Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

GSSP-Java GIAC Secure Software Programmer – Java Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GIAC GSSP-Java GIAC Secure Software Programmer – Java certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 5
Total 275 questions

Which of the following statements about a JAR file command are true?

Each correct answer represents a complete solution. Choose all that apply.

A.

A JAR file can be created without even using the f command.

B.

The 0 command is used for no compression of a JAR file.

C.

The t command of a JAR file is used to update the contents of a file.

D.

A JAR file can be extracted using the e command.

You work as an Application Deployer for UcTech Inc. You want to configure a filter for a Web application using the deployment descriptor. Which of the following attributes are mandatory for you to implement in order to accomplish the task?

Each correct answer represents a complete solution. Choose all that apply.

A.

B.

C.

D.

You work as a developer for PassGuide Inc. You have implemented a session bean with a method doPrint(), which behaves differently depending on the caller's security role. Only MANAGER in the security roles "ADMIN" and "MANAGER" are allowed to call the method. Which of the following actions are appropriate to accomplish if there is no security-related metadata in the deployment descriptor?

Each correct answer represents a complete solution. Choose all that apply.

A.

If EJBContext.getCallerPrincipal returns role "ADMIN", implement the behavior for MANAGER in role ADMIN.

B.

If EJBContext.isCallerInRole("ADMIN") returns true, implement the behavior defined for MANAGER in role "ADMIN".

C.

Annotate method doPrint() with @RolesAllowed({"ADMIN","MANAGER"}).

D.

Annotate method doPrint() with @PermitAll.

Mark works as a Programmer for InfoTech Inc. He creates a method named roomBooking() and this method throws IndexOutOfBoundsException. Which of the following roles will automatically handle the exception?

A.

Bean Provider

B.

Application Assembler

C.

Bean Deployer

D.

Container

Which of the following init() method calls initializes a cipher object with a key in the SECRET_MODE?

A.

cipher.init(2, key);

B.

cipher.init(1, key);

C.

cipher.init(3, key);

D.

cipher.init(4, key);

Which of the following methods specifies which LoginModules should be used for a particular application, and in what order the LoginModules should be invoked?

A.

getLogger

B.

getConfiguration

C.

getResourceBundle

D.

getAppConfigurationEntry

Mark works as a Programmer for InfoTech Inc. He develops the following program.

class iftest2

{public static void main(String args[])

{int x=0, y=1;if //code//{System.out.println("true");}}}

Which of the following if statements are illegal if they are placed at //code//?

A.

(y == true)

B.

(1)

C.

(x == false)

D.

(x == 1)

E.

(x)

F.

(x != y)

Which of the following statements about the isUserInRole() method are true?

Each correct answer represents a complete solution. Choose all that apply.

A.

It accepts a boolean argument.

B.

It is mapped in the deployment descriptor using the element.

C.

It belongs to the HttpServletResponse interface.

D.

The sub-element of the element must match the sub-element of the element.

Which of the following attribute scopes does not exist for a Servlet?

A.

Request

B.

Session

C.

Context

D.

Page

Which of the following is the valid permission for a BasicPermission?

A.

*

B.

a*b

C.

*.com

D.

*java

Which of the following exceptions is thrown if a class uses the clone() method but does not implement the Cloneable interface?

A.

CloneDoesNotExistException

B.

ClassNotFoundException

C.

CloneNotSupportedException

D.

NullPointerException

You have written the following code snippet.

1. public class Read {

2. protected int ReadText(int x) { return 0; }

3. }

4. class Text extends Read {

5. /*insert code here*/

6. }

Which of the following methods, inserted independently at line 5, will compile?

Each correct answer represents a complete solution. Choose all that apply.

A.

private int ReadText(long x) { return 0; }

B.

protected long ReadText(int x, int y) { return 0; }

C.

protected long ReadText(long x) { return 0; }

D.

protected int ReadText(long x) { return 0; }

E.

private int ReadText(int x) { return 0; }

F.

public int ReadText(int x) { return 0; }

G.

protected long ReadText(int x) { return 0; }

Which of the following exceptions will be thrown if the commit() method fails?

A.

DestroyFailedException

B.

NullPointerException

C.

LoginException

D.

SecurityException

The __________ interface accepts results from a SQL SELECT statement.

A.

Connection

B.

ResultSet

C.

PreparedStatement

D.

DatabaseMetaData

Which of the following methods evaluates the global policy for the permissions granted to the

ProtectionDomain and tests whether the permission is granted?

A.

implies

B.

getPolicy

C.

isPolicy

D.

getType

Identify whether the given statement is true or false.

"When a Java program starts up, one thread begins running immediately."

A.

True

B.

False

Which of the following will be returned by the expression "string" instanceof String?

A.

0

B.

1.0

C.

null

D.

false

E.

0.0

F.

true

Which of the following is a mandatory sub-element of the element of the deployment descriptor?

A.

B.

C.

D.

Which of the following is not a type of authentication?

A.

DIGEST

B.

CLIENT-CERT

C.

FORM

D.

BASIC

E.

FORM-CERT

You work as a developer for PassGuide Inc. You have implemented a session bean with a method doPrint(), which behaves differently depending on the caller's security role. Only MANAGER in the security roles "ADMIN" and "MANAGER" are allowed to call the method. Which of the following actions are appropriate to accomplish if there is no security-related metadata in the deployment descriptor?

Each correct answer represents a complete solution. Choose all that apply.

A.

Annotate method doPrint() with @RolesAllowed({"ADMIN","MANAGER"}).

B.

Annotate method doPrint() with @PermitAll.

C.

If EJBContext.isCallerInRole("ADMIN") returns true, implement the behavior defined for MANAGER in role "ADMIN".

D.

If EJBContext.getCallerPrincipal returns role "ADMIN", implement the behavior for MANAGER in role ADMIN.

Page: 2 / 5
Total 275 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved