网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Users of your web application have requested that they should be able to set the duration of their sessions.So for example, one user might want a webapp to stay connected for an hour rather than the webapp’sdefault of fifteen minutes; another user might want to stay connected for a whole day. Furthermore, youhave a special login servlet that performs user authentication and retrieves the User object from the database. You want to augment this code to set up the user’s specified session duration. Which codesnippet in the login servlet will accomplish this goal?()
A

User user = // retrieve the User object from the database session.setDurationInterval(user.getSessionDuration());

B

User user = // retrieve the User object from the database session.setMaxDuration(user.getSessionDuration());

C

User user = // retrieve the User object from the database session.setInactiveInterval(user.getSessionDuration());

D

User user=//retrieve the User object from the database session.setDuration(user.getSessionDuratio());

E

User user = // retrieve the User object from the database session.setMaxInactiveInterval(user.getSessionDuration());


参考答案

参考解析
解析: 暂无解析
更多 “单选题Users of your web application have requested that they should be able to set the duration of their sessions.So for example, one user might want a webapp to stay connected for an hour rather than the webapp’sdefault of fifteen minutes; another user might want to stay connected for a whole day. Furthermore, youhave a special login servlet that performs user authentication and retrieves the User object from the database. You want to augment this code to set up the user’s specified session duration. Which codesnippet in the login servlet will accomplish this goal?()A User user = // retrieve the User object from the database session.setDurationInterval(user.getSessionDuration());B User user = // retrieve the User object from the database session.setMaxDuration(user.getSessionDuration());C User user = // retrieve the User object from the database session.setInactiveInterval(user.getSessionDuration());D User user=//retrieve the User object from the database session.setDuration(user.getSessionDuratio());E User user = // retrieve the User object from the database session.setMaxInactiveInterval(user.getSessionDuration());” 相关考题
考题 You create a Web site that stores users‘ active themes in user profile objects. You need to apply users‘ preferred themes when they log on to the Web site.What should you do? () A. In the InitComplete event handler, set the Theme property of the Page object based on the user profile.B. In the PreLoad event handler, set the Theme property of the Page object based on the user profile.C. In the OnLoad event handler, set the Theme property of the Page object based on the user profile.D. In the PreInit event handler, set the Theme property of the Page object based on the user profile.

考题 A customer has multiple application servers which create one process for each connected user.  All users share the same AIX environment. What is a benefit of using WPARs in this environment?()A、WPARs give more controls for resource management than the traditional AIX operating system tools.B、WPARs support Live Application Mobility which can be used to balance user processes acrosssystems.C、WPARs each have a copy of the AIX kernel, offering better availability than a system without WPARs.D、WPARs provide the ability to apply fixes specific for each environment, enabling the customer to create specialized application servers.

考题 In your database instance, the user sessions are connected to the database server from the remote machines.You want to achieve the following for these users: 1. The user account must be locked after four unsuccessful login attempts. 2. The user must be prompted to change the password at regular intervals. 3. The user may not have more than three simultaneous sessions. 4. The user session must automatically be logged off if more than 10 minutes elapsed time used. How would you accomplish the above()A、By assigning profiles for the usersB、By implementing Fine-Grained Auditing (FGA)C、By granting a secure application role to the usersD、By implementing the Database Resource Manager plan

考题 Users of your web application have requested that they should be able to set the duration of their sessions.So for example, one user might want a webapp to stay connected for an hour rather than the webapp’sdefault of fifteen minutes; another user might want to stay connected for a whole day. Furthermore, youhave a special login servlet that performs user authentication and retrieves the User object from the database. You want to augment this code to set up the user’s specified session duration. Which codesnippet in the login servlet will accomplish this goal?()A、User user = // retrieve the User object from the database session.setDurationInterval(user.getSessionDuration());B、User user = // retrieve the User object from the database session.setMaxDuration(user.getSessionDuration());C、User user = // retrieve the User object from the database session.setInactiveInterval(user.getSessionDuration());D、User user=//retrieve the User object from the database session.setDuration(user.getSessionDuratio());E、User user = // retrieve the User object from the database session.setMaxInactiveInterval(user.getSessionDuration());

考题 A web application uses the HttpSession mechanism to determine if a user is “logged in”. When a user supplies a valid user name and password, an HttpSession is created for that user.  The user has access to the application for only 15 minutes after logging in. The code must determine how long the user has been logged in, and if this time is greater than 15 minutes, must destroy the HttpSession.  Which method in HttpSession is used to accomplish this?()A、 getCreationTimeB、 invalidateAfterC、 getLastAccessedTimeD、 getMaxInactiveInterval

考题 Which command will set the core size file to unlimited for the user‘webapp’?()A、no -p 'core=-1' webappB、chuser 'core=-1' webappC、setsenv -attr 'core=unlimited' webappD、chsec -f '/etc/security/limits' 'core=-1' webapp

考题 A web application uses the HttpSession mechanism to determine if a user is "logged in." When a usersupplies a valid user name and password, an HttpSession is created for that user. The user has access tothe application for only 15 minutes after logging in. The code must determine how long the user has beenlogged in, and if this time is greater than 15 minutes, must destroy the HttpSession. Which method in HttpSession is used to accomplish this?()A、GetcreationtimeB、InvalidateafterC、GetlastaccessedtimeD、Getmaxinactiveinterval

考题 After a merger with another small business, your company has inherited a legacy WAR file but the originalsource files were lost. After reading the documentation of that web application,you discover that the WARfile contains a useful tag library that you want to reuse in your own webapp packaged as a WAR file. What do you need to do to reuse this tag library?()A、Simply rename the legacy WAR file as a JAR file and place it in your webapp’s library directory.B、Unpack the legacy WAR file, move the TLD file to the META-INF directory, repackage the whole thingas a JAR file, and place that JAR file in your webapp’s library directory.C、Unpack the legacy WAR file, move the TLD file to the META-INF directory, move the class files to thetop-level directory, repackage the whole thing as a JAR file, and place that JAR file in your webapp’slibrary directory.D、Unpack the legacy WAR file, move the TLD file to the META-INF directory, move the class files to thetop-level directory, repackage the WAR, and place that WAR file in your webapp’s WEB-INF directory.

考题 Manually, you set the consumer group of all of the newly created users to MYDB_GRP. You want the users to be able to change their consumer groups as per the application requirement. What was the first step that was needed in the process to achieve this objective?()A、 The user must have been granted the DBA role.B、 The user must have been granted the switch privilege as a part of a role.C、 The user must have been granted the Resource Manager administrator privilege.D、 The user must have been granted the switch privilege by using the DBMS_RESOURCE_MANAGER_PRIVS package.

考题 In your database instance, the user sessions are connected to the database server from the remotemachines. You want to achieve the following for these users:  1:The user account must be locked after four unsuccessful login attempts.PASSWORD_LOCK_TIME  2:The user must be prompted to change the password at regular intervals.PASSWORD_LIFE_TIME  3:The user may not have more than three simultaneous sessions.SESSIONS_PER_USER  4:The user session must automatically be logged off if more than 10 minutes elapsed time used.CONNECT_TIME  How would you accomplish the above()A、by assigning profiles for the usersB、by implementing Fine-Grained Auditing (FGA)C、by granting a secure application role to the usersD、by implementing the Database Resource Manager plan

考题 You need to create a form for Payroll application that will allow the user to view all information for any employee ID queried. This data should be displayed to the user in a grouped format. The user should be able to choose which information they want to see from a pull down list containing the values PERSONAL and PAYROLL. Which format should you use to create this form?()A、One content canvas and multiple stacked canvases. B、One content and one stacked canvas.C、Tab canvas with several tab pages. D、One content canvas. E、A horizontal and vertical toolbar.

考题 You want to enable users of a Web application to modify the Web application's UI and behavior. These modifications must be maintained at the user level so that when users return to the Web application, the changes are still in effect. You need to achieve this goal by using the minimum amount of custom code. What should you do?()A、Persist control data by using view state.B、Use Web Part controls.C、Maintain a profile for each user.D、Enable session state on the Web application.

考题 Your company has an Active Directory domain. A user attempts to log on to the domain from a client computer and receives the following message: "This user account has expired Ask your administrator to reactivate the account." You need to ensure that the user is able to log on to the domain. What should you do()A、Modify the properties of the user account to set the account to never expire.B、Modify the properties of the user account to extend the Logon Hours setting.C、Modify the properties of the user account to set the password to never expire.D、Modify the default domain policy to decrease the account lockout duration.

考题 Your network contains a Windows Server 2008 server that has the Web Server (IIS) server role installed.  You have a Web application that uses a custom application pool. The application pool is set to recycle every 1,440 minutes. The Web application does not support multiple worker processes.  You need to configure the application pool to ensure that users can access the Web application after the application pool is recycled. What should you do?()A、Set the Shutdown Executable option to True.B、Set the Process Orphaning Enabled option to True.C、Set the Disable Overlapped Recycling option to True.D、Set the Disable Recycling for Configuration Changes option to True.

考题 单选题Which command will set the core size file to unlimited for the user‘webapp’?()A no -p 'core=-1' webappB chuser 'core=-1' webappC setsenv -attr 'core=unlimited' webappD chsec -f '/etc/security/limits' 'core=-1' webapp

考题 单选题In your database instance, the user sessions are connected to the database server from the remote machines.You want to achieve the following for these users: 1. The user account must be locked after four unsuccessful login attempts. 2. The user must be prompted to change the password at regular intervals. 3. The user may not have more than three simultaneous sessions. 4. The user session must automatically be logged off if more than 10 minutes elapsed time used. How would you accomplish the above()A By assigning profiles for the usersB By implementing Fine-Grained Auditing (FGA)C By granting a secure application role to the usersD By implementing the Database Resource Manager plan

考题 单选题You create a Web site that stores users' active themes in user profile objects. You need to apply users' preferred themes when they log on to the Web site. What should you do? ()A In the InitComplete event handler, set the Theme property of the Page object based on the user profile.B In the PreLoad event handler, set the Theme property of the Page object based on the user profile.C In the OnLoad event handler, set the Theme property of the Page object based on the user profile.D In the PreInit event handler, set the Theme property of the Page object based on the user profile.

考题 单选题In your database instance, the user sessions are connected to the database server from the remotemachines. You want to achieve the following for these users:  1:The user account must be locked after four unsuccessful login attempts.PASSWORD_LOCK_TIME  2:The user must be prompted to change the password at regular intervals.PASSWORD_LIFE_TIME  3:The user may not have more than three simultaneous sessions.SESSIONS_PER_USER  4:The user session must automatically be logged off if more than 10 minutes elapsed time used.CONNECT_TIME  How would you accomplish the above()A by assigning profiles for the usersB by implementing Fine-Grained Auditing (FGA)C by granting a secure application role to the usersD by implementing the Database Resource Manager plan

考题 单选题You have a public computer that runs Windows XP Professional. All users log on to the computer by using the same user account. You log on to the computer by using the local administrator account and attempt to access a secure Web site. You discover that you have automatically logged on to the secure Web site by using the credential of another user. You need to connect to the secure Web site by using your own credentials. What should you do?()A Run ipconfig /flushdns at the command prompt. B Reset the password for the local administrator user account. C From the Internet Options in Internet Explorer, clear the AutoComplete history.D From the Internet Options in Internet Explorer, delete the Temporary Internet Files. 

考题 单选题After a merger with another small business, your company has inherited a legacy WAR file but the originalsource files were lost. After reading the documentation of that web application,you discover that the WARfile contains a useful tag library that you want to reuse in your own webapp packaged as a WAR file. What do you need to do to reuse this tag library?()A Simply rename the legacy WAR file as a JAR file and place it in your webapp’s library directory.B Unpack the legacy WAR file, move the TLD file to the META-INF directory, repackage the whole thingas a JAR file, and place that JAR file in your webapp’s library directory.C Unpack the legacy WAR file, move the TLD file to the META-INF directory, move the class files to thetop-level directory, repackage the whole thing as a JAR file, and place that JAR file in your webapp’slibrary directory.D Unpack the legacy WAR file, move the TLD file to the META-INF directory, move the class files to the top-level directory, repackage the WAR, and place that WAR file in your webapp’s WEB-INF directory.

考题 单选题Manually, you set the consumer group of all of the newly created users to MYDB_GRP. You want the users to be able to change their consumer groups as per the application requirement. What was the first step that was needed in the process to achieve this objective?()A  The user must have been granted the DBA role.B  The user must have been granted the switch privilege as a part of a role.C  The user must have been granted the Resource Manager administrator privilege.D  The user must have been granted the switch privilege by using the DBMS_RESOURCE_MANAGER_PRIVS package.

考题 单选题Manually, you set the consumer group of all of the newly created users to MYDB_GRP. You want the users to be able to change their consumer groups as per the application requirement. What was the first step that was needed in the process to achieve this objective?()A The user must have been granted the DBA role.B The user must have been granted the switch privilege as a part of a role.C The user must have been granted the Resource Manager administrator privilege.D The user must have been granted the switch privilege by using the DBMS_RESOURCE_MANAGER_PRIVS package.

考题 单选题Your company has an Active Directory domain. A user attempts to log on to the domain from a client computer and receives the following message: "This user account has expired Ask your administrator to reactivate the account." You need to ensure that the user is able to log on to the domain. What should you do()A Modify the properties of the user account to set the account to never expire.B Modify the properties of the user account to extend the Logon Hours setting.C Modify the properties of the user account to set the password to never expire.D Modify the default domain policy to decrease the account lockout duration.

考题 单选题A web application uses the HttpSession mechanism to determine if a user is "logged in." When a usersupplies a valid user name and password, an HttpSession is created for that user. The user has access tothe application for only 15 minutes after logging in. The code must determine how long the user has beenlogged in, and if this time is greater than 15 minutes, must destroy the HttpSession. Which method in HttpSession is used to accomplish this?()A GetcreationtimeB InvalidateafterC GetlastaccessedtimeD Getmaxinactiveinterval

考题 单选题You want to enable users of a Web application to modify the Web application's UI and behavior. These modifications must be maintained at the user level so that when users return to the Web application, the changes are still in effect. You need to achieve this goal by using the minimum amount of custom code. What should you do?()A Persist control data by using view state.B Use Web Part controls.C Maintain a profile for each user.D Enable session state on the Web application.

考题 单选题A web application uses the HttpSession mechanism to determine if a user is “logged in”. When a user supplies a valid user name and password, an HttpSession is created for that user.  The user has access to the application for only 15 minutes after logging in. The code must determine how long the user has been logged in, and if this time is greater than 15 minutes, must destroy the HttpSession.  Which method in HttpSession is used to accomplish this?()A  getCreationTimeB  invalidateAfterC  getLastAccessedTimeD  getMaxInactiveInterval

考题 单选题A customer has multiple application servers which create one process for each connected user.  All users share the same AIX environment. What is a benefit of using WPARs in this environment?()A WPARs give more controls for resource management than the traditional AIX operating system tools.B WPARs support Live Application Mobility which can be used to balance user processes acrosssystems.C WPARs each have a copy of the AIX kernel, offering better availability than a system without WPARs.D WPARs provide the ability to apply fixes specific for each environment, enabling the customer to create specialized application servers.