单项选择题
A. j_user and j_id B. j_id and j_password C. j_users and j_password D. j_user and j_password E. j_login and j_password F. j_username and j_password
What else must the developer do to ensure that the inte...
What else must the developer do to ensure that the intended security goal is achieved()?
A. Create a user called vip in the security realm B. Define a group within the security realm and call it vip C. Define a security-role named vip in the development descriptor D. Declare a security-role-ref for vip in the deployment descriptor
Whichtwoauthenticationmechanismsprovideweakerprotection...
多项选择题Which two authentication mechanisms provide weaker protection than other mechanisms?()
A. HTTP Basic Authentication B. Form Based Authentication C. HTTP Digest Authentication D. HTTPS Client Authentication
Whichthreeareguaranteedtobevalidfortheelementofawebappl...
多项选择题Which three are guaranteed to be valid for the element of a web application deployment descriptor?()
A. FORM B. DIGEST C. NORMAL D. ENCRYPTED E. CLIENT-CERT