Which two are true concerning the objects available to developers creating tag files?()

A . The session object must be declared explicitly. B . The request and response objects are available implicitly. C . The output stream is available through the implicit outStream object. D . The servlet context is available through the implicit servletContext object. E . The JspContext for the tag file is available through the implicit jspContext object.

时间:2022-09-21 06:12:02 所属题库:SCWCD(310-083)题库

相似题目

  • Which statement(s) is/are TRUE concerning crane cargo operations? ()

    A . Do not exceed rated load capacity of crane and container spreader or slings B . During any cargo handling operation,the safety of personnel is paramount C . Cargo handlers must be outfitted with adequate protection from personal injury D . All the above

  • The Company security administrator is concerned with layer 2 network attacks.  Which two  statements about these attacks are true? ()

    A .  ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN. B .  ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host. C .  MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table. D .  ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router. E .  MAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.

  • Which of these statements concerning the collection interfaces are true?()  

    A . Set extends Collection. B . All methods defined in Set are also defined in Collection. C . List extends Collection. D . All methods defined in List are also defined in Collection. E . Map extends Collection.

  • The Company security administrator is concerned with VLAN hopping based attacks. Which two  statements about these attacks are true? ()

    A .  Attacks are prevented by utilizing the port-security feature. B .  An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation. C .  Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping. D .  An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation. E .  Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

  • Which statements concerning the switch construct are true?()  

    A . All switch statements must have a default label. B . There must be exactly one label for each code segment in a switch statement. C . The keyword continue can never occur within the body of a switch statement. D . No case label may follow a default label within a single switch statement. E . A character literal can be used as a value for a case label.

  • Which two are true about authentication?()

    A . Form-based logins should NOT be used with HTTPS. B . When using Basic Authentication the target server is NOT authenticated. C . J2EE compliant web containers are NOT required to support the HTTPS protocol. D . Web containers are required to support unauthenticated access to unprotected web resources.

  • Which statements are true concerning the effect of the >> and >>> operators?()  

    A . For non-negative values of the left operand, the >> and >>> operators will have the same effect. B . The result of (-1 >> 1) is 0. C . The result of (-1 >>> 1) is -1. D . The value returned by >>> will never be negative as long as the value of the right operand is equal  to or greater than 1. E . When using the >> operator, the leftmost bit of the bit representation of the resulting value will always be the same bit value as the leftmost bit of the bit representation of the left operand.

  • Which the two are concerning the objects available to developers creating tag files?()

    A .  The session object must be declared explicity. B .  The request and response objects are available implicity. C .  The output stream is available through the implicit outStream object. D .  The servlet context is available through the implicit servletContext object. E .  The JspContext for the tag file is available through the implicit jspContext object.

  • Which statements concerning the event model of the AWT are true?()  

    A . At most one listener of each type can be registered with a component. B . Mouse motion listeners can be registered on a List instance. C . There exists a class named ContainerEvent in package java.awt.event. D . There exists a class named MouseMotionEvent in package java.awt.event. E . There exists a class named ActionAdapter in package java.awt.event.

  • Which two statements concerning STP state changes are true? ()

    A . Upon bootup,a port transitions from blocking to forwarding because it assumes itself as root. B . Upon bootup,a port transitions from blocking to listening because it assumes itself as root. C . Upon bootup,a port transitions from listening to forwarding because it assumes itself as root. D . If a forwarding port receives no BPDUs by the max_age time limit, it will transition to listening. E . If a forwarding port receives an inferior BPDU, it will transition to listening. F . If a blocked port receives no BPDUs by the max_age time limit, it will transition to listening.

  • Which two statements are true?()

    A . It is possible for more than two threads to deadlock at once. B . The JVM implementation guarantees that multiple threads cannot enter into a deadlocked state. C . Deadlocked threads release once their sleep() method’s sleep duration has expired. D . Deadlocking can occur only when the wait(), notify(), and notifyAll() methods are used incorrectly. E . It is possible for a single-threaded application to deadlock if synchronized blocks are used incorrectly. F . If a piece of code is capable of deadlocking, you cannot eliminate the possibility ofdeadlocking by insertinginvocations of Thread.yield().

  • Which three concerning the use of the java.io.Serializable interface are true?()

    A .  Objects from classes that use aggregation cannot be serialized. B .  Art object serialized on one JVM can be successfully deserialized on a different JVM. C .  The values in fields with the volatile modifier will NOT survive serialization anddeserialization. D .  The values in fields with the transient modifier will NOT survive serialization anddeserialization. E .  It is legal to serialize an object of a type that has a supertype that does NOT implement java.io.Serializable.

  • Which two are true concerning a multitenant container database with three pluggable database?()

    A . All administration tasks must be done to a specific pluggable database. B . The pluggable databases increase patching time. C . The pluggable databases reduce administration effort. D . The pluggable databases are patched together. E . Pluggable databases are only used for database consolidation.

  • Which two are true?()

    A .  An encapsulated, public class promotes re-use. B .  Classes that share the same interface are always tightly encapsulated. C .  An encapsulated class allows subclasses to overload methods, but does NOT allow overriding methods. D .  An encapsulated class allows a programmer to change an implementation without affecting outside code.

  • Which two statemets are true?()

    A . DPT/RPR uses a bi-directional ring consisting of two symmetric counter rotating fibre rings. B . DPT/RPR is defined in the IEEE 802.17 standard and it uses Token Bucket system to avoid collisions on the fiber. C . In DPT/RPR rings, data packets can be sent in one direction (downstream) and the corresponding control packets in the opposite direction (upstream),thus using both fibres concurrently to maximise bandwidth. D . DPT/RPR can be deployed in the Core of the SP networks where point-to-point POS links are used tomake best use of the Bandwidth.

  • Which three statements are true concerning the multitenant architecture?()

    A . Each pluggable database (PDB) has its own set of background processes. B . A PDB can have a private temp tablespace. C . PDBs can share the sysaux tablespace. D . Log switches occur only at the multitenant container database (CDB) level. E . Different PDBs can have different default block sizes. F . PDBs share a common system tablespace. G . Instance recovery is always performed at the CDB level.

  • Which three statements concerning the use of the java.io.Serializable interface are true?()

    A . Objects from classes that use aggregation cannot be serialized B . An object serialized on one JVM can be successfully deserialized on a different JVM C . The values in fields with the volatile modifier will NOT survive serialization and deserialization D . The values in fields with the transient modifier will NOT survive serialization and deserialization E . It is legal to serialize an object of a type that has a supertype that does NOT implement java.io.Serializable

  • Which two statements are true concerning the Resource Manager plans for individual pluggabledatabases (PDB plans) in a multitenant container database (CDB)?()

    A . If no PDB plan is enabled for a pluggable database, then all sessions for that PDB are treated to an equal degree of the resource share of that pdb. B . In a PDB plan, subplans may be used with up to eight consumer groups. C . If a PDB plan is enabled for a pluggable database, then resources are allocated to consumer groups across all PDBs in the cdb. D . If no PDB plan is enabled for a pluggable database, then the PDB share in the CDB plan is dynamically calculated. E . If a PDB plan is enabled for a pluggable database, then resources are allocated to consumer groups based on the shares provided to the PDB in the CDB plan and the shares provided to the consumer groups in the PDB plan.

  • Which three statements are true concerning unplugging a pluggable database (PDB)?()

    A . The PDB must be open in read only mode. B . The PDB must be dosed. C . The unplugged PDB becomes a non-cdb. D . The unplugged PDB can be plugged into the same multitenant container database (CDB) E . The unplugged PDB can be plugged into another cdb. F . The PDB data files are automatically removed from disk.

  • Which two statements are true?()

    A . It is possible for more than two threads to deadlock at once. B . The JVM implementation guarantees that multiple threads cannot enter into a deadlocked state. C . Deadlocked threads release once their sleep() method's sleep duration has expired. D . Deadlocking can occur only when the wait(), notify(), and notifyAll() methods are used incorrectly. E . It is possible for a single-threaded application to deadlock if synchronized blocks are used incorrectly. F . If a piece of code is capable of deadlocking, you cannot eliminate the possibility of deadlocking by inserting invocations of Thread.yield().

  • Which two are true?()

    A . A finalizer may NOT be invoked explicitly. B . The finalize method declared in class Object takes no action. C . super.finalize()is called implicitly by any over riding finalize method. D . The finalize method for a given objec twill be called no more than once by the garbage collector. E . The order in which finalize will be called on two objects is based on the order in which the two objects became finalizable.

  • Which statements are true concerning NAT? ()

    A .  NAT provides 1 to manyaddress mapping. B .  NAT provides 1 to 1 address mapping. C .  NAT is only useful forTCP/UDP and ICMP traffic. D .  NAT can be used for all IP traffic.

  • Which of the following are true concerning the distinction between interest rates and return?