11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

2V0-72.22 Exam Dumps - Professional Develop VMware Spring

Question # 4

Which two statements are true regarding storing user details in Spring Security? (Choose two.)

A.

With a custom UserDetailsService defined in the ApplicationContext, Spring Boot still creates the default user.

B.

Passwords must be hashed and the default hashing algorithm is MD5.

C.

User details can be stored in custom storage and retrieve them by implementing the

UserDetailsService interface.

D.

User details can be stored in a database, in LDAP, or in-memory.

E.

The user details includes username and password but not authorities.

Full Access
Question # 5

Refer to the exhibit.

How can a response status code be set for No Content (204)? (Choose the best answer.)

A.

Annotate the update() handler method with @PutMapping(“/store/orders/{id”}”, HttpStatus.NO_CONTENT).

B.

Annotate the update() handler method with @ResponseStatus(HttpStatus.NO_CONTENT).

C.

Annotate the update() handler method with @ResponseEntity(204).

D.

The update() handler method cannot return a void type, it must return a ResponseEntity type.

Full Access
Question # 6

Which two statements are true concerning the BeanPostProcessor Extension point? (Choose two.)

A.

BeanPostProcessors are called before the dependencies have been injected.

B.

Custom BeanPostProcessors can be implemented for Spring applications.

C.

BeanPostProcessors are called before the BeanFactoryPostProcessors.

D.

BeanPostProcessors are called during the initialization phase of a bean life cycle.

E.

BeanPostProcessors cannot be ordered in a Spring Boot application.

Full Access
Question # 7

Which strategy is correct for configuring Spring Security to intercept particular URLs? (Choose the best answer.)

A.

The URLs can be specified via configuration (using authorizeRequests () and request matchers), with the most specific rule first and the least specific last.

B.

Spring Security can obtain URLs from Spring MVC controllers, the Spring Security configuration just needs a reference to the controller to be protected.

C.

The URLs are specified in a special properties file, used by Spring Security.

D.

The URLs can be specified via configuration (using authorizeRequests () and request matchers), with the least specific rule first and the most specific last.

Full Access
Question # 8

Which two statements are correct regarding the Actuator info endpoint? (Choose two.)

A.

It provides configuration options through which only an authenticated user can display application information.

B.

It is not enabled by default.

C.

It can be used to display arbitrary application information.

D.

It can be used to change a property value on a running application.

E.

Typically it is used to display build or source control information.

Full Access
Question # 9

Which option is true about use of mocks in a Spring Boot web slice test? (Choose the best answer.)

A.

Mocking a Spring Bean requires annotating it with @MockBean annotation.

B.

If a Spring Bean already exists in the web slice test spring context, it cannot be mocked.

C.

Mocks cannot be used in a Spring Boot web slice test.

D.

Mocking a Spring Bean requires annotating it with @Mock annotation.

Full Access