CoolInterview.com - World's Largest Collection of Interview Questions & Answers, FAQs, queries, sample papers, exam papers, dumps, what, why, how, where, when questions
Our Services
Get 9,000 Interview Questions & Answers in an eBook.




Get it now !!
Send your Resume to 6000 Companies
Java Security Interview Questions & Answers - Learning Mode
COOLINTERVIEW.COM J2EE INTERVIEW QUESTIONS JAVA SECURITY INTERVIEW QUESTIONS QUESTIONS & ANSWERS - LEARNING MODE

Java Security Interview Questions & Answers - Learning Mode

Java security technology includes a large set of APIs, tools, and implementations of commonly used security algorithms, mechanisms, and protocols. The Java security APIs span a wide range of areas, including cryptography, public key infrastructure, secure communication, authentication, and access control. The Java Class Library provides a number of APIs related to security, such as standard cryptographic algorithms, authentication, and secure communication protocols.

Try Java Security Interview Questions & Answers - Exam Mode

1 2 Next

Sort By : Latest First | Oldest First | By Rating

Java Security Interview Questions & Answers - Learning Mode
Try Java Security Interview Questions & Answers - Exam Mode
Question: What is LSDOU?

Answer: It?s group policy inheritance model, where the policies are applied to Local machines, Sites, Domains and Organizational Units. Source: CoolInterview.com
Question: How can you work with permissions from your .NET application?

Answer: You can request permission to do something and you can demand certain permissions from other apps. You can also refuse permissions so that your app is not inadvertently used to destroy some data. Source: CoolInterview.com
Question: Where are group policies stored?

Answer: Group policies stored at:
%SystemRoot%System32GroupPolicy Source: CoolInterview.com
Question: How can I protect myself?

Answer: If you maintain sensitive data on your computer that you think an unscrupulous adversary might want, you should disable Java and JavaScript, as well as not installing plug-ins, except from well-known vendors.

If you don't disable Java or JavaScript, think twice before visiting a Web site belonging to a person you don't know or don't trust. Of course, some people will be perfectly happy just living with the risk.

You can reduce the damage caused by a potential security b Source: CoolInterview.com
Question: Why doesn?t LSDOU work under Windows NT?

Answer: If the NTConfig.pol file exist, it has the highest priority among the numerous policies. Source: CoolInterview.com
Question: I am trying to create a new universal user group. Why can?t I?

Answer: Universal groups are allowed only in native-mode Windows Server 2003 environments. Native mode requires that all domain controllers be promoted to Windows Server 2003 Active Directory. Source: CoolInterview.com
Question: What?s the difference between authentication and authorization?

Answer: Authentication happens first. You verify user?s identity based on credentials. Authorization is making sure the user only gets access to the resources he has credentials for. Source: CoolInterview.com
Question: Which version of my browser should I use?

Answer: Generally, the latest version is the safest. Be sure to regularly check your browser vendor's Web pages for announcements of new versions. Look carefully - the announcements are not always prominent. Source: CoolInterview.com
Question: Who is at risk in Java?

Answer: You're at risk if you're running a Java-enabled browser and you visit a Web page written by a person you don't know or don't trust. Since the two most common browsers, Netscape Navigator and Microsoft Internet Explorer, are Java-enabled, most people surfing the Web are at risk. Source: CoolInterview.com
Question: What?s the difference between local, global and universal groups?

Answer: Domain local groups assign access permissions to global domain groups for local domain resources. Global groups provide access to resources in other trusted domains. Universal groups grant access to resources in all trusted domains. Source: CoolInterview.com
Question: What about ``hostile applets?

Answer: This is a general term for Java applets (programs) that exploit security bugs. There are some pages on the Web that demonstrate, with appropriate warning messages, some hostile applets. The applets we've seen are nuisance attacks rather than damaging attacks. Source: CoolInterview.com
Question: Which is more secure: Java or ActiveX?

Answer: This is a complicated question with no simple answer, so we wrote a separate FAQ about it. Source: CoolInterview.com
Question: Are the actual permissions for the application defined at run-time or compile-time?

Answer: The CLR computes actual permissions at runtime based on code group membership and the calling chain of the code. Source: CoolInterview.com
Question: I run a Web server. Am I at risk?

Answer: Not directly. But watch out for some newer servers that support "servlets". Servlets are fine if they are all written by the people running the server site; using servlets in this way is probably better than using CGI scripts. Going beyond this to let clients upload Java servlets into your server is very risky.

Of course, you should be careful about which Java applets appear on your server. Unless you wrote the applet yourself, you don't necessarily know what it's doing. If you co Source: CoolInterview.com
Question: What is GPT and GPC?

Answer: GPT is Group policy template and GPC is group policy container in Java Security Source: CoolInterview.com
Question: How common are security breaches?

Answer: So far, there have been no publicly reported, confirmed cases of security breaches involving Java, though there have been some suspicious events that might possibly have involved Java security problems. Of course, the lack of reported cases is no guarantee that there haven't been breaches that either weren't discovered or weren't reported. But it does indicate that breaches are rare. Source: CoolInterview.com
Question: What about JavaScript?

Answer: Java and JavaScript, despite the similarity of their names, are not related. JavaScript has its own security problems, so you may also want to disable JavaScript. Source: CoolInterview.com
Question: What?s a code group?

Answer: A code group is a set of assemblies that share a security context. Source: CoolInterview.com
Question: What about products that claim to block Java applets at a firewall?

Answer: If you want to block Java, the best way to do it is by setting your browser preferences to disable Java. Source: CoolInterview.com
Question: What are the authentication modes in ASP.NET?

Answer: Authentication modes in ASP.NET is None, Windows, Forms and Passport. Source: CoolInterview.com

1 2 Next



India News Network
Latest 20 Questions
Payment of time- barred debt is: (a) Valid (b) Void (c) Illegal (d) Voidable
Consideration is defined in the Indian Contract Act,1872 in: (a) Section 2(f) (b) Section 2(e) (c) Section 2(g) (d) Section 2(d)
Which of the following is not an exception to the rule, "No consideration, No contract": (a) Natural love and affection (b) Compensation for involuntary services (c) Completed gift (d) Agency
Consideration must move at the desire of: (a) The promisor (b) The promisee (c) The promisor or any other party (d) Both the promisor and the promisee
An offer which is open for acceptance over a period of time is: (a) Cross Offer (b) Counter Offer (c) Standing Offer (d) Implied Offer
Specific offer can be communicated to__________ (a) All the parties of contract (b) General public in universe (c) Specific person (d) None of the above
_________ amounts to rejection of the original offer. (a) Cross offer (b) Special offer (c) Standing offer (d) Counter offer
A advertises to sell his old car by advertising in a newspaper. This offer is caleed: (a) General Offer (b) Special Offer (c) Continuing Offer (d) None of the above
In case a counter offer is made, the original offer stands: (a) Rejected (b) Accepted automatically (c) Accepted subject to certain modifications and variations (d) None of the above
In case of unenforceable contract having some technical defect, parties (a) Can sue upon it (b) Cannot sue upon it (c) Should consider it to be illegal (d) None of the above
If entire specified goods is perished before entering into contract of sale, the contract is (a) Valid (b) Void (c) Voidable (d) Cancelled
______________ contracts are also caled contracts with executed consideration. (a) Unilateral (b) Completed (c) Bilateral (d) Executory
A offers B to supply books @ Rs 100 each but B accepts the same with condition of 10% discount. This is a case of (a) Counter Offer (b) Cross Offer (c) Specific Offer (d) General Offer
_____________ is a game of chance. (a) Conditional Contract (b) Contingent Contract (c) Wagering Contract (d) Quasi Contract
There is no binding contract in case of _______ as one's offer cannot be constructed as acceptance (a) Cross Offer (b) Standing Offer (c) Counter Offer (d) Special Offer
An offer is made with an intention to have negotiation from other party. This type of offer is: (a) Invitation to offer (b) Valid offer (c) Voidable (d) None of the above
When an offer is made to the world at large, it is ____________ offer. (a) Counter (b) Special (c) General (d) None of the above
Implied contract even if not in writing or express words is perfectly _______________ if all the conditions are satisfied:- (a) Void (b) Voidable (c) Valid (d) Illegal
A specific offer can be accepted by ___________. (a) Any person (b) Any friend to offeror (c) The person to whom it is made (d) Any friend of offeree
An agreement toput a fire on a person's car is a ______: (a) Legal (b) Voidable (c) Valid (d) Illegal
Cache = 0.078125 Seconds