Q.1

An intrusion detection system does not perform which of the following?

  • Tries to identify attempts to hack into a computer system.
  • May monitor packets passing over the network.
  • May transmit message packets to the correct destination.
  • Set up deception systems that attempt to trap hackers.
Q.2

Websites without a database attached to them have which of the following characteristics?

  • The ability to generate data via SQL.
  • The inability to use a browser to display Web pages.
  • Static information using HTML or JavaScript.
  • The need to use TCP/IP as the network protocol.
Q.3

Which of the following is true about ColdFusion Markup Language (CFML)?

  • It is stored in .asp files.
  • It is executed on the client.
  • It does not use tags.
  • It allows for coding of custom tags in an HTML file.
Q.4

Features of XML include which of the following?

  • The tags are used to describe the appearance of the content.
  • Addresses the structuring and manipulation of the data involved.
  • Governs the display of information in a Web browser.
  • All of the above.
Q.5

Web servers should be configured in which of the following ways?

  • unauthorized access is restricted.
  • unauthorized access is unrestricted.
  • unauthorized access is impossible.
  • unauthorized access is possible.
Q.6

A proxy server is used for which of the following?

  • To provide security against unauthorized users
  • To process client requests for Web pages
  • To process client requests for database access
  • To provide TCP/IP
Q.7

XML is which of the following?

  • A scripting language that states the rules for tagging elements.
  • A programming language that states the rules for tagging elements.
  • A programming language that allows the creation of customized tags.
  • A scripting language that allows the creation of customized tags.
Q.8

What is Hypertext Transfer Protocol (HTTP)?

  • The protocol to copy files between computers
  • The transfer protocol to transfer Web pages to a browser
  • The database access protocol for SQL statements
  • The hardware/software protocol that limits access to company data
Q.9

Which of the following is true concerning Web services standards?

  • Led by only one group.
  • Helped by cooperation between companies.
  • Not necessary at this time.
  • Important so that the web can flourish.
Q.10

Which of the following is true concerning the standard network protocol for connecting a client to a Web or database server via the Internet?

  • Both TCP and IP are needed.
  • TCP is needed but IP is not needed.
  • TCP is not needed but IP is needed.
  • Neither TCP and IP are needed.
Q.11

An intranet provides which of the following?

  • Connectivity to all customers
  • Connectivity to selected customers
  • Connectivity to no customers
  • Connectivity to all of the above
Q.12

Client-side extensions:

  • add functionality to the server.
  • add functionality to the browser.
  • add functionality to the firewall.
  • add functionality to the network.
Q.13

Common Gateway Interface (CGI) is which of the following?

  • An interface that accepts and returns data that may be written in SQL.
  • An interface that accepts and returns data that may be written in any language that produces an executable file.
  • A small program that executes within another application and is stored on the server.
  • A small program that executes within another application and is stored on the client.
0 h : 0 m : 1 s