Software Engineering of Web-based Systems
CS6320-01 Summer 2010 Midterm Exam. II
Name:
SELECT THE BEST CHOICE (Write the answer to the left of the question)
(66%)
1. When show_times.jsp is requested by the following statement, show_times.jsp
response.sendRedirect("/schedule/times/show_times.jsp");
a.
b.
c.
d.
has access to the response object
has access to the request object
has access to the response and request objects
doesn’t have access to either the response or the request object
ANS: D
2. Which of the following is not a benefit of using server-side data validation?
a.
b.
c.
d.
you use Java
you can have custom error pages
you use less code
the client browsers don’t have to support JavaScript
ANS: C
3. If the following JSP tag is coded in a main JSP, what happens when the reports.jsp page is updated?
<jsp:include page="includes/reports.jsp" />
a.
b.
c.
the changes aren’t updated in the subsequent requests for the main JSP
the changes appear for subsequent requests for the main JSP
a JSP error is thrown
ANS: B
4. The value of an initialization parameter is usually retrieved
a.
b.
by code in a servlet
by the web.xml file
c.
d.
from the server.xml file
from the request object
ANS: A
5. According to the following code from a web.xml file, the error.htm page is called when
<error-page>
<exception-type>java.lang.Throwable</exception-type>
<location>error.htm</location>
</error-page>
a.
b.
an HTML page can’t be found
any HTTP or Java error occurs
c.
d.
an uncaught exception is thrown
an HTTP status code error occurs
ANS: C
6. A session object is created
a.
b.
c.
d.
every time a browser makes a request for a web page
every time a browser requests a servlet
every time a browser requests a jsp
the first time a browser requests a servlet or JSP from a web site
ANS: D
7. The current session object is available
a.
b.
only to JSPs
only to servlets
c.
to both servlets and JSPs
ANS: C
8. Which of the following statements is invalid?
a.
b.
c.
d.
String name = session.getAttribute("fullName");
Book book = (Book) session.getAttribute("bookObj");
session.setAttribute("fullName", "Ted Andrews");
session.removeAttribute("fullName");
ANS: A
9. When you use URL encoding for session tracking, you must
a.
b.
c.
d.
e.
convert all HTML pages in the application to JSPs
use the encodeURL method to encode all URLs in the JSPs
use the encodeURL method to encode all URLs in the servlets
a and b above
a, b, and c above
ANS: D
10. The following Anchor tag demonstrates how to use
<a href="/WorkServlet?shift=<%= shiftCode %>" >
View your schedule
</a>
a.
b.
URL rewriting
URL encoding
c.
d.
hidden fields
cookies
ANS: A
11. When you use hidden fields to pass parameters to a servlet or JSP, all but one of the following is true.
Which one is it?
a.
b.
c.
d.
the parameters aren’t shown in the URL
the user can see the parameters by using the browser to look at the page’s source code
you don’t have to store the parameters in the session object
you can’t use URL encoding
ANS: D
12. If you use the MVC pattern with EL,
a.
b.
c.
d.
the servlets create the JavaBeans and set the bean properties
the servlets create the JavaBeans and the JSPs set the bean properties
the JSPs create the JavaBeans and set the bean properties
the JSPs create the JavaBeans and the servlets set the bean properties
ANS: A
13. Before a server uses SSL to transmit data to a client, it
a.
b.
c.
d.
provides a digital secure certificate to the client
decrypts all data
confirms the identity of the client
authorizes the client
ANS: A
14. A digital secure certificate is provided
a.
b.
for a fee from a certificate authority
free from a certificate authority
c.
d.
for a fee from a registration authority
free from a registration authority
ANS: A
15. The maximum SSL strength for an application’s connections is determined by
a.
b.
c.
d.
the SSL methods that you use
the certification authority
the registration authority
the digital secure certificate
ANS: D
16. Once you establish a secure connection, the application
a.
b.
c.
d.
returns to a non-secure connection for subsequent requests
uses absolute URLs to continue using the secure connection
continues to use a secure connection until an absolute URL specifies a non-secure connection
continues to use a secure connection until until a relative URL specifies a non-secure connection
ANS: C
17. In Tomcat, a security constraint is coded in
a.
b.
the web.xml file
the server.xml file
c.
d.
the context.xml file
the application
ANS: A
18. Which of the following is not included in a security constraint?
a.
b.
c.
the URL pattern for the restricted resources
the authorized roles for accessing the restricted resources
the authorized usernames for accessing the restricted resources
ANS: C
19. The security realm provides the authorized
a.
b.
usernames and passwords
usernames and roles
c.
d.
usernames, passwords, and roles
passwords and roles
ANS: C
20 . By default, Tomcat uses a security realm that stores the user data in
a.
b.
the web.xml file
the server.xml file
c.
d.
a database
the tomcat-users.xml file
ANS: D
21. When an application uses basic authentication,
a.
b.
c.
d.
the username and password are encrypted before being sent to the server
a dialog box automatically prompts the user for a username and password
the usernames and passwords are stored in the tomcat-users.xml file
the web.xml file provides the path for the login page
ANS: B
22. When an application uses form-based authentication,
a.
b.
c.
d.
the username and password are encrypted before being sent to the server
a dialog box automatically prompts the user for a username and password
the usernames and passwords are stored in the tomcat-users.xml file
the web.xml file provides the path for the login page
ANS: D
FILL IN THE MISSING BLANKS
(27%)
Select the best fit from the following word, or words: request, response, request parameters, WEB-INF, META-INF, tomcat,
doPost, doGet, JSP, servlet, JSTL, JDBC, JavaBeans, AJAX, web.xml, ServletContext, init, attributes, cookie, URL rewriting, set,
get, self-signed, context.xml, Context
.
1. When you use the MVC pattern, you often add ________________________ to the request object before
you forward it to a JSP or another servlet.
ANS: attributes
2. By default, the servlet API uses a _______________________________ to store a session ID.
ANS: cookie
3. To automatically append the session ID to a URL, you can use the encodeURL method of the
_______________________________ object.
ANS: response
4. Cookies are retrieved from the __________________________ object.
ANS: request
5. Instead of storing data that’s used for a single request in the session object, you can use hidden fields or
__________________________________.
ANS: URL rewriting
6. One of the advantages that EL has over standard JSP tags is that you can not only use EL with
___________________ but also with maps, arrays, and lists.
ANS: JavaBeans
7. One of the disadvantages of using EL is that it doesn’t provide a way to _______________ properties.
ANS: set
8. A _________________________ digital secure certificate is enables you to test SSL connections in a local
environment without purchasing a secure certificate.
ANS: self-signed
9. You use the auth-method element in the ____________________ file to specify the type of authentication
that’s going to be used by the application.
ANS: web.xml
ANSWER THE FOLLOWING QUESTION:
(7%)
In Exercise 16-1 Test a secure connection, the step 1 says that you need to create a self-signed certificate.
(a) How do you create this certificate? (b) How can you be sure this is created before the testing ? Then
step 1 says that you need to remove the comments in Tomcat’s server.xml file from the Connector element.
(c) What is the purpose of doing so?

get an essay or any other
homework writing help
for a fair price!
check it here!