Which strategy is correct for configuring Spring Security to intercept particular URLs? (Choose the best answer.)
In which three ways are Security filters used in Spring Security? (Choose three.)
Refer to the exhibit.The above code shows a conditional @Bean method for the creation of a JdbcTemplate bean.Which two statements correctly describe the code behavior? (Choose two.)
What is a Spring Boot starter dependency? (Choose the best answer.)
Which two are required to use transactions in Spring? (Choose two.)
If a class is annotated with @Component, what should be done to have Spring automatically detect the annotated class and load it as a bean? (Choose the best answer.)