网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()
A
Transfer Object
B
Session Facade
C
Intercepting Filter
D
Template Method
E
Model-View-Controller
参考答案
参考解析
解析:
暂无解析
更多 “单选题A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A Transfer ObjectB Session FacadeC Intercepting FilterD Template MethodE Model-View-Controller” 相关考题
考题
A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()
A.User ID/password fileB.Communications layerC.Client applicationsD.Operating system
考题
A developer has created a web application that includes a servlet for each use case in the application.These servlets have become rather difficult to maintain because the request processing methods havebecome very large. There is also common processing code in many servlets because these use cases arevery similar. Which two design patterns can be used together to refactor and simplify this web application?()A、ProxyB、View HelperC、Front ControllerD、Session FacadeE、Business DelegateF、Model-View-Controller
考题
A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A、Transfer ObjectB、Session FacadeC、Intercepting FilterD、Template MethodE、Model-View-Controller
考题
A developer is designing a web application which extensively uses EJBs and JMS. The developer finds that there is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further, because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides a solution for this problem?()A、 CommandB、 Transfer objectC、 Service locatorD、 Session FaçadeE、 Business delegateF、 Data access object
考题
A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()A、 Transfer ObjectB、 Service LocatorC、 Front ControllerD、 Intercepting FilterE、 Business DelegateF、 Model-View-Controller
考题
A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()A、User ID/password fileB、Communications layerC、Client applicationsD、Operating system
考题
A developer is designing a web application which extensively uses EJBs and JMS. The developer finds thatthere is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further,because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides asolution for this problem?()A、CommandB、Transfer ObjectC、Service LocatorD、Session FacadeE、Business Delegate
考题
A developer has created a special servlet that is responsible for generating XML content that is sent to adata warehousing subsystem. This subsystem uses HTTP to request these large data files, which are compressed by the servlet to save internal network bandwidth. The developer has received a request frommanagement to create several more of these data warehousing servlets. The developer is about to copyand paste the compression code into each new servlet. Which design pattern can consolidate thiscompression code to be used by all of the data warehousing servlets?()A、FacadeB、View HelperC、Transfer ObjectD、Intercepting FilterE、Composite Facade
考题
A developer is designing a web application that must support multiple interfaces,including: an XML web service for B2B HTML for web-based clients WML for wireless customers. Which designpattern provides a solution for this problem?()A、Session FacadeB、Business DelegateC、Data Access ObjectD、Model-View-ControllerE、Chain of Responsibility
考题
A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A、 FlyweightB、 Transfer ObjectC、 Service LocatorD、 Dispatcher ViewE、 Business DelegateF、 Model-View-Controller
考题
A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A、FlyweightB、Transfer ObjectC、Service LocatorD、Dispatcher ViewE、Business DelegateF、Model-View-Controller
考题
Which the statement is true about web container session management()?A、 Access to session-scoped attributes is guaranteed to be thread-safe by the web container.B、 To activate URL rewriting, the developer must use the HttpServletResponse.setURLRewriting method.C、 If the web application uses HTTPS, then the web container may use the data on the HTTPS request stream to identify the client.D、 The JSESSIONID cookie is stored permanently on the client so that a user may return to the web application and the web container will rejoin that session.
考题
A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()A、Remote ProxyB、Front ControllerC、Service ActivatorD、Intercepting FilterE、Business Delegate
考题
A Company.com developer has created a web application that includes a servlet for each use case in the application. These servlets have become rather difficult to maintain because the request processing methods have become very large. There is also common processing code in many servlets because these use cases are very similar. Which two design patterns can be used together to refactor and simplify this web application? ()A、 ProxyB、 View HelperC、 Front ControllerD、 Session FaçadeE、 Business DelegateF、 Model-View-Controller
考题
A developer is designing a web application that must support multiple interfaces, including: • an XML web service for B2B • HTML for web-based clients • WML for wireless customers Which design pattern provides a solution for this problem?( )A、 Session FaçadeB、 Business DelegateC、 Data Access ObjectD、 Model-View-ControllerE、 Chain of Responsibility
考题
单选题A developer is designing a web application that makes many fine-grained remote data requests for each client request. During testing, the developer discovers that the volume of remote requests significantly degrades performance of the application. Which design pattern provides a solution for this problem?()A
FlyweightB
Transfer ObjectC
Service LocatorD
Dispatcher ViewE
Business DelegateF
Model-View-Controller
考题
单选题A developer has created a special servlet that is responsible for generating XML content that is sent to adata warehousing subsystem. This subsystem uses HTTP to request these large data files, which are compressed by the servlet to save internal network bandwidth. The developer has received a request frommanagement to create several more of these data warehousing servlets. The developer is about to copyand paste the compression code into each new servlet. Which design pattern can consolidate thiscompression code to be used by all of the data warehousing servlets?()A
FacadeB
View HelperC
Transfer ObjectD
Intercepting FilterE
Composite Facade
考题
单选题Your company has an internal Web application that uses a self-signed SSL certificate. The company has an internal certification authority (CA) with autoenrollment.When users attempt to start the Web application, Internet Explorer displays an error message that recommends closing the Web page rather than continuing to the application. You need to ensure that Internet Explorer does not display the error message. What should you do?()A
Issue a certificate from the internal CA and install it on the application serverB
Install the Web application’s certificate into the computer store on each client computerC
Install the Web application’s certificate into the personal store on each client computer. Add the application’s URL to the Trusted Sites zone in Internet ExplorerD
Purchase a commercial certificate and install it on the internal CA
考题
单选题Which statement is true about web container session management?()A
Access to session-scoped attributes is guaranteed to be thread-safe by the web container.B
To activate URL rewriting, the developer must use the HttpServletResponse.setURLRewriting method.C
If the web application uses HTTPS, then the web container may use the data on the HTTPS request stream to identify the client.D
The JSESSIONID cookie is stored permanently on the client so that a user may return to the web application and the web container will rejoin that session.
考题
单选题A developer is designing a multi-tier web application and discovers a need to log each incoming client request. Which two patterns, taken independently, provide a solution for this problem? ()A
Transfer ObjectB
Service LocatorC
Front ControllerD
Intercepting FilterE
Business DelegateF
Model-View-Controller
考题
单选题A developer is designing a web application which extensively uses EJBs and JMS. The developer finds thatthere is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further,because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides asolution for this problem?()A
CommandB
Transfer ObjectC
Service LocatorD
Session FacadeE
Business Delegate
考题
单选题A developer is designing a web application that must support multiple interfaces, including: an XML web service for B2B HTML for web-based clients WML for wireless customers. Which designpattern provides a solution for this problem?()A
Session FacadeB
Business DelegateC
Data Access ObjectD
Model-View-ControllerE
Chain of Responsibility
考题
单选题A developer is designing the presentation tier for a web application which requires a centralized requesthandling to complete common processing required by each request. Which design pattern provides asolution to this problem?()A
Remote ProxyB
Front ControllerC
Service ActivatorD
Intercepting FilterE
Business Delegate
考题
单选题A developer is designing a web application that makes many fine-grained remote data requests for eachclient request. During testing, the developer discovers that the volume of remote requests significantlydegrades performance of the application. Which design pattern provides a solution for this problem?()A
FlyweightB
Transfer ObjectC
Service LocatorD
Dispatcher ViewE
Business DelegateF
Model-View-Controller
考题
单选题A developer is designing a web application that must verify for each request: The originating request is froma trusted network. The client has a valid session.The client has been authenticated. Which design pattern provides a solution in this situation?()A
Transfer ObjectB
Session FacadeC
Intercepting FilterD
Template MethodE
Model-View-Controller
考题
单选题A developer is designing a web application that must support multiple interfaces, including: • an XML web service for B2B • HTML for web-based clients • WML for wireless customers Which design pattern provides a solution for this problem?( )A
Session FaçadeB
Business DelegateC
Data Access ObjectD
Model-View-ControllerE
Chain of Responsibility
考题
单选题A developer is designing a web application which extensively uses EJBs and JMS. The developer finds that there is a lot of duplicated code to build the JNDI contexts to access the beans and queues. Further, because of the complexity, there are numerous errors in the code. Which J2EE design pattern provides a solution for this problem?()A
CommandB
Transfer objectC
Service locatorD
Session FaçadeE
Business delegateF
Data access object
考题
单选题A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()A
User ID/password fileB
Communications layerC
Client applicationsD
Operating system
热门标签
最新试卷