Java认证考试

When using a form-based authentication, which action must be used in the login form?()A、 j_loginB、 j_get_userC、 j_login_checkD、 j_get_securityE、 j_security_check

题目

When using a form-based authentication, which action must be used in the login form?()

  • A、 j_login
  • B、 j_get_user
  • C、 j_login_check
  • D、 j_get_security
  • E、 j_security_check
如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which statement concerning the lashings of containers with solid bar or wire rope lashings is TRUE ________.

A.Stack weights should be less when using a solid bar lashing as compared to a wire lashing

B.Stack heights may be increased when using a solid bar lashing

C.Stack heights should be reduced when using a solid bar lashing

D.Solid bars should be used for lashing the first tier only,with wire lashings on the higher tier(s)


正确答案:A

第2题:

When analog signals are digitized using the G.711 codec, voice samples are encapsulated into protocol data units (PDUs) involving which three headers? ()

  • A、IP
  • B、TCP
  • C、RTP
  • D、UDP
  • E、H323
  • F、CRTP

正确答案:A,C,D

第3题:

Which of the following addresses can be assigned to a host when using a subnet mask of 255.255.254.0? (Select three)

A. 113.10.4.0

B. 186.54.3.0

C. 175.33.3.255

D. 26.35.2.255

E. 152.135.7.0

F. 17.35.36.0


正确答案:BDE
B,D,E 解析:Explanation:
These are all valid host IP addresses within the /23 subnet.

Incorrect Answers:
A. This is the network address for the 113.10.4.0/23 subnet.
C. This is the broadcast address for the 175.33.2.0/23 subnet.
F. This is the network address for the 17.35.36.0/23 subnet.

第4题:

When you are designing a Web application, which options define how rich text displays in a browser?()

  • A、"Using HTML"
  • B、"Using Java Applet"
  • C、"Using AJAX Control"
  • D、"Using Best Fit for OS"

正确答案:C

第5题:

When NIC teaming is used, how are Loops avoided in a virtual switch?()

  • A、By using active / passive teaming with spanning tree on the active Iink
  • B、By using active / passive teaming with onIy the active Iink in use
  • C、By using active / activate teaming with VM utilizing both uplink ports

正确答案:B

第6题:

When using slings,cargo handlers should take all the following precautions except ______.

A.Ensure that slings are securely fastened around the load

B.Avoid careless winch operations,especially when handling fragile cargo

C.Exercise care when using hooks,crowbars,and similar tools

D.Keep the loads as close to the rail or deck as possible


正确答案:D

第7题:

When should traffic shaping be implemented on Frame Relay PVCs?()

  • A、When you want to drop excess traffic above the CIR
  • B、When there is a speed mismatch between the central site and the remote site
  • C、When using Frame Relay SVCs
  • D、When over-subscribing the central site link
  • E、When LLQ is implemented on the Frame Relay PVC
  • F、When Multilink PPP LFI is implemented on the Frame Relay PVC

正确答案:B,D

第8题:

Which two scenarios are NOT safe to replace a StringBuffer object with a StringBuilder object?()

A.When using versions of Java technology earlier than 5.0.

B.When sharing a StringBuffer among multiple threads.

C.When using the java.io class StringBufferInputStream.

D.When you plan to reuse the StringBuffer to build more than one string.


参考答案:A, B

第9题:

What two situations could require the use of multiple routing protocols? ()

  • A、when all equipment is manufactured by Cisco
  • B、when there are multiple paths to destination networks
  • C、because having multiple routing protocols confuses hackers
  • D、when migrating from an older Interior Gateway Protocol (IGP) to a new IGP
  • E、when  using UNIX host - based routers
  • F、when smaller broadcast domains are desired

正确答案:D,E

第10题:

Whichtwo scenarios are NOT safe to replace a StringBuffer object with a StringBuilder object?()

  • A、When using versions of Java technology earlier than 5.0.
  • B、When sharing a StringBuffer among multiple threads.
  • C、When using the java.io class StringBufferInputStream.
  • D、When you plan to reuse the StringBuffer to build more than one string.
  • E、Enitiation of separate design processes to the separation of users

正确答案:A,B

更多相关问题