Which of the following is true for proxy pattern?
(a) Has exactly the same interface as the real object
(b) Handles routine or illegitimate messages without accessing the real object
(c) Delegates messages that it cannot handle to the real object
(d) All of the mentioned
This question was addressed to me in an online interview.
This is a very interesting question from The Adapter Patterns and Proxy Pattern in section Visibility, Accessibility and Information Hiding of Software Architecture