1.
Which of the following statements comparing traditional RMI with Spring RMI is NOT true? (select one)
2.
Security filters are used in Spring Security in which ways? (select one)
3.
Which of the following strategies is correct for configuring Spring Security to intercept particular URLs? (Select one)
4.
Which of the following statements is NOT a characteristic of Spring Security? (select one)
5.
What is the principal purpose of Spring's Security tag library? (Select one)
6.
Which of the following statements is true concerning configuring JMS Resources with Spring? (Select one)
7.
Which of the following statement is true concerning Spring's JmsTemplate (select one)
8.
Which of the following methods is NOT provided by the JmsTemplate? (select one)
9.
Consider the following Spring JMS configuration Which of the following statements is truE. (select one)
10.
Select which statement is true with respect to constructor injection with Spring (select one)