Get started Bring yourself up to speed with our introductory content.

Professional Java Development with the Spring Framework, Chapter 10: Acegi Security System for Sprin

Think you know all there is to know about using the Acegi Security System for Spring? We challenge you to test your skills by taking our latest quiz. Share the results with us and get a chance to win a copy of Professional Java Development with the Spring Framework, Chapter 10: Acegi Security System for Spring written by Rod Johnson, Juergen Hoeller, Alef Arendsen, Thomas Risberg and Colin Sampaleanu and published by John Wiley & Sons.

Think you know all there is to know about using the Acegi Security System for Spring? We challenge you to test your skills by taking our latest quiz. Share the results with us and get a chance to win a copy of Professional Java Development with the Spring Framework written by Rod Johnson, Juergen Hoeller, Alef Arendsen, Thomas Risberg and Colin Sampaleanu and published by John Wiley & Sons.

All answers to this quiz are found in the free excerpt. Good luck!

  1. What are the four main security concerns that must be addressed in typical enterprise applications?
    Your answer:

    See book excerpt, page 368, for answer

  2. Acegi Security performs authentication using what pluggable?
    Your answer:

    See book excerpt, page 369, for answer

  3. Authentication is handled by JAAS through what?
    Your answer:

    See book excerpt, page 372, for answer

  4. JAAS is only occasionally used in enterprise applications for authentication and it is rarely used for authorization because of what?
    Your answer:

    See book excerpt, page 375, for answer


  5. What does BasicProcessingFilter do?
    Your answer:

    See book excerpt, page 380, for answer

  6. You must throw away your existing investment in code and helper classes in order to move to Acegi Security. True or False?
    Your answer:

    See book excerpt, page 381, for answer

  7. What module obtains the authorization from HttpServletRequest.getUserPrincipal() but cannot write the Authentication back to this location at the end of a request?
    Your answer:

    See book excerpt, page 382, for answer

  8. What important interface represents a configuration setting that applies to a secure object invocation?
    Your answer:

    See book excerpt, page 383, for answer

  9. To authorize a secure object invocation, Acegi Securit needs to intercept the invocation to begin with. True or False?
    Your answer:

    See book excerpt, page 385, for answer

  10. What does Acegi Security provide to retrieve ACL information?
    Your answer:

    See book excerpt, page 386, for answer




    How'd you do?
    Send us your results for a chance to win a copy of the book Professional Java Development with the Spring Framework written by Rod Johnson, Juergen Hoeller, Alef Arendsen, Thomas Risberg and Colin Sampaleanu and published by John Wiley & Sons.





This was last published in May 2006

Dig Deeper on Software Security Test Best Practices

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchMicroservices

TheServerSide

SearchCloudApplications

SearchAWS

SearchBusinessAnalytics

SearchFinancialApplications

SearchHealthIT

Close