over the servlets.

What are the two main phases in the lifecycle of a JSF application?
• The two main phases are the execute phase and the render phase.
What is managed bean and list the five scope options for a managed bean in JSF?
• The managed bean implements the logic for the application.
The five scope options are request, session, application, view, and none.

Multiple Choice Questions :


1. Which of the following is NOT a feature of JSF?
o A) Server-side UI component framework
o B) Supports event handling
o C) Provides database management
o D) Allows user interface development through API and tag library
(Answer: C)
2. What is the role of the tag library in JSF?
o A) Implements page navigation and event handling
o B) Defines tags for connecting UI components to web pages and
server-side objects
o C) Provides direct access to database operations
o D) Handles network communication between the client and server
(Answer: B)
3. Which scope ensures a managed bean is available for a single HTTP request?
o A) Application
o B) Request
o C) View
o D) Session
(Answer: B)
4. What is the primary function of Facelets in JSF?
o A) Provides security mechanisms for web applications
o B) Manages database connections
o C) Enables code reuse and extends functionality through templates
and composite components
o D) Facilitates real-time communication between client and server
(Answer: C)
5. Which component is responsible for handling component rendering in JSF?
o A) Managed bean
o B) Render kit
o C) Validation model
o D) Expression language
(Answer: B)
6. What is the significance of the javax.faces.convert.Converter interface?
o A) It converts HTTP requests into JSF component objects
o B) It handles validation of user input fields
o C) It enables automatic conversion between model view data and
presentation view data
o D) It renders UI components on different devices
(Answer: C)
7. Which of the following is NOT a JSF event type?
o A) Data model events
o B) System events
o C) Request events
o D) Application events
(Answer: C)
8. In the JSF lifecycle, what happens in the "Restore View" phase?
o A) The component tree is created or restored
o B) Validation of user input occurs
o C) The response page is rendered
o D) The managed bean updates the model
(Answer: A)
9. Which phase of the JSF lifecycle processes component events?
o A) Apply Request Values
o B) Invoke Application
o C) Restore View
o D) Process Events
(Answer: B)
10. What is the base class for all UI components in JSF?
• A) javax.faces.render.Renderer
• B) javax.faces.UIComponentBase
• C) javax.faces.component.UIComponent
• D) javax.faces.application.Application
(Answer: C)

Unit 8
What are the components required in a typical JSF Web page?
Answer:
• Namespace declarations
• HTML head and body tags (optional)
• Form tag for user input components

How does JSF ensure deferred evaluation of expressions in expression language?


Answer: It allows expressions to be evaluated only after validation and conversion
phases are complete.

What are the required tasks to configure a JSF application?


Answer:
• Registering managed beans
• Configuring managed beans
• Defining navigation rules
• Packaging application resources

Multiple Choice Questions :


1. Which tag library is essential for defining HTML user interface components
in JSF?
A) JSF Core Tag Library
B) JSF HTML Render Kit
C) JSF AJAX Tag Library
D) XML Standard Library
Answer: B) JSF HTML Render Kit
2. What does the ‘binding’ attribute in JSF do?
A) Binds managed beans to the UI component instance
B) Binds managed beans to database connections
C) Binds managed beans to JavaScript events
D) Binds managed beans to CSS styles
Answer: A) Binds managed beans to the UI component instance
3. Which of the following is NOT a valid binding type for a managed bean
property?
A) Component value
B) Component instance
C) Component color
D) Validator instance
Answer: C) Component color
4. Which two tag libraries must every JSF page have access to?
A) JSF Core Tag Library and HTML Render Kit
B) XML Tag Library and HTML Render Kit
C) AJAX Tag Library and JSF Core Tag Library
D) XHTML Tag Library and JSF Core Tag Library
Answer: A) JSF Core Tag Library and HTML Render Kit
5. What is the primary purpose of a managed bean in a JSF application?
A) Managing session data only
B) Handling JavaScript functions in JSF pages
C) Providing getter/setter methods and business logic
D) Defining CSS properties for UI elements
Answer: C) Providing getter/setter methods and business logic
6. Where must XML version number and encoding attribute be specified in a
JSF configuration file?
A) Inside the <faces-config> tag
B) As the last entry in the configuration file
C) At the beginning of the configuration file
D) Inside the <application> tag
Answer: C) At the beginning of the configuration file
7. How can multiple tag libraries be used within a single JSF page?
A) By importing them in JavaScript
B) By using prefixes when declaring each tag library
C) By including multiple <html> elements
D) By adding them inside a <style> tag
Answer: B) By using prefixes when declaring each tag library
8. Which is NOT a function of the faces-config.xml file?
A) Registering managed beans
B) Configuring application navigation
C) Managing database connections
D) Packaging application resources
Answer: C) Managing database connections
9. What is the benefit of deferring evaluation of expressions in JSF?
A) It increases processing time
B) It allows validation and conversion to complete before evaluation
C) It enables the immediate execution of methods
D) It prevents expression language from functioning
Answer: B) It allows validation and conversion to complete before evaluation
10. Which tag is used to submit a JSF form?
A) <h:commandButton>
B) <h:submit>
C) <h:formSubmit>
D) <h:click>
Answer: A) <h:commandButton>

Unit 9
What is Facelets and list 3 Advantages of Facelets?
Answer: Facelets is a Web template system used to create Web pages with the help
of a view declaration language.
Advantages of Facelets:
Facelets allow the developer to create templates and composite components.
JSF allows for content reuse through referencing a file or through defining custom
tags
The compilation time for Facelets is less and it allows compile time validation of EL
expressions.

List three tag libraries used in JSF technology.


Answer:
• JavaServer Faces Facelet tag library
• JavaServer Faces HTML tag library
• JavaServer Faces Core tag library
What are the two phases of a Facelets application lifecycle?
Answer: The two phases are the execute phase and the render phase.

Multiple Choice Questions :

1. Which of the following is NOT a feature of Facelets?


a) Allows specifying UIComponent trees in separate files
b) Requires XML configuration files
c) Provides templating and decorators
d) Supports expression language in the tags
Answer: b) Requires XML configuration files

2. Which tag library supports defining custom actions in JSF?


a) h:
b) ui:
c) f:
d) p:
Answer: c) f:

3. Which phase in the Facelets lifecycle handles the rendering of the response?
a) Execute phase
b) Render phase
c) Navigation phase
d) View phase
Answer: b) Render phase

4. Which of the following best describes Facelets' approach to component tree


management?
a) Each request creates a new component tree
b) The component tree is statically defined and does not change
c) Facelets use direct HTML rendering instead of component trees
d) The component tree is managed by client-side JavaScript
Answer: a) Each request creates a new component tree

5. What happens when a user submits a form in a Facelets-based application?


a) The request is directly processed by JavaScript
b) A new component tree is created for rendering
c) The request is ignored if validation fails
d) The state of the previous page is discarded
Answer: b) A new component tree is created for rendering

6. Which tag is used to insert content dynamically into a Facelets page?


a) ui:include
b) ui:insert
c) ui:decorate
d) ui:composition
Answer: b) ui:insert

7. What is a key advantage of using Facelets for JSF applications?


a) Requires less Java coding
b) Allows direct communication with databases
c) Forces the use of XML configuration
d) Does not require templating
Answer: a) Requires less Java coding

8. Which of the following Facelets tags is used for debugging?


a) ui:debug
b) ui:validate
c) ui:composition
d) ui:decorator
Answer: a) ui:debug

9. Where are Facelets web resources such as images and stylesheets typically
stored?
a) /webpages
b) /resources
c) /meta
d) /components
Answer: b) /resources

10. Which object is at the root of every JSF component tree?


a) UIViewRoot
b) UIComponent
c) UIRenderTree
d) FacesConfig
Answer: a) UIViewRoot

Unit 10

What are the three types of session beans?


• Answer:
1. Stateful session beans
2. Stateless session beans
3. Singleton session beans

What is the main purpose of enterprise beans in enterprise applications?


• Answer: Enterprise beans enable modularized development by providing
built-in transaction management, scalability, and security authorization.
. What is the main difference between local and remote clients accessing an
enterprise bean?
• Answer: Local clients run in the same application as the bean, while remote
clients run on a different machine and JVM.

Multiple-Choice Questions
1. Which of the following is NOT a feature provided by enterprise beans?
o A) Transaction management
o B) Scalability
o C) Direct database access
o D) Security authorization
o Answer: C) Direct database access
2. Which version of EJB introduced significant lightweight enhancements for
Web services?
o A) EJB 1.0
o B) EJB 2.0
o C) EJB 3.2
o D) EJB 4.0
o Answer: C) EJB 3.2
3. Which package must be imported to implement message-driven beans?
o A) javax.ejb.MessageDriven
o B) javax.jms.message
o C) javax.ejb.SessionBean
o D) javax.persistence.Entity
o Answer: B) javax.jms.message
4. How does an EJB container help manage transactions?
o A) By automatically rolling back failed transactions
o B) By requiring developers to manually manage transactions
o C) By storing transactions in a file system
o D) By preventing transactions from being aborted
o Answer: A) By automatically rolling back failed transactions
5. Which type of session bean is best suited for a Web service endpoint?
o A) Stateful
o B) Stateless
o C) Singleton
o D) Entity
o Answer: C) Singleton

What is the main function of a no-interface view in local client access?


• A) To provide access through a remote interface
• B) To provide all public methods of the bean
• C) To ensure the method is available only for web clients
• D) To restrict the client to accessing specific methods
• Answer: B) To provide all public methods of the bean
Which of the following statements about singleton session beans is true?
• A) They are instantiated multiple times throughout the application lifecycle.
• B) They are never passive and are only removed when the application shuts
down.
• C) They can be passivated during their lifecycle.
• D) They only exist in the memory for a single request.
• Answer: B) They are never passive and are only removed when the
application shuts down.
What is the state of a stateless session bean after it is instantiated and
dependencies injected?
• A) It is active
• B) It is passivated
• C) It is in the pooled state
• D) It is in the ready state
• Answer: C) It is in the pooled state
Which of the following cannot be invoked through Web service clients?
• A) Stateless session beans
• B) Stateful session beans
• C) Message-driven beans
• D) Singleton session beans
• Answer: C) Message-driven beans

What happens when a local client accesses a bean method with passed
parameters?
• A) It operates on a copy of the parameter.
• B) It operates on the actual parameter.
• C) The parameter is ignored.
• D) The method fails to execute.
• Answer: B) It operates on the actual parameter.

Unit 11

What is the difference between unidirectional and bidirectional relationships in


JPA?
Answer:
Unidirectional: Only one entity maintains a reference to the related entity.
Bidirectional: Both entities reference each other, and one entity is the owner
while the other is the inverse side

List three types of entity relationships in JPA.


Answer: One-to-One, One-to-Many, Many-to-Many
What are the requirements for an entity class?
Answer:
• Must have a default constructor with public or protected access.
• Cannot be final, and no methods/variables should be final.
• Should implement Serializable if passed through a session bean’s remote
interface.
• Instance variables should be private or protected.
• Can extend other entity or non-entity classes.

Multiple-Choice Questions
1. Which of the following is NOT a valid persistent data type in JPA?
o A) java.math.BigInteger
o B) java.sql.Blob
o C) java.util.Date
o D) java.math.BigDecimal
Answer: B) java.sql.Blob
2. What is the default access modifier for instance variables in an entity class?
o A) Public
o B) Private or Protected
o C) Default (package-private)
o D) None of the above
Answer: B) Private or Protected
3. Which annotation is used to map an entity class to a database table?
o A) @Table
o B) @Column
o C) @Entity
o D) @Id
Answer: C) @Entity
4. Which annotation is used to indicate a composite primary key in JPA?
o A) @CompositeKey
o B) @IdClass
o C) @PrimaryKey
o D) @EmbeddedId
Answer: B) @IdClass
5. Which of the following interfaces can be used to represent a collection of
objects in an entity?
o A) java.util.List
o B) java.util.Set
o C) java.util.Map
o D) All of the above
Answer: D) All of the above
6. What is required if an entity class contains a persistent property?
o A) Getter and setter methods
o B) A constructor
o C) A toString() method
o D) An equals() method
Answer: A) Getter and setter methods
7. Which annotation is used to define a many-to-many relationship?
o A) @ManyToMany
o B) @OneToMany
o C) @ManyToOne
o D) @Relationship
Answer: A) @ManyToMany
8. Which of the following is NOT a requirement for a primary key class?
o A) Must be public
o B) Must implement Serializable
o C) Must extend another class
o D) Must have a default constructor
Answer: C) Must extend another class
9. Which of the following statements about transient fields in JPA is TRUE?
o A) They must be explicitly initialized in the constructor
o B) They are not stored in the database
o C) They must have getter and setter methods
o D) They can only be of primitive data types
Answer: B) They are not stored in the database
10. Which JPA annotation is used to validate that a field cannot be null?
o A) @Size
o B) @NonNull
o C) @NotNull
o D) @Valid
Answer: C) @NotNull

Unit 13
What are administered objects in JMS, and what are the two types?
• Answer: Administered objects are configuration objects for JMS clients, and
the two types are Connection Factories and Destinations.

What is the function of a message-driven bean in Java EE applications?


• Answer: It is responsible for receiving asynchronous messages, and multiple
message-driven beans can be pooled together for concurrent message
processing.

What is a connection object in JMS?


• A connection object in JMS implies a virtual connection with the JMS
provider and is created using a JMSContext object.

Multiple Choice Questions :


1. Which of the following best describes JMS?
a) A database management system
b) A messaging standard for Java applications
c) A type of web framework
d) A Java GUI toolkit
o Answer: b) A messaging standard for Java applications
2. What is the primary advantage of loosely coupled communication in JMS?
a) Faster processing time
b) Less network bandwidth usage
c) Sender and receiver do not need to be available at the same time
d) More secure encryption
o Answer: c) Sender and receiver do not need to be available at the
same time
3. In a Point-to-Point messaging model, where is a message stored before
being received?
a) In a topic
b) In a message queue
c) In a database
d) In a cache memory
o Answer: b) In a message queue
4. Which of the following is a key characteristic of asynchronous
communication in JMS?
a) The sender waits for a response
b) Messages are lost if the receiver is unavailable
c) The sender sends a message and does not wait for a response
d) It requires immediate acknowledgment from the receiver
o Answer: c) The sender sends a message and does not wait for a
response
5. Which component is responsible for producing and consuming messages in
JMS?
a) JMS provider
b) JMS client
c) JNDI
d) Message queue
o Answer: b) JMS client

5. In a point-to-point messaging model, messages are consumed from which


entity?
A) Topics
B) Queues
C) Subscriptions
D) Producers
Answer: B) Queues
6. What is the purpose of the JMSExpiration header field?
A) Defines the delivery priority of a message
B) Specifies the message’s expiry time
C) Determines the source of the message
D) Assigns a unique identifier to the message
Answer: B) Specifies the message’s expiry time
7. How does a durable subscription differ from a non-durable subscription?
A) Durable subscriptions retain messages even without an active consumer
B) Non-durable subscriptions allow multiple consumers to share messages
C) Non-durable subscriptions retain messages without an active consumer
D) Durable subscriptions delete messages once consumed
Answer: A) Durable subscriptions retain messages even without an active consumer
8. Which of the following is true about JMS transactions?
A) Messages are added to a queue as soon as they are sent
B) Messages are not acknowledged until the transaction commits
C) A transaction can include messages from multiple JMSContexts
D) Transactions can be implemented using synchronous messaging
Answer: B) Messages are not acknowledged until the transaction commits
9. What is the role of a QueueBrowser in JMS?
A) Sends messages to a queue
B) Removes messages from a queue
C) Allows browsing messages in a queue without consuming them
D) Converts messages into different formats
Answer: C) Allows browsing messages in a queue without consuming them
10. Which of the following is NOT a valid JMS message type?
A) TextMessage
B) BinaryMessage
C) MapMessage
D) ObjectMessage
Answer: B) BinaryMessage

Unit 15

What is the difference between authentication and authorization?


• Answer: Authentication verifies the identity of a user attempting to access
application data, while authorization determines what resources the
authenticated user is allowed to access based on their role.

What are the three layers of security mechanisms defined in Java EE applications?
• Answer: Application Layer Security, Transport Layer Security, and Message
Layer Security.

What is the main disadvantage of Transport Layer Security?


• Answer: Transport Layer Security is tightly coupled with the transport layer
and is only applicable between two communicating entities, making it a point-
to-point security mechanism.

What are the two variants of mutual authentication?


• Answer: Certificate-based authentication and username-password-based
authentication.

Multiple-Choice Questions
1. Which of the following is NOT a characteristic of security mechanisms?
• A) Authentication
• B) Efficiency
• C) Data Integrity
• D) Non-repudiation
• Answer: B) Efficiency
2. What is the main purpose of message layer security?
• A) To protect communication only between two entities
• B) To allow security mechanisms to be applied only to a part of the message
• C) To depend entirely on the transport protocol
• D) To eliminate the need for encryption
• Answer: B) To allow security mechanisms to be applied only to a part of the
message
3. Which security mechanism ensures that users cannot deny an action they
performed?
• A) Authorization
• B) Authentication
• C) Non-repudiation
• D) Confidentiality
• Answer: C) Non-repudiation
4. What is a disadvantage of application layer security?
• A) It cannot protect communication between components
• B) It is not fine-grained
• C) It is not transferable among multiple application types
• D) It does not allow for secure authentication
• Answer: C) It is not transferable among multiple application types
5. What is the role of JAAS in Java security?
• A) It provides authentication and authorization services
• B) It encrypts data during communication
• C) It prevents unauthorized users from accessing databases
• D) It ensures role-based access to files only
• Answer: A) It provides authentication and authorization services

Which Java EE security mechanism involves defining security roles through


annotations?
• a) Programmatic security
• b) Message security
• c) Declarative security
• d) Digest authentication
• Answer: c) Declarative security

Which security mechanism is NOT considered very strong?


• a) Basic authentication
• b) Digest authentication
• c) Mutual authentication
• d) Client authentication
• Answer: a) Basic authentication

Which Java security mechanism is NOT part of Java EE but works at the
application layer?
• a) Declarative security
• b) Message security
• c) Programmatic security
• d) Form-based authentication
• Answer: b) Message security

Which mechanism encrypts data in transmission using a public key?


• a) Digest authentication
• b) Message security
• c) Client authentication
• d) Form-based authentication
• Answer: c) Client authentication

Which authentication mechanism uses cryptographic hashing of the password?


• a) Basic authentication
• b) Form-based authentication
• c) Digest authentication
• d) Mutual authentication
• Answer: c) Digest authentication

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy