What is an advantage of the original two-tier solution?
What do you use to connect to the database?
What is the best description of a JCA solution?
What should you tell your client?
Which statement about invoking the MDB is true?
Which message-style statement is correct?
Which technology do you use for this solution?
Which two are appropriate for mitigating this threat?
Which two flaws should you protect against for this specific threat?
Which is an appropriate technique for minimizing the consequences of a successful attack?