You are conducting a security audit for a web application that uses URL rewriting. The application does not allow for user-generated content and is accessible only
via secured VPN.
Which two security threats would you prioritize in your audit?
A company wants to design an internal website for the purpose of managing its numerous social events. The site will not have heavy traffic, but will require state to
be persisted in a database. You have been tasked to complete this action item in your spare time.
Which two Java EE-based approaches are best suited for quick development?
Blue Berry Corporation, one of the biggest fruit traders in Canada, has the biggest competitor, Red Cherry Corporation. Blue Berry uses a web application that is
developed by using java technologies, whereas Red Cherry's web application uses non-Java technologies. Blue Berry plans to share business sensitive,
transactional data between the two systems by integrating them in a loosely coupled manner.
Which technology should be used to this?
Oasis Corporation has decided to develop a single Instance multi-tiered application with its existing EIS resources. You are the technical lead for the Integration
team responsible for providing the following:
- A common Interface that can easily access the heterogeneous EIS resources
- Generic transaction mechanism support for EIS resource managers
- A connection pool to legacy EIS resources
Which two technologies would you use to meet these requirements?
You are asked to propose a software deployment strategy that will reduce a client will also make deploying and testing their software stack more efficient.
Which element would you include in your proposal?