

MCQOPTIONS
Saved Bookmarks
This section includes 20 Mcqs, each offering curated multiple-choice questions to sharpen your Spring knowledge and support exam preparation. Choose a topic below to get started.
1. |
ACL(Access control list) consists of:- |
A. | object identity |
B. | access control entities |
C. | none of the mentioned |
D. | all of the mentioned |
Answer» B. access control entities | |
2. |
Module that allows each domain to have it’s own access. |
A. | access share list |
B. | access common list |
C. | access control list |
D. | access list |
Answer» D. access list | |
3. |
Attribute used to render enclosed content. |
A. | ifGranted |
B. | if_Granted |
C. | ifAllGranted |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
4. |
Tag used to render view contents conditionally. |
A. | security:authorize |
B. | security:authority |
C. | security:authenticate |
D. | none of the mentioned |
Answer» B. security:authority | |
5. |
Tag which displays user’s Authentication object. |
A. | security:tag |
B. | security_Tag |
C. | security:authentication |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
6. |
@Secured annotation is used to secure methods implemented by beans.a) Trueb) False 3 Element used to specify access attributes for bean’s methods. |
A. | Trueb) False 3 Element used to specify access attributes for bean’s methods.a) security:protect |
B. | False 3 Element used to specify access attributes for bean’s methods.a) security:protectb) security:intercept |
C. | security:intercept-security |
D. | none of the mentionedView Answer |
Answer» B. False 3 Element used to specify access attributes for bean’s methods.a) security:protectb) security:intercept | |
7. |
ATTRIBUTE_USED_TO_RENDER_ENCLOSED_CONTENT.?$ |
A. | ifGranted |
B. | if_Granted |
C. | ifAllGranted |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
8. |
ACL(Access control list) consists of:-$ |
A. | object identity |
B. | access control entities |
C. | none of the mentioned |
D. | all of the mentioned |
Answer» B. access control entities | |
9. |
Module_that_allows_each_domain_to_have_it’s_own_access.$# |
A. | access share list |
B. | access common list |
C. | access control list |
D. | access list |
Answer» D. access list | |
10. |
Interfaces that defines operation of an ACL service. |
A. | AclService |
B. | MutableAclService |
C. | All of the mentioned |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
11. |
SID(Security Identity) associates with permission using. |
A. | principal(PrincipalSid) |
B. | authority (GrantedAuthoritySid) |
C. | all of the mentioned |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
12. |
Which of the following is/are part of BasePermission class:- |
A. | CREATE |
B. | READ/WRITE |
C. | DELETE |
D. | All of the mentioned |
Answer» E. | |
13. |
ACEs(Access control entries) core consists of:- |
A. | Permissions |
B. | Security Identity |
C. | All of the mentioned |
D. | None of the mentioned |
Answer» D. None of the mentioned | |
14. |
Tag used to render view contents conditionally? |
A. | security:authorize |
B. | security:authority |
C. | security:authenticate |
D. | none of the mentioned |
Answer» B. security:authority | |
15. |
Tag which renders the granted authorities one by one. |
A. | c:for |
B. | c:forEach |
C. | c:doWhile |
D. | c:while |
Answer» C. c:doWhile | |
16. |
Tag which displays user’s Authentication object.$ |
A. | security:tag |
B. | security_Tag |
C. | security:authentication |
D. | none of the mentioned |
Answer» D. none of the mentioned | |
17. |
JSP technology is also used to handle security of JSP views. |
A. | True |
B. | False |
Answer» B. False | |
18. |
Attribute used to specify custom access decision manager. |
A. | access-decision-manager-ref |
B. | access-decision-ref |
C. | access-decision |
D. | none of the mentioned |
Answer» B. access-decision-ref | |
19. |
@Secured annotation is used to secure methods implemented by beans. |
A. | True |
B. | False |
Answer» B. False | |
20. |
Element used to secure methods. |
A. | security:intercept-methods |
B. | global-method-security |
C. | all of the mentioned |
D. | none of the mentioned |
Answer» D. none of the mentioned | |