Deck 5: Java Programming Security

ملء الشاشة (f)
exit full mode
سؤال
16)The ____ collector is a generational collector that has been implemented to emphasize the throughput of the application or low garbage collection pause times.

A) incremental low pause
B) concurrent low pause
C) throughput
D) serial
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
17)____ objects imply that contents can be changed.

A) Static
B) Mutable
C) Instance
D) Public
سؤال
2)In Java, a sandbox provides strong protection against nuisances and denial of service (DOS) attacks.
سؤال
13)Calling the ____ method instructs the JVM to recycle unused objects in order to make the memory available for quick reuse.

A) free
B) delete
C) release
D) gc
سؤال
12)With automatic ____, the Java programmer is freed of the complex task of deciding when and where to safely release memory.

A) stack access
B) memory access
C) garbage collection
D) heap management
سؤال
14)____ generation is defined as objects allocated in a generation for shorter-lived objects in memory.

A) Young
B) Single
C) Simple
D) Early
سؤال
5)No class in the same package can access an inner class after it is compiled.
سؤال
1)The Java programming language is a multiplatform programming language.
سؤال
3)The syntax of Java language started as a subset of the popular object-oriented language C++.
سؤال
6)The JVM relies on the platform and various software technologies to present a secure location where Java programs run. This secure location is called a(n) ____ in JVM terminology.

A) procedure domain
B) execution domain
C) callbox
D) sandbox
سؤال
20)Under the ____ model, each Java class executes within one and only one protection domain.

A) graybox
B) sandbox
C) protection-mapping
D) domain
سؤال
11)____ are used instead of pointers to allow Java programmers to create data structures.

A) References
B) Structs
C) Records
D) Nodes
سؤال
4)To build a secure and efficient Java program, a developer should always try the collector chosen by the JVM on the application first.
سؤال
8)When a class is presented to run in a JVM, the ____ finds the class, loads the byte codes, performs verification, executes its main method, and then loads any supplemental classes.

A) ClassProfile
B) ClassHandler
C) ClassLoader
D) ClassBooting
سؤال
15)A ____ object is defined as an object that is no longer be reached from any pointer in running programs under a JVM.

A) young
B) linear
C) serial
D) garbage
سؤال
18)The ____ security model is used as the original Java security model.

A) black box
B) graybox
C) security by signing
D) sandbox
سؤال
9)The ____ extends ClassLoader with additional support for defining classes with an associated code source and permissions that are retrieved by the system policy by default.

A) SecureClassLoader
B) URLClassLoader
C) PolicyClassLoader
D) DomainClassLoader
سؤال
10)____ is used to load classes and resources from a search path of URLs referring to both Java archive (JAR) files and directories.

A) DomainClassLoader
B) URLClassLoader
C) RemoteClassLoader
D) SecureClassLoader
سؤال
7)A programmer can exam the byte codes by disassembling a class file using the command ____ .

A) java -c class_name
B) javap -c class_name
C) javac -c class_name
D) java -p class_name
سؤال
19)The ____ provides fine-grained control on what operation can be run within the JVM.

A) ClassLoader
B) SecurityManager
C) SecurityException
D) SecuritySandbox
سؤال
40)Briefly describe the ProtectionDomain class.
سؤال
26)The ____ class is used for access control operations and decision making.

A) AccessController
B) SecurityManager
C) ClassLoader
D) java.security.Object
سؤال
34)What is the design goal of the Java language?
سؤال
38)How does a concurrent low pause collector work?
سؤال
30)____________________ is a memory-management activity carried out by the Java runtime environment to reclaim dynamically allocated memory that is no longer being used.
سؤال
37)How does a serial collector work?
سؤال
31)A(n) ____________________ serves as a group that contains objects that have the same accessibility and protection.
سؤال
35)How does Java prevent invalid memory access?
سؤال
29)____________________ builds an environment that provides separate name spaces for classes loaded from different locations.
سؤال
25)Regarding protection domains, when an object from one domain calls code from another domain, the rule of ____ is employed.

A) uniqueness
B) complement
C) union
D) intersection
سؤال
36)What are the advantages and disadvantages of automatic garbage collection?
سؤال
41)Regarding protection domains, how can objects in one domain automatically discover objects in another domain?
سؤال
33)Describe the four-step Java byte code verification process.
سؤال
22)A ____ object represents the policy for a Java application environment.

A) security
B) policy
C) permission
D) grant
سؤال
21)The core of Java permissions is the ____ class.

A) java.security.Permission
B) ClassLoader
C) java.security.Policy
D) SecurityManager
سؤال
24)A ____ is a database of private keys and their associated digital certificates.

A) permission store
B) grant entry
C) keystore
D) policy rule
سؤال
27)All Java programs run on a common platform called the ____________________.
سؤال
23)Individual permissions can be set using the ____ program without any programming.

A) policytool
B) securityManager
C) gc
D) policy
سؤال
28)Java ____________________ is the machine language of the JVM.
سؤال
39)What are the attributes of a protection domain?
سؤال
Match between columns
compiles Java program into Java byte codes
javac
compiles Java program into Java byte codes
Domain
compiles Java program into Java byte codes
JVM
compiles Java program into Java byte codes
ClassLoader
compiles Java program into Java byte codes
SecurityManager
compiles Java program into Java byte codes
Generations
compiles Java program into Java byte codes
Sandbox
compiles Java program into Java byte codes
SecureClassLoader
compiles Java program into Java byte codes
Garbage collector
monitors references to dynamic memory and releases the memory when there are no longer any references to it
javac
monitors references to dynamic memory and releases the memory when there are no longer any references to it
Domain
monitors references to dynamic memory and releases the memory when there are no longer any references to it
JVM
monitors references to dynamic memory and releases the memory when there are no longer any references to it
ClassLoader
monitors references to dynamic memory and releases the memory when there are no longer any references to it
SecurityManager
monitors references to dynamic memory and releases the memory when there are no longer any references to it
Generations
monitors references to dynamic memory and releases the memory when there are no longer any references to it
Sandbox
monitors references to dynamic memory and releases the memory when there are no longer any references to it
SecureClassLoader
monitors references to dynamic memory and releases the memory when there are no longer any references to it
Garbage collector
allows you to associate permissions based upon the source of a loaded class
javac
allows you to associate permissions based upon the source of a loaded class
Domain
allows you to associate permissions based upon the source of a loaded class
JVM
allows you to associate permissions based upon the source of a loaded class
ClassLoader
allows you to associate permissions based upon the source of a loaded class
SecurityManager
allows you to associate permissions based upon the source of a loaded class
Generations
allows you to associate permissions based upon the source of a loaded class
Sandbox
allows you to associate permissions based upon the source of a loaded class
SecureClassLoader
allows you to associate permissions based upon the source of a loaded class
Garbage collector
presents a bounded environment for a Java program to run within
javac
presents a bounded environment for a Java program to run within
Domain
presents a bounded environment for a Java program to run within
JVM
presents a bounded environment for a Java program to run within
ClassLoader
presents a bounded environment for a Java program to run within
SecurityManager
presents a bounded environment for a Java program to run within
Generations
presents a bounded environment for a Java program to run within
Sandbox
presents a bounded environment for a Java program to run within
SecureClassLoader
presents a bounded environment for a Java program to run within
Garbage collector
class that allows applications to implement a code-level security policy
javac
class that allows applications to implement a code-level security policy
Domain
class that allows applications to implement a code-level security policy
JVM
class that allows applications to implement a code-level security policy
ClassLoader
class that allows applications to implement a code-level security policy
SecurityManager
class that allows applications to implement a code-level security policy
Generations
class that allows applications to implement a code-level security policy
Sandbox
class that allows applications to implement a code-level security policy
SecureClassLoader
class that allows applications to implement a code-level security policy
Garbage collector
a set of Java objects
javac
a set of Java objects
Domain
a set of Java objects
JVM
a set of Java objects
ClassLoader
a set of Java objects
SecurityManager
a set of Java objects
Generations
a set of Java objects
Sandbox
a set of Java objects
SecureClassLoader
a set of Java objects
Garbage collector
allows Java byte codes to execute
javac
allows Java byte codes to execute
Domain
allows Java byte codes to execute
JVM
allows Java byte codes to execute
ClassLoader
allows Java byte codes to execute
SecurityManager
allows Java byte codes to execute
Generations
allows Java byte codes to execute
Sandbox
allows Java byte codes to execute
SecureClassLoader
allows Java byte codes to execute
Garbage collector
memory pools holding objects of different ages
javac
memory pools holding objects of different ages
Domain
memory pools holding objects of different ages
JVM
memory pools holding objects of different ages
ClassLoader
memory pools holding objects of different ages
SecurityManager
memory pools holding objects of different ages
Generations
memory pools holding objects of different ages
Sandbox
memory pools holding objects of different ages
SecureClassLoader
memory pools holding objects of different ages
Garbage collector
the gatekeeper of the JVM
javac
the gatekeeper of the JVM
Domain
the gatekeeper of the JVM
JVM
the gatekeeper of the JVM
ClassLoader
the gatekeeper of the JVM
SecurityManager
the gatekeeper of the JVM
Generations
the gatekeeper of the JVM
Sandbox
the gatekeeper of the JVM
SecureClassLoader
the gatekeeper of the JVM
Garbage collector
سؤال
42)What are the purposes of the AccessController class?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Java Programming Security
1
16)The ____ collector is a generational collector that has been implemented to emphasize the throughput of the application or low garbage collection pause times.

A) incremental low pause
B) concurrent low pause
C) throughput
D) serial
C
2
17)____ objects imply that contents can be changed.

A) Static
B) Mutable
C) Instance
D) Public
B
3
2)In Java, a sandbox provides strong protection against nuisances and denial of service (DOS) attacks.
False
4
13)Calling the ____ method instructs the JVM to recycle unused objects in order to make the memory available for quick reuse.

A) free
B) delete
C) release
D) gc
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
12)With automatic ____, the Java programmer is freed of the complex task of deciding when and where to safely release memory.

A) stack access
B) memory access
C) garbage collection
D) heap management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
14)____ generation is defined as objects allocated in a generation for shorter-lived objects in memory.

A) Young
B) Single
C) Simple
D) Early
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
5)No class in the same package can access an inner class after it is compiled.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
1)The Java programming language is a multiplatform programming language.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
3)The syntax of Java language started as a subset of the popular object-oriented language C++.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
6)The JVM relies on the platform and various software technologies to present a secure location where Java programs run. This secure location is called a(n) ____ in JVM terminology.

A) procedure domain
B) execution domain
C) callbox
D) sandbox
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
20)Under the ____ model, each Java class executes within one and only one protection domain.

A) graybox
B) sandbox
C) protection-mapping
D) domain
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
11)____ are used instead of pointers to allow Java programmers to create data structures.

A) References
B) Structs
C) Records
D) Nodes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
4)To build a secure and efficient Java program, a developer should always try the collector chosen by the JVM on the application first.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
8)When a class is presented to run in a JVM, the ____ finds the class, loads the byte codes, performs verification, executes its main method, and then loads any supplemental classes.

A) ClassProfile
B) ClassHandler
C) ClassLoader
D) ClassBooting
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
15)A ____ object is defined as an object that is no longer be reached from any pointer in running programs under a JVM.

A) young
B) linear
C) serial
D) garbage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
18)The ____ security model is used as the original Java security model.

A) black box
B) graybox
C) security by signing
D) sandbox
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
9)The ____ extends ClassLoader with additional support for defining classes with an associated code source and permissions that are retrieved by the system policy by default.

A) SecureClassLoader
B) URLClassLoader
C) PolicyClassLoader
D) DomainClassLoader
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
10)____ is used to load classes and resources from a search path of URLs referring to both Java archive (JAR) files and directories.

A) DomainClassLoader
B) URLClassLoader
C) RemoteClassLoader
D) SecureClassLoader
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
7)A programmer can exam the byte codes by disassembling a class file using the command ____ .

A) java -c class_name
B) javap -c class_name
C) javac -c class_name
D) java -p class_name
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
19)The ____ provides fine-grained control on what operation can be run within the JVM.

A) ClassLoader
B) SecurityManager
C) SecurityException
D) SecuritySandbox
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
40)Briefly describe the ProtectionDomain class.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
26)The ____ class is used for access control operations and decision making.

A) AccessController
B) SecurityManager
C) ClassLoader
D) java.security.Object
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
34)What is the design goal of the Java language?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
38)How does a concurrent low pause collector work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
30)____________________ is a memory-management activity carried out by the Java runtime environment to reclaim dynamically allocated memory that is no longer being used.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
37)How does a serial collector work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
31)A(n) ____________________ serves as a group that contains objects that have the same accessibility and protection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
35)How does Java prevent invalid memory access?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
29)____________________ builds an environment that provides separate name spaces for classes loaded from different locations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
25)Regarding protection domains, when an object from one domain calls code from another domain, the rule of ____ is employed.

A) uniqueness
B) complement
C) union
D) intersection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
36)What are the advantages and disadvantages of automatic garbage collection?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
41)Regarding protection domains, how can objects in one domain automatically discover objects in another domain?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
33)Describe the four-step Java byte code verification process.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
22)A ____ object represents the policy for a Java application environment.

A) security
B) policy
C) permission
D) grant
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
21)The core of Java permissions is the ____ class.

A) java.security.Permission
B) ClassLoader
C) java.security.Policy
D) SecurityManager
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
24)A ____ is a database of private keys and their associated digital certificates.

A) permission store
B) grant entry
C) keystore
D) policy rule
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
27)All Java programs run on a common platform called the ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
23)Individual permissions can be set using the ____ program without any programming.

A) policytool
B) securityManager
C) gc
D) policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
28)Java ____________________ is the machine language of the JVM.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
39)What are the attributes of a protection domain?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
compiles Java program into Java byte codes
javac
compiles Java program into Java byte codes
Domain
compiles Java program into Java byte codes
JVM
compiles Java program into Java byte codes
ClassLoader
compiles Java program into Java byte codes
SecurityManager
compiles Java program into Java byte codes
Generations
compiles Java program into Java byte codes
Sandbox
compiles Java program into Java byte codes
SecureClassLoader
compiles Java program into Java byte codes
Garbage collector
monitors references to dynamic memory and releases the memory when there are no longer any references to it
javac
monitors references to dynamic memory and releases the memory when there are no longer any references to it
Domain
monitors references to dynamic memory and releases the memory when there are no longer any references to it
JVM
monitors references to dynamic memory and releases the memory when there are no longer any references to it
ClassLoader
monitors references to dynamic memory and releases the memory when there are no longer any references to it
SecurityManager
monitors references to dynamic memory and releases the memory when there are no longer any references to it
Generations
monitors references to dynamic memory and releases the memory when there are no longer any references to it
Sandbox
monitors references to dynamic memory and releases the memory when there are no longer any references to it
SecureClassLoader
monitors references to dynamic memory and releases the memory when there are no longer any references to it
Garbage collector
allows you to associate permissions based upon the source of a loaded class
javac
allows you to associate permissions based upon the source of a loaded class
Domain
allows you to associate permissions based upon the source of a loaded class
JVM
allows you to associate permissions based upon the source of a loaded class
ClassLoader
allows you to associate permissions based upon the source of a loaded class
SecurityManager
allows you to associate permissions based upon the source of a loaded class
Generations
allows you to associate permissions based upon the source of a loaded class
Sandbox
allows you to associate permissions based upon the source of a loaded class
SecureClassLoader
allows you to associate permissions based upon the source of a loaded class
Garbage collector
presents a bounded environment for a Java program to run within
javac
presents a bounded environment for a Java program to run within
Domain
presents a bounded environment for a Java program to run within
JVM
presents a bounded environment for a Java program to run within
ClassLoader
presents a bounded environment for a Java program to run within
SecurityManager
presents a bounded environment for a Java program to run within
Generations
presents a bounded environment for a Java program to run within
Sandbox
presents a bounded environment for a Java program to run within
SecureClassLoader
presents a bounded environment for a Java program to run within
Garbage collector
class that allows applications to implement a code-level security policy
javac
class that allows applications to implement a code-level security policy
Domain
class that allows applications to implement a code-level security policy
JVM
class that allows applications to implement a code-level security policy
ClassLoader
class that allows applications to implement a code-level security policy
SecurityManager
class that allows applications to implement a code-level security policy
Generations
class that allows applications to implement a code-level security policy
Sandbox
class that allows applications to implement a code-level security policy
SecureClassLoader
class that allows applications to implement a code-level security policy
Garbage collector
a set of Java objects
javac
a set of Java objects
Domain
a set of Java objects
JVM
a set of Java objects
ClassLoader
a set of Java objects
SecurityManager
a set of Java objects
Generations
a set of Java objects
Sandbox
a set of Java objects
SecureClassLoader
a set of Java objects
Garbage collector
allows Java byte codes to execute
javac
allows Java byte codes to execute
Domain
allows Java byte codes to execute
JVM
allows Java byte codes to execute
ClassLoader
allows Java byte codes to execute
SecurityManager
allows Java byte codes to execute
Generations
allows Java byte codes to execute
Sandbox
allows Java byte codes to execute
SecureClassLoader
allows Java byte codes to execute
Garbage collector
memory pools holding objects of different ages
javac
memory pools holding objects of different ages
Domain
memory pools holding objects of different ages
JVM
memory pools holding objects of different ages
ClassLoader
memory pools holding objects of different ages
SecurityManager
memory pools holding objects of different ages
Generations
memory pools holding objects of different ages
Sandbox
memory pools holding objects of different ages
SecureClassLoader
memory pools holding objects of different ages
Garbage collector
the gatekeeper of the JVM
javac
the gatekeeper of the JVM
Domain
the gatekeeper of the JVM
JVM
the gatekeeper of the JVM
ClassLoader
the gatekeeper of the JVM
SecurityManager
the gatekeeper of the JVM
Generations
the gatekeeper of the JVM
Sandbox
the gatekeeper of the JVM
SecureClassLoader
the gatekeeper of the JVM
Garbage collector
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
42)What are the purposes of the AccessController class?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.