Home Interviewquestions J2ee J2EE Interviews Question page16,J2EE Interviews Guide,J2EE Interviews
Questions:Ask|Latest


 
 

Share on Google+Share on Google+

J2EE Interviews Question page16,J2EE Interviews Guide,J2EE Interviews

Advertisement
This page discusses - J2EE Interviews Question page16,J2EE Interviews Guide,J2EE Interviews

J2EE Interviews Question page16

     

  1. What is resource manager connection factory ?
    An object used for creating a resource manager connection.
        
  2. What is RMI ?
    Remote Method Invocation. A technology that allows an object running in one Java virtual machine to invoke methods on an object running in a different Java virtual machine.
       
  3. What is RMI-IIOP ?
    A version of RMI implemented to use the CORBA IIOP protocol. RMI over IIOP provides interoperability with CORBA objects implemented in any language if all the remote interfaces are originally defined as RMI interfaces.
      
  4. What is role (development) ?
    The function performed by a party in the development and deployment phases of an application developed using J2EE technology. The roles are application component provider, application assembler, deployer, J2EE product provider, EJB container provider, EJB server provider, Web container provider, Web server provider, tool provider, and system administrator.
       
  5. What is role mapping ?
    The process of associating the groups or principals (or both), recognized by the container with security roles specified in the deployment descriptor. Security roles must be mapped by the deployer before a component is installed in the server.
        
  6. What is role (security) ?
    An abstract logical grouping of users that is defined by the application assembler. When an application is deployed, the roles are mapped to security identities, such as principals or groups, in the operational environment. In the J2EE server authentication service, a role is an abstract name for permission to access a particular set of resources. A role can be compared to a key that can open a lock. Many people might have a copy of the key; the lock doesn't care who you are, only that you have the right key.
      
  7. What is rollback ?
    The point in a transaction when all updates to any resources involved in the transaction are reversed.
       
  8. What is root ?
    The outermost element in an XML document. The element that contains all other elements.
      
  9. What is SAX ?
    Abbreviation of Simple API for XML.
      
  10. What is Simple API for XML ?
    An event-driven interface in which the parser invokes one of several methods supplied by the caller when a parsing event occurs. Events include recognizing an XML tag, finding an error, encountering a reference to an external entity, or processing a DTD specification.
       
  11. What is schema ?
    A database-inspired method for specifying constraints on XML documents using an XML-based language. Schemas address deficiencies in DTDs, such as the inability to put constraints on the kinds of data that can occur in a particular field. Because schemas are founded on XML, they are hierarchical. Thus it is easier to create an unambiguous specification, and it is possible to determine the scope over which a comment is meant to apply.
       
  12. What is Secure Socket Layer (SSL) ?
    A technology that allows Web browsers and Web servers to communicate over a secured connection.
     
  13. What is security attributes ?
    A set of properties associated with a principal. Security attributes can be associated with a principal by an authentication protocol or by a J2EE product provider or both.
     
  14. What is security constraint ?
    A declarative way to annotate the intended protection of Web content. A security constraint consists of a Web resource collection, an authorization constraint, and a user data constraint.
       
  15. What is security context ?
    An object that encapsulates the shared state information regarding security between two entities.
       
  16. What is security permission ?
    A mechanism defined by J2SE, and used by the J2EE platform to express the programming restrictions imposed on application component developers.
     
  17. What is security permission set ?
    The minimum set of security permissions that a J2EE product provider must provide for the execution of each component type.
      
  18. What is security policy domain ?
    A scope over which security policies are defined and enforced by a security administrator. A security policy domain has a collection of users (or principals), uses a well-defined authentication protocol or protocols for authenticating users (or principals), and may have groups to simplify setting of security policies.
      
  19. What is security role ?
    An abstract logical grouping of users that is defined by the application assembler. When an application is deployed, the roles are mapped to security identities, such as principals or groups, in the operational environment. In the J2EE server authentication service, a role is an abstract name for permission to access a particular set of resources. A role can be compared to a key that can open a lock. Many people might have a copy of the key; the lock doesn't care who you are, only that you have the right key.
       
Advertisements

Liked it!  Share this Tutorial


Follow us on Twitter, or add us on Facebook or Google Plus to keep you updated with the recent trends of Java and other open source platforms.

Posted on: April 18, 2011

Ask Questions?    Discuss: J2EE Interviews Question page16,J2EE Interviews Guide,J2EE Interviews  

Post your Comment


Your Name (*) :
Your Email :
Subject (*):
Your Comment (*):
  Reload Image
 
 
Comments
DMCA.com