Deck 5: Java Programming Security

Full screen (f)
exit full mode
Question
16)The ____ collector is a generational collector that has been implemented to emphasize the throughput of the application or low garbage collection pause times.

A) incremental low pause
B) concurrent low pause
C) throughput
D) serial
Use Space or
up arrow
down arrow
to flip the card.
Question
17)____ objects imply that contents can be changed.

A) Static
B) Mutable
C) Instance
D) Public
Question
2)In Java, a sandbox provides strong protection against nuisances and denial of service (DOS) attacks.
Question
13)Calling the ____ method instructs the JVM to recycle unused objects in order to make the memory available for quick reuse.

A) free
B) delete
C) release
D) gc
Question
12)With automatic ____, the Java programmer is freed of the complex task of deciding when and where to safely release memory.

A) stack access
B) memory access
C) garbage collection
D) heap management
Question
14)____ generation is defined as objects allocated in a generation for shorter-lived objects in memory.

A) Young
B) Single
C) Simple
D) Early
Question
5)No class in the same package can access an inner class after it is compiled.
Question
1)The Java programming language is a multiplatform programming language.
Question
3)The syntax of Java language started as a subset of the popular object-oriented language C++.
Question
6)The JVM relies on the platform and various software technologies to present a secure location where Java programs run. This secure location is called a(n) ____ in JVM terminology.

A) procedure domain
B) execution domain
C) callbox
D) sandbox
Question
20)Under the ____ model, each Java class executes within one and only one protection domain.

A) graybox
B) sandbox
C) protection-mapping
D) domain
Question
11)____ are used instead of pointers to allow Java programmers to create data structures.

A) References
B) Structs
C) Records
D) Nodes
Question
4)To build a secure and efficient Java program, a developer should always try the collector chosen by the JVM on the application first.
Question
8)When a class is presented to run in a JVM, the ____ finds the class, loads the byte codes, performs verification, executes its main method, and then loads any supplemental classes.

A) ClassProfile
B) ClassHandler
C) ClassLoader
D) ClassBooting
Question
15)A ____ object is defined as an object that is no longer be reached from any pointer in running programs under a JVM.

A) young
B) linear
C) serial
D) garbage
Question
18)The ____ security model is used as the original Java security model.

A) black box
B) graybox
C) security by signing
D) sandbox
Question
9)The ____ extends ClassLoader with additional support for defining classes with an associated code source and permissions that are retrieved by the system policy by default.

A) SecureClassLoader
B) URLClassLoader
C) PolicyClassLoader
D) DomainClassLoader
Question
10)____ is used to load classes and resources from a search path of URLs referring to both Java archive (JAR) files and directories.

A) DomainClassLoader
B) URLClassLoader
C) RemoteClassLoader
D) SecureClassLoader
Question
7)A programmer can exam the byte codes by disassembling a class file using the command ____ .

A) java -c class_name
B) javap -c class_name
C) javac -c class_name
D) java -p class_name
Question
19)The ____ provides fine-grained control on what operation can be run within the JVM.

A) ClassLoader
B) SecurityManager
C) SecurityException
D) SecuritySandbox
Question
40)Briefly describe the ProtectionDomain class.
Question
26)The ____ class is used for access control operations and decision making.

A) AccessController
B) SecurityManager
C) ClassLoader
D) java.security.Object
Question
34)What is the design goal of the Java language?
Question
38)How does a concurrent low pause collector work?
Question
30)____________________ is a memory-management activity carried out by the Java runtime environment to reclaim dynamically allocated memory that is no longer being used.
Question
37)How does a serial collector work?
Question
31)A(n) ____________________ serves as a group that contains objects that have the same accessibility and protection.
Question
35)How does Java prevent invalid memory access?
Question
29)____________________ builds an environment that provides separate name spaces for classes loaded from different locations.
Question
25)Regarding protection domains, when an object from one domain calls code from another domain, the rule of ____ is employed.

A) uniqueness
B) complement
C) union
D) intersection
Question
36)What are the advantages and disadvantages of automatic garbage collection?
Question
41)Regarding protection domains, how can objects in one domain automatically discover objects in another domain?
Question
33)Describe the four-step Java byte code verification process.
Question
22)A ____ object represents the policy for a Java application environment.

A) security
B) policy
C) permission
D) grant
Question
21)The core of Java permissions is the ____ class.

A) java.security.Permission
B) ClassLoader
C) java.security.Policy
D) SecurityManager
Question
24)A ____ is a database of private keys and their associated digital certificates.

A) permission store
B) grant entry
C) keystore
D) policy rule
Question
27)All Java programs run on a common platform called the ____________________.
Question
23)Individual permissions can be set using the ____ program without any programming.

A) policytool
B) securityManager
C) gc
D) policy
Question
28)Java ____________________ is the machine language of the JVM.
Question
39)What are the attributes of a protection domain?
Question
Match between columns
compiles Java program into Java byte codes
javac
compiles Java program into Java byte codes
Domain
compiles Java program into Java byte codes
JVM
compiles Java program into Java byte codes
ClassLoader
compiles Java program into Java byte codes
SecurityManager
compiles Java program into Java byte codes
Generations
compiles Java program into Java byte codes
Sandbox
compiles Java program into Java byte codes
SecureClassLoader
compiles Java program into Java byte codes
Garbage collector
monitors references to dynamic memory and releases the memory when there are no longer any references to it
javac
monitors references to dynamic memory and releases the memory when there are no longer any references to it
Domain
monitors references to dynamic memory and releases the memory when there are no longer any references to it
JVM
monitors references to dynamic memory and releases the memory when there are no longer any references to it
ClassLoader
monitors references to dynamic memory and releases the memory when there are no longer any references to it
SecurityManager
monitors references to dynamic memory and releases the memory when there are no longer any references to it
Generations
monitors references to dynamic memory and releases the memory when there are no longer any references to it
Sandbox
monitors references to dynamic memory and releases the memory when there are no longer any references to it
SecureClassLoader
monitors references to dynamic memory and releases the memory when there are no longer any references to it
Garbage collector
allows you to associate permissions based upon the source of a loaded class
javac
allows you to associate permissions based upon the source of a loaded class
Domain
allows you to associate permissions based upon the source of a loaded class
JVM
allows you to associate permissions based upon the source of a loaded class
ClassLoader
allows you to associate permissions based upon the source of a loaded class
SecurityManager
allows you to associate permissions based upon the source of a loaded class
Generations
allows you to associate permissions based upon the source of a loaded class
Sandbox
allows you to associate permissions based upon the source of a loaded class
SecureClassLoader
allows you to associate permissions based upon the source of a loaded class
Garbage collector
presents a bounded environment for a Java program to run within
javac
presents a bounded environment for a Java program to run within
Domain
presents a bounded environment for a Java program to run within
JVM
presents a bounded environment for a Java program to run within
ClassLoader
presents a bounded environment for a Java program to run within
SecurityManager
presents a bounded environment for a Java program to run within
Generations
presents a bounded environment for a Java program to run within
Sandbox
presents a bounded environment for a Java program to run within
SecureClassLoader
presents a bounded environment for a Java program to run within
Garbage collector
class that allows applications to implement a code-level security policy
javac
class that allows applications to implement a code-level security policy
Domain
class that allows applications to implement a code-level security policy
JVM
class that allows applications to implement a code-level security policy
ClassLoader
class that allows applications to implement a code-level security policy
SecurityManager
class that allows applications to implement a code-level security policy
Generations
class that allows applications to implement a code-level security policy
Sandbox
class that allows applications to implement a code-level security policy
SecureClassLoader
class that allows applications to implement a code-level security policy
Garbage collector
a set of Java objects
javac
a set of Java objects
Domain
a set of Java objects
JVM
a set of Java objects
ClassLoader
a set of Java objects
SecurityManager
a set of Java objects
Generations
a set of Java objects
Sandbox
a set of Java objects
SecureClassLoader
a set of Java objects
Garbage collector
allows Java byte codes to execute
javac
allows Java byte codes to execute
Domain
allows Java byte codes to execute
JVM
allows Java byte codes to execute
ClassLoader
allows Java byte codes to execute
SecurityManager
allows Java byte codes to execute
Generations
allows Java byte codes to execute
Sandbox
allows Java byte codes to execute
SecureClassLoader
allows Java byte codes to execute
Garbage collector
memory pools holding objects of different ages
javac
memory pools holding objects of different ages
Domain
memory pools holding objects of different ages
JVM
memory pools holding objects of different ages
ClassLoader
memory pools holding objects of different ages
SecurityManager
memory pools holding objects of different ages
Generations
memory pools holding objects of different ages
Sandbox
memory pools holding objects of different ages
SecureClassLoader
memory pools holding objects of different ages
Garbage collector
the gatekeeper of the JVM
javac
the gatekeeper of the JVM
Domain
the gatekeeper of the JVM
JVM
the gatekeeper of the JVM
ClassLoader
the gatekeeper of the JVM
SecurityManager
the gatekeeper of the JVM
Generations
the gatekeeper of the JVM
Sandbox
the gatekeeper of the JVM
SecureClassLoader
the gatekeeper of the JVM
Garbage collector
Question
42)What are the purposes of the AccessController class?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Java Programming Security
1
16)The ____ collector is a generational collector that has been implemented to emphasize the throughput of the application or low garbage collection pause times.

A) incremental low pause
B) concurrent low pause
C) throughput
D) serial
C
2
17)____ objects imply that contents can be changed.

A) Static
B) Mutable
C) Instance
D) Public
B
3
2)In Java, a sandbox provides strong protection against nuisances and denial of service (DOS) attacks.
False
4
13)Calling the ____ method instructs the JVM to recycle unused objects in order to make the memory available for quick reuse.

A) free
B) delete
C) release
D) gc
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
12)With automatic ____, the Java programmer is freed of the complex task of deciding when and where to safely release memory.

A) stack access
B) memory access
C) garbage collection
D) heap management
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
14)____ generation is defined as objects allocated in a generation for shorter-lived objects in memory.

A) Young
B) Single
C) Simple
D) Early
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
5)No class in the same package can access an inner class after it is compiled.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
1)The Java programming language is a multiplatform programming language.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
3)The syntax of Java language started as a subset of the popular object-oriented language C++.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
6)The JVM relies on the platform and various software technologies to present a secure location where Java programs run. This secure location is called a(n) ____ in JVM terminology.

A) procedure domain
B) execution domain
C) callbox
D) sandbox
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
20)Under the ____ model, each Java class executes within one and only one protection domain.

A) graybox
B) sandbox
C) protection-mapping
D) domain
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
11)____ are used instead of pointers to allow Java programmers to create data structures.

A) References
B) Structs
C) Records
D) Nodes
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
4)To build a secure and efficient Java program, a developer should always try the collector chosen by the JVM on the application first.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
8)When a class is presented to run in a JVM, the ____ finds the class, loads the byte codes, performs verification, executes its main method, and then loads any supplemental classes.

A) ClassProfile
B) ClassHandler
C) ClassLoader
D) ClassBooting
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
15)A ____ object is defined as an object that is no longer be reached from any pointer in running programs under a JVM.

A) young
B) linear
C) serial
D) garbage
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
18)The ____ security model is used as the original Java security model.

A) black box
B) graybox
C) security by signing
D) sandbox
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
9)The ____ extends ClassLoader with additional support for defining classes with an associated code source and permissions that are retrieved by the system policy by default.

A) SecureClassLoader
B) URLClassLoader
C) PolicyClassLoader
D) DomainClassLoader
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
10)____ is used to load classes and resources from a search path of URLs referring to both Java archive (JAR) files and directories.

A) DomainClassLoader
B) URLClassLoader
C) RemoteClassLoader
D) SecureClassLoader
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
7)A programmer can exam the byte codes by disassembling a class file using the command ____ .

A) java -c class_name
B) javap -c class_name
C) javac -c class_name
D) java -p class_name
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
19)The ____ provides fine-grained control on what operation can be run within the JVM.

A) ClassLoader
B) SecurityManager
C) SecurityException
D) SecuritySandbox
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
40)Briefly describe the ProtectionDomain class.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
26)The ____ class is used for access control operations and decision making.

A) AccessController
B) SecurityManager
C) ClassLoader
D) java.security.Object
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
34)What is the design goal of the Java language?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
38)How does a concurrent low pause collector work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
30)____________________ is a memory-management activity carried out by the Java runtime environment to reclaim dynamically allocated memory that is no longer being used.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
37)How does a serial collector work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
31)A(n) ____________________ serves as a group that contains objects that have the same accessibility and protection.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
35)How does Java prevent invalid memory access?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
29)____________________ builds an environment that provides separate name spaces for classes loaded from different locations.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
25)Regarding protection domains, when an object from one domain calls code from another domain, the rule of ____ is employed.

A) uniqueness
B) complement
C) union
D) intersection
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
36)What are the advantages and disadvantages of automatic garbage collection?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
41)Regarding protection domains, how can objects in one domain automatically discover objects in another domain?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
33)Describe the four-step Java byte code verification process.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
22)A ____ object represents the policy for a Java application environment.

A) security
B) policy
C) permission
D) grant
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
21)The core of Java permissions is the ____ class.

A) java.security.Permission
B) ClassLoader
C) java.security.Policy
D) SecurityManager
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
24)A ____ is a database of private keys and their associated digital certificates.

A) permission store
B) grant entry
C) keystore
D) policy rule
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
27)All Java programs run on a common platform called the ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
23)Individual permissions can be set using the ____ program without any programming.

A) policytool
B) securityManager
C) gc
D) policy
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
28)Java ____________________ is the machine language of the JVM.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
39)What are the attributes of a protection domain?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
compiles Java program into Java byte codes
javac
compiles Java program into Java byte codes
Domain
compiles Java program into Java byte codes
JVM
compiles Java program into Java byte codes
ClassLoader
compiles Java program into Java byte codes
SecurityManager
compiles Java program into Java byte codes
Generations
compiles Java program into Java byte codes
Sandbox
compiles Java program into Java byte codes
SecureClassLoader
compiles Java program into Java byte codes
Garbage collector
monitors references to dynamic memory and releases the memory when there are no longer any references to it
javac
monitors references to dynamic memory and releases the memory when there are no longer any references to it
Domain
monitors references to dynamic memory and releases the memory when there are no longer any references to it
JVM
monitors references to dynamic memory and releases the memory when there are no longer any references to it
ClassLoader
monitors references to dynamic memory and releases the memory when there are no longer any references to it
SecurityManager
monitors references to dynamic memory and releases the memory when there are no longer any references to it
Generations
monitors references to dynamic memory and releases the memory when there are no longer any references to it
Sandbox
monitors references to dynamic memory and releases the memory when there are no longer any references to it
SecureClassLoader
monitors references to dynamic memory and releases the memory when there are no longer any references to it
Garbage collector
allows you to associate permissions based upon the source of a loaded class
javac
allows you to associate permissions based upon the source of a loaded class
Domain
allows you to associate permissions based upon the source of a loaded class
JVM
allows you to associate permissions based upon the source of a loaded class
ClassLoader
allows you to associate permissions based upon the source of a loaded class
SecurityManager
allows you to associate permissions based upon the source of a loaded class
Generations
allows you to associate permissions based upon the source of a loaded class
Sandbox
allows you to associate permissions based upon the source of a loaded class
SecureClassLoader
allows you to associate permissions based upon the source of a loaded class
Garbage collector
presents a bounded environment for a Java program to run within
javac
presents a bounded environment for a Java program to run within
Domain
presents a bounded environment for a Java program to run within
JVM
presents a bounded environment for a Java program to run within
ClassLoader
presents a bounded environment for a Java program to run within
SecurityManager
presents a bounded environment for a Java program to run within
Generations
presents a bounded environment for a Java program to run within
Sandbox
presents a bounded environment for a Java program to run within
SecureClassLoader
presents a bounded environment for a Java program to run within
Garbage collector
class that allows applications to implement a code-level security policy
javac
class that allows applications to implement a code-level security policy
Domain
class that allows applications to implement a code-level security policy
JVM
class that allows applications to implement a code-level security policy
ClassLoader
class that allows applications to implement a code-level security policy
SecurityManager
class that allows applications to implement a code-level security policy
Generations
class that allows applications to implement a code-level security policy
Sandbox
class that allows applications to implement a code-level security policy
SecureClassLoader
class that allows applications to implement a code-level security policy
Garbage collector
a set of Java objects
javac
a set of Java objects
Domain
a set of Java objects
JVM
a set of Java objects
ClassLoader
a set of Java objects
SecurityManager
a set of Java objects
Generations
a set of Java objects
Sandbox
a set of Java objects
SecureClassLoader
a set of Java objects
Garbage collector
allows Java byte codes to execute
javac
allows Java byte codes to execute
Domain
allows Java byte codes to execute
JVM
allows Java byte codes to execute
ClassLoader
allows Java byte codes to execute
SecurityManager
allows Java byte codes to execute
Generations
allows Java byte codes to execute
Sandbox
allows Java byte codes to execute
SecureClassLoader
allows Java byte codes to execute
Garbage collector
memory pools holding objects of different ages
javac
memory pools holding objects of different ages
Domain
memory pools holding objects of different ages
JVM
memory pools holding objects of different ages
ClassLoader
memory pools holding objects of different ages
SecurityManager
memory pools holding objects of different ages
Generations
memory pools holding objects of different ages
Sandbox
memory pools holding objects of different ages
SecureClassLoader
memory pools holding objects of different ages
Garbage collector
the gatekeeper of the JVM
javac
the gatekeeper of the JVM
Domain
the gatekeeper of the JVM
JVM
the gatekeeper of the JVM
ClassLoader
the gatekeeper of the JVM
SecurityManager
the gatekeeper of the JVM
Generations
the gatekeeper of the JVM
Sandbox
the gatekeeper of the JVM
SecureClassLoader
the gatekeeper of the JVM
Garbage collector
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
42)What are the purposes of the AccessController class?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.