Run
Import
Default
Implement
Which two elements of the Java Enterprise Application Archive are required?()A、EJB Archive B、Deployment DescriptorC、META-INF sub directoryD、Resource Adapter archiveE、Java library
点击查看答案
What protection method is used in 4F MS-SPRing networks?()A、 Each fiber has half of its capacity reserved for protection.B、 Two fibers carry their full capacities while the other two fibers are reserved for protection.C、 The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.D、 The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.
Given in a single JSP page: Which two are true?()A、The prefix ’java’ is reserved.B、The URI ’myTags’ must be properly mapped to a TLD file by the web container.C、A translation error occurs because the prefix is considered identical by the web container.D、For the tag usage , the tag1 must be unique in the union of tag names in ’myTags’ and’moreTags’.
Which two interfaces provide the capability to store objects using a key-value pair?()A、 Java.util.Map.B、 Java.util.Set.C、 Java.util.List.D、 Java.util.StoredSet.E、 Java.util.StoredMap.F、 Java.util.Collection.
Which statements about inheritance are true?() A、 In Java programming language only allows single inheritance.B、 In Java programming language allows a class to implement only one interface.C、 In Java programming language a class cannot extend a class and implement a interface together.D、 In Java programming language single inheritance makes code more reliable.
Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()A、It can be invoked only from the doGet or doPost methods.B、It can be used independently of the getRemoteUser method.C、Can return "true" even when its argument is NOT defined as a valid role name in the deployment descriptor.D、Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.
Which two statements are true regarding L2TP? ()(Choose two.)A、Tunnels are initiated by the LACB、Tunnels are initiated by the LNSC、By default, subscriber authentication occurs on the LNSD、By default, subscriber authentication occurs on the LAC