单项选择题
Which security mechanism can be directed through the element in a web deployment descriptor()?
A. authorization
B. data integrity
C. confidentiality
D. authentication
点击查看答案
相关考题
-
多项选择题
A Company.com developer has created a web application that includes a servlet for each use case in the application. These servlets have become rather difficult to maintain because the request processing methods have become very large. There is also common processing code in many servlets because these use cases are very similar. Which two design patterns can be used together to refactor and simplify this web application? ()
A. Proxy
B. View Helper
C. Front Controller
D. Session Façade
E. Business Delegate
F. Model-View-Controller -
单项选择题
WhichischaracteristicoftheBusinessDelegatepattern?()
A. It decreases complexity by removing a layer of proxy classes.
B. It reduces coupling between tiers by hiding implementation details.
C. It decreases performance due to the lack of caching of remote data.
D. It forces business-tier expectations to be dealt with in the presentation-tier. -
单项选择题
Company.com has decided to use the FUBAR Application Server to host their web application. Unfortunately, the FUBAR Application Server uses the server machine’s file system for its JNDI namespace. Every JNDI lookup performed in the web application is translated into a file 1/0 operation, which results in very poor performance. Which J2EE pattern can help with this performance issue?()
A. Transfer Object
B. Service Locator
C. Intercepting Filter
D. Model-View-Controller
