Oracle Java Enterprise Edition 5 Web Component Developer Certified Professional 認定 1Z0-858 試験問題:
1. Click the Exhibit button.
Assume the product attribute does NOT yet exist in any scope.
Which two create an instance of com.example.Product and initialize the name and price
properties to the name and price request parameters? (Choose two.)
A) <jsp:useBean id="product" class="com.example.Product" />
<jsp:setProperty name="product" property="*" />
B) <jsp:useBean id="product" class="com.example.Product" />
<% product.setName( request.getParameter( "name" ) ); %>
<% product.setPrice( request.getParameter( "price" ) ); %>
C) <jsp:useBean id="product" class="com.example.Product">
<jsp:setProperty name="product" property="name"
value="${name}" />
<jsp:setProperty name="product" property="price"
value="${price}" />
</jsp:useBean>
D) <jsp:useBean id="product" class="com.example.Product" />
<jsp:setProperty name="product" property="name"
value="${param.name}" />
<jsp:setProperty name="product" property="price"
value="${param.price}" />
2. Which activity supports the data integrity requirements of an application?
A) using an LDAP security realm
B) using HTTP Basic authentication
C) using HTTPS as a protocol
D) using forms-based authentication
3. Your web application requires the ability to load and remove web files dynamically to the web container's file system. Which two HTTP methods are used to perform these actions? (Choose two.)
A) SEND
B) POST
C) DESTROY
D) DELETE
E) PUT
F) REMOVE
4. Which two about WAR files are true? (Choose two.)
A) WAR files must be created by using archive tools designed specifically for that purpose.
B) WAR files must be located in the web application library directory.
C) The web container must serve the content of any META-INF directory located in a WAR file.
D) The web container must allow access to resources in JARs in the web application library directory.
E) WAR files must contain the web application deployment descriptor.
5. A developer has used this code within a servlet:
62.
if(request.isUserInRole("vip")) {
63.
// VIP-related logic here
64.
}
What else must the developer do to ensure that the intended security goal is achieved?
A) define a security-role named vip in the deployment descriptor
B) define a group within the security realm and call it vip
C) create a user called vip in the security realm
D) declare a security-role-ref for vip in the deployment descriptor
質問と回答:
質問 # 1 正解: A、D | 質問 # 2 正解: C | 質問 # 3 正解: D、E | 質問 # 4 正解: D、E | 質問 # 5 正解: D |