search
HomeJavaJavaInterview questions2020 New Java Interview Questions - Network (2)

2020 New Java Interview Questions - Network (2)

Jun 20, 2020 pm 05:32 PM
javanetworkInterview questions

2020 New Java Interview Questions - Network (2)

#1. What are the seven-layer models of OSI?

Application layer: An interface between network services and end users.

(Recommended tutorial: java interview questions)

Presentation layer: data representation, security, and compression.

Session layer: establish, manage, and terminate sessions.

Transport layer: Define the protocol port number for transmitting data, as well as flow control and error checking.

Network layer: Perform logical address addressing to realize path selection between different networks.

Data link layer: Establish logical connections, perform hardware address addressing, error checking and other functions.

Physical layer: establishing, maintaining, and disconnecting physical connections.

2. What are the differences between get and post requests?

GET is harmless when the browser rolls back, while POST will submit the request again.

The URL address generated by GET can be Bookmarked, but POST cannot.

GET requests will be actively cached by the browser, but POST will not unless manually set.

GET requests can only be URL encoded, while POST supports multiple encoding methods.

GET request parameters will be completely retained in the browser history, while parameters in POST will not be retained.

There is a length limit on the parameters transmitted in the URL for the GET request, but there is no length limit for POST.

Regarding the data type of parameters, GET only accepts ASCII characters, while POST has no restrictions.

GET is less secure than POST because the parameters are directly exposed on the URL, so it cannot be used to pass sensitive information.

GET parameters are passed through the URL, and POST is placed in the Request body.

3. How to achieve cross-domain?

Method 1: Image ping or script tag cross-domain

Method 2: JSONP cross-domain

Method 3: CORS

Method 4: window.name iframe

Method 5: window.postMessage()

Method 6: Modify document.domain across subdomains

Method 7: WebSocket

Method 8: Proxy

4. Tell me about the JSONP implementation principle?

jsonp is json padding, which dynamically creates script tags. Using the src attribute of the script tag, you can obtain js scripts in any domain. Through this feature (it can also be said to be a loophole), the server no longer returns json. format, but returns a piece of js code that calls a certain function, and calls it in src, thus achieving cross-domain.

The above is the detailed content of 2020 New Java Interview Questions - Network (2). For more information, please follow other related articles on the PHP Chinese website!

Statement
This article is reproduced at:csdn. If there is any infringement, please contact admin@php.cn delete

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Safe Exam Browser

Safe Exam Browser

Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.

ZendStudio 13.5.1 Mac

ZendStudio 13.5.1 Mac

Powerful PHP integrated development environment

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software