To secure a servlet, developers often use _________ combined with _________ to restrict access.
- authentication, authorization
- encryption, decryption
- firewalls, intrusion detection
- session management, cryptography
Developers often use authentication combined with authorization to secure a servlet. Authentication verifies the user's identity, while authorization determines the user's access rights.
Loading...
Related Quiz
- How do filters interact with different types of servlets and JSP pages?
- In Java, which keyword is used to manually suggest the garbage collector?
- How do you specify the URL patterns to which a filter should apply?
- How do you differentiate between checked and unchecked SQL exceptions?
- Which HTTP header can be used to mitigate some types of XSS attacks?