All sets combined
Which of the following is NOT a server-side web language? Select one: a. PHP b. Perl c. HTML d. ASP
HTML
CMS stands for which of the following? Select one: a. CSS Management Systems b. Content Management Systems c. CSS Markup Systems d. Content Markup Systems
Content Management Systems
The dbutils utility setup at the College does what (chose best answer)? Select one: a. Log into MySQL and run SQL commands b. All of the above c. Create your MySQL username, password, and database d. Backup your database
Create your MySQL username, password, and database
A ____________________ attack is one in which a malicious user embeds scripting commands in data/content that will be displayed to visitors of the web site, and thus executed in the visitor's web browser when they browser your web site. It can allow attacker to steal sensitive information or install malware on victim's computer. Select one: a. DoS b. blue fi attack c. Cross-site scripting (XSS) d. Win attack e. SQL Injection
Cross-site scripting (XSS)
What is the name of the PHP functionality / code that uses the period (.) symbol to join two (or more) things together? For example, echo a string and a date function on one line. Choose best answer. Select one: a. join b. nest c. concatenation d. append e. merge
concatenation
The Internet is an example of circuit switching technology. Select one: True False
False
Visitors to a web site/page are typically able to view the server-side code to the web page. Select one: True False
False
Zero Day Attacks are one's involving known exploits. Select one: True False
False
RWD stands for which of the following? (chose best answer) Select one: a. Responsive Web Design b. Responsible Web Design c. Reactive Web Design d. Retina Web Design
Responsive Web Design
Which of the following is the standard SQL command used to query, or retrieve, data from a relational database table? (choose best answer) a. SELECT b. FIND c. SEARCH d. QUERY
SELECT
Is Windows 2016 most likely a client or server software? Select one: a. Client b. Server
Server
Is the web software Apache typically a client or server software? Select one: a. Client b. Server
Server
Which computer in the client/server model is most likely the "listerner" that awaits requests and fullfils them? Select one: a. Server b. Client
Server
What output will be produced when this program runs on the server? $total = 99; if ($total >= 70) echo "<p>Your grade is passing</p>"; else ($total > 70) echo "<p>Your grade is not passing</p>";
The program will cause a syntax error.
CSS is typically rendered client-side. Select one: True False
True
Phishing is a form of social engineering Select one: True False
True
Is HTML most commonly a client or server interpreted language? Select one: a. Server b. Client
Client
Is a tablet computer, such as an iPad, most likely a client computer or a server computer? Select one: a. Server b. Client
Client
Which computer in the client/server model most likely is the one making the requests for data/information/resources and is also sometimes refered to the front-end? Select one: a. Client b. Server
Client
Windows 8 is an example of which type of operating system? Select one: a. Client b. Server
Client
In the CIA Triad, the "C" stands for which of the following? a. Corporate b. Computer c. Confidentiality d. Compromise e. Customer
Confidentiality
What permissions did we set our files to on the cislinux server to ensure they were the least permissions that would work and allow others to browse our web pages? Select one: a. 704 b. 601 c. 700 d. 604
604
How many lines of output on a web page will this PHP code produce? for ($x = 1; $x < 8; $x++){echo "<p>$x</p>";} Select one: a. 1 b. 9 c. 8 d. 6 e. 7
7
What port number does the HTTP protocol typically communication through? Select one: a. 100 b. 20 c. 1 d. 80
80
What character is used to create a variable (placed before variable name) in PHP? Select one: a. @ b. # c. $ d. & e. !
$
Which of the following is NOT a valid variable name in PHP? a. $name5 b. $2tommorrow c. $firstName d. $First_Name
$2tommorrow
Which line of PHP code below correctly creates a variable that stores a string (and without a syntax error/mistake)? (chose best answer) a. name = "Stacey" b. $name = "Stacey"; c. name = Stacey; d. $name = "Stacey"
$name = "Stacey";
What output will this program produce when run on the server? for ($x = 1; $x < 3; $x++) echo "<p>$x</p>"; echo "<p>Next</p>";
1 2 Next
What output will this program produce when it runs? $value = 15.1234598; echo "<p>" . number_format($value,3) . "</p>";
15.123
In the CIA Triad, the "I" stands for which of the following? a. Internet b. Interruption c. Intent d. Information e. Integrity
Integrity
What output will this program produce when it runs on the server? for ($x = 1; $x > 0; $x++) { print "<p>$x</p>"; }
It will cause an endless loop to run: 1, 2, 3, etc
The "s" at the end of the https ensures which of the following? Select one: a. improves the speed of data transfer b. data transferred is encrypted (scrambled) so no one can read it during transit c. data transferred in public (open to view) to anyone d. the software being used if free and not copyrighted
data transferred is encrypted (scrambled) so no one can read it during transit
Which of the following PHP lines is valid? Select one: a. echo "<p>Hello /"John/"</p>"; b. echo "<p>Hello "John"</p>"; c. echo "<p>Hello \"John\"</p>"; d. echo "<p>Hello \"John\"</p>"
echo "<p>Hello \"John\"</p>";
If the address bar in a web browser contains the following, is the web page most likely stored and being viewed on a client computer or server computer? (chose best answer) https://cislinux.hfcc.edu/~username/clientserver.html Select one: a. server computer b. client computer
server computer
A database table does which of the following (choose best answer)? Select one: a. Stores data b. A programming language to access the database c. Formats user input d. A formatting language for the database output
stores data
Assume that an HTML text input field named "CustomerName" is being passed into a PHP using the GET method and the following was typed into the field: John Smith Given the following two lines of PHP code, what would be the output to the web page? $CustomerName= substr(filter_input(INPUT_GET, 'CustomerName', FILTER_SANITIZE_STRING),0,5); echo $CustomerName; Select one: a. Smith b. John S c. John Smith d. John
John
What is the name of the malicious software or device that records keys typed in users on their computer that can be used to steal usernames and password? Select one: a. keyboard recorder b. stealth logger c. Botnet tracker d. keystroke logger e. key recorder
keystroke logger
What do you place next to a field (i.e. attribute) when creating a table to indicate that the field cannot be left blank (empty) when storing a record in the table (chose best answer)? Select one: a. auto_increment b.X require c. not null d. not zero e.X not empty
not null
In a __________________________, attacker(s) attempt to make a server or network unavailable to its intended users by "flooding" it with information (chose best answer) Select one: a. Flame b. DoS c. SQL Injection d. SpamX e. Phishing
A Denial-of-Service (DoS)
Java is short for JavaScript, i.e. they are the same programming language. Select one: True False
False
Variable names in PHP are case-sensitive. Select one: True False
True
You can store the database login credentials (e.g. username, password, database name) in a separate file and folder than web page being run/executed to increase security protections. Select one: True False
True
Your database name (dbname) in your College database account is the same your College username. Select one: True False
True
What is the name of the web-based database administration tool we can use on campus and that is very common at hosting companies (chose best answer)? It allows you to use a web page/site to log into the database and perform database administration tasks like creating a table, modifying a table, backing up the database, running SQL commands, etc. Select one: a. AdminTools b. Myadmin c. dbadmin d. phpMyAdmin
phpMyAdmin
What is the name of the free, open-source relational database that was created as an alternative to MySQL when MySQL was purchased by Oracle Corporation? a. FutureSQL b. NewSQL c. MariaDB d. NextGenSQL
MariaDB
What output will this program produce when run on the server? for ($x = 1; $x > 2; $x++) echo "<p>$x</p>";
No output will display.
If the address bar in a web browser contains the following, is the web page most likely stored and being viewed on a client computer or server computer? (chose best answer) h:\cis122\clientserver.html Select one: a. client computer b. server computer
client computer
Google Chrome, Microsoft Edge, Opera and Firefox are all best described as client-side or server-side software? Select one: a. server-side b. client-side
client-side
Which of the following statements about PHP is NOT TRUE? a. PHP is a programming language. b. PHP is a client-side language c. PHP was created by Rasmus Lerdorf d. PHP is listed in the top 10 of the TIOBE Programming Index (most common languages)
PHP is a client-side language
Which of the following is a form of "legal hacking" or an occupation to find security vulnerabilities for others? (chose best answer) a. Ransomware test b. Malware coder c. Penetration tester d. Phishing coder
Penetration tester
_____________________ is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Select one: a. SQL Injection b. DoS c. Spam d. Flame e. DDoS f. Phishing
Phishing
An order_id field in an order table is most likely also which of the following (chose best answer)? Select one: a. Substitute Key b. Primary Key c. Foreign Key d. Field Key e. Object Key
Primary Key
What output will this PHP program produce when run the server? $total = 99; if ($total >= 90) echo "<p>Your grade is an A</p>";
Your grade is an A
Which list contains only database software/engines? Select one: a. Oracle, Excel, Access b. MySQL, Word, PHP c. Oracle, MySQL, Access d. MySQL, Access, Excel
Oracle, MySQL, Access
Which of the following is NOT an advantage of a Content Management System? Select one: a. They create easily changeable, dynamic database-backed web sites b. They often have many professional-looking templates to choose from c. They have have many plug-ins (modules) available to expand their features/uses d. All of these are advantages of Content Management Systems
All of these are advantages of Content Management Systems
Which of the following is NOT a tip for good computer security and personal privacy (chose best answer)? Select one: a. Use two-factor authentication b. Browse reputable web sites c. All of these are good tips d. Ensure all software, firmware, and operating systems are up-to-date and have all the latest patches e. Shred documents with sensitive data and information on them f. Use antivirus, anti-malware and firewall software g. Don't open attachments from unknown source h. Use different passwords for different web sites
All of these are good tips
Ransomware typically involves which of the following? (chose best answer) Select one: a. Poor Human Resource (HR) policies b. A Denial of Service attack c. An attack where the victims computer is encrypted d. Flaming e. A botnet attack
An attack where the victims computer is encrypted
Which of the following is NOT a tip in being safe on social media/social networking? Select one: a. Avoid two factor authentication b. Use caution when you click links c. Assume that everything you put on a social networking site is permanent d. Become familiar with the privacy policies e. Be careful about what you share
Avoid two factor authentication
__________ is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things devices that are infected and controlled by a common type of malware. They are often used to send spam or viruses to other computers or carry our a denial of service attack. Select one: a. Botnet b. NetDoS c. NetSpy d. AttackWare
Botnet
Which of the following is a SQL language command? Select one: a. RUN TABLE b. CREATE PHP c. CREATE TABLE d. CREATE FIELD
CREATE TABLE
Which of the following statements is True? Select one: a. Curly braces are never used in an IF ELSEIF ELSE b. Curly braces are needed when there is ONE statement under an IF ELSEIF or ELSE c. Curly braces are needed when there are MANY statement under an IF ELSEIF or ELSE d. Curly braces are always needed to enclose statements under an IF ELSEIF or ELSE
Curly braces are needed when there are MANY statement under an IF ELSEIF or ELSE
What is the name of the server/protocol that translates domain names into IP address? Select one: a. DNS b. DHCP c. SMTP d. FTP
DNS
_________________________ is the security/information assurance technique in which multiple layers of security controls are built into the system to provide redundancy and greater security protection. Select one: a. Defense in Depth b. Multi-Pronged Defense c. Multi-Vectored Defense d. Concurrent Controls
Defense in Depth
In which phase of the web development process would a wireframe be developed? Select one: a. Design b. Analysis and planning c. Testing d. Production
Design
Web site usage logs and errors logs are reviewed as a part of which SDLC phase? (choose best answer) Select one: a. Evaluation and maintenance b. Design c. Launch d. Planning
Evaluation and maintenance
Which of the following is a PHP command/parameter that we used to help provide user input filtering and security? Select one: a. FILTER_SANITIZE_STRING b. INPUT_STRING c. CHECK_STRING d. VALID_STRING
FILTER_SANITIZE_STRING
On most computers (at your home or in our college computer labs), you can run/view a .php web page without uploading it to the server. Select one: True False
False
You can view file extensions by default in modern versions of Microsoft Windows. Select one: a. True - they are turned on by default/automatically b. False - they have to be turned on manually
False - they have to be turned on manually
__________________________ is software or hardware designed to monitor incoming and outgoing network traffic, block unauthorized access to a computer, and permit outward communication. It is an important part of computer security. Select one: a. Firewall b. Flame c. Wi-Fi d. DDoS e. Spam
Firewall
What network protocol is used to communicate between the web client and web server to transfer web pages? (choose best answer) Select one: a. TLD b. PING c. SMTP d. HTTP
HTTP
Which of the following is the standard SQL command used to add a record/data to a relational database table? (choose best answer) a. ADD b. PUT c. INSERT INTO d. LOAD
INSERT INTO
The two most notable versions of IP in use today are: Select one: a. IP Standard and IP Elite b. IPv6 and IPv7 c. IPv1 and IPv2 d. IPv4 and IPv6
IPv4 and IPv6
IP is one reason hacking occurs. IP stands for which of the following? (chose best answer from presentation; not in this case related to Internet Protocol) a. Internet Privacy b. Internet Protection c. Intellectual Property d. Internet Property
Intellectual property
________________ attacks are a common type of cybersecurity attack that allows attackers to eavesdrop on the communication between two targets. The attack takes place in between two legitimately communicating hosts, allowing the attacker to "listen" to a conversation they should normally not be able to listen to. "Sniffing" is one example/method of this type of attack. Select one: a. Pharming b. Man-in-the-middle c. Botnets d. DDoS
Man-in-the-middle
Generally speaking, in most cases, Windows is not case-sensitive, but Linux is. Select one: True False
True
On most computers (at your home or in our college computer labs), you can run/view a .html web page without uploading it to the server. Select one: True False
True
PHP is free to download and install on your own computer if you want. Select one: True False
True
The term "hacker" originally did not have a negative/malicious meaning. Select one: True False
True
The varchar data type is similar to a string data type in many programming languages. Select one: True False
True
In the field of web design and development, the practice of ensuring a web site has good navigation, information is presented in a clear, organized and concise way, and the visitor's experience is a positive one, is commonly referred to as which of the following? Select one: a. Wireframing b. Usability c. Marketing d. Maintenance
Usability
Which of the following is NOT an example of GOOD netiquette? (chose best answer) Select one: a. Spellcheck emails before sending b.X Do not flame c. Use To or CC if you are emailing numerous individuals who do not known each other d. Respect other people's privacy e. Avoid sarcasmX
Use To or CC if you are emailing numerous individuals who do not known each other
Which of the following is NOT a GOOD password rule? Select one: a. Use a word from the dictionary for the password b. Take a sentence and turn it into a long password c. Make the password 10 or more characters d. Use upper and lower case characters e. Use different password on different web sites/systems f. Include a special character
Use a word from the dictionary for the password
Parallax, mobile first, RWD and one-page are all examples of which of the following? Select one: a. Web site design techniques b. Web site analytics software c. Web site programming software packages d. Web site testing methodologies
Web site design techniques
WEP, WPA, and WPA2 are all examples of _________________________. a. VPN vendors b. Ransomware tactics c. Unsecure software bugs d. Wireless encryption standards e. Botnet examples
Wireless encryption standards
Which of the following is NOT a way you can identify a web site/page is secure, i.e. is transferring data encrypted? Select one: a. Web address (URL) begins with HTTPS b. You must log into the web site c. Closed padlock in browser
You must log into the web site
Which of the following statements is the most accurate? Select one: a. You will upload your files to the cislinux server with the FileZilla FTP software so they can be viewed by Web site visitors b. The cislinux software allows you to upload files to the FileZilla server so they can be viewed by visitors c. You will upload your files to FileZilla so they can be viewed by Web site visitors d. The FileZilla server software is used in the computer lab to upload files to the cislinux server
You will upload your files to the cislinux server with the FileZilla FTP software so they can be viewed by Web site visitors
What will this PHP code produce as output when run on the server? $total = 99; if ($total > 60) echo "<p>Your grade is a D</p>";
Your grade is a D
On a web server, which of the following server software would need to be kept up-to-date with the latest updates, patches, and new versions? Select one: a. the operating system, e.g. Windows Server, Linux, etc. b. the web server, e.g. Apache, IIS, etc. c. the database, e.g. MySQL, etc. d. the Content Management Systems, e.g. WordPress, Drupal, etc. e. the PHP interpreter f. the email server g. any shopping cart software present h. all of the above
all of the above
Which of the following can be encrypted? Select one: a. database fields b. web pages c. all of these d. USB drives e. email f. hard drive g. files
all of these
What is the name of the MySQL database field attribute that will cause the data stored in the table field to automatically populate with a sequential number? Select one: a. add_num b. auto_num c. counter d. auto_increment
auto_increment
A password attack where all possible combinations are tried, is called a __________________________. a. Infinity attack b. universal attack c. brute force attack d. X attack
brute force attack
In the following URL/web address, what is the name of the sub-domain name (or host name)? https://cislinux.hfcc.edu/~dasmith1234/cis122/clientserver.html Select one: a. cislinux b. edu c. hfcc d. https e. hfcc.edu
cislinux
Which of the following would be the most likely example of a table field name (chose best answer)? Select one: a.X orders b. varchar(40) c.X customers d. first_name
first_name
Which of the following statements is True? Select one: a. if you want to validate a PHP at the W3C, you can provide the web server address or upload the file b. You cannot validate at PHP file on the W3C web site c. if you want to validate a PHP at the W3C, you must do so by providing the web server address d. if you want to validate a PHP at the W3C, you can provide the web server address or upload the file, or copy the code into the text box on the W3C web site
if you want to validate a PHP at the W3C, you must do so by providing the web server address
Which of the following HTML image tags looks for the image in a sub-folder to the current location? (chose best answer) Select one: a. images/logo.jpg b. ../images/logo.jog c. logo.jpg/sub/ d. /images/logo.jpg
images/logo.jpg
Which of the following is an example of a field data type (chose best answer)? Select one: a. record b. integer c. customers d. customer_id
integer
What network utility is usually the first choice to use to look, release, or renew the IP address on the computer a user is currently on? Select one: a. ping b. config c. ipset d. ipconfig
ipconfig
What network utility is used to determine/test if a web site or other host is available (reachable/working) on the network? (choose best answer) Select one: a. ping b. cmd c. ftp d. telnet
ping
Every (each individual) student in a College students table would be considered which of the following (choose best answer)? Select one: a. record b. data type c. field d. table
record
Most lines/commands in PHP end (terminate) with which of the following characters? Select one: a. period b. colon c. comma d. semi-colon
semi-colon