All sets combined

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

On most computers (at your home or in our college computer labs), you can run/view a .php web page without uploading it to the server. Select one: True False

False

You can view file extensions by default in modern versions of Microsoft Windows. Select one: a. True - they are turned on by default/automatically b. False - they have to be turned on manually

False - they have to be turned on manually

__________________________ is software or hardware designed to monitor incoming and outgoing network traffic, block unauthorized access to a computer, and permit outward communication. It is an important part of computer security. Select one: a. Firewall b. Flame c. Wi-Fi d. DDoS e. Spam

Firewall

Which of the following is NOT a server-side web language? Select one: a. PHP b. Perl c. HTML d. ASP

HTML

What network protocol is used to communicate between the web client and web server to transfer web pages? (choose best answer) Select one: a. TLD b. PING c. SMTP d. HTTP

HTTP

Which of the following is the standard SQL command used to add a record/data to a relational database table? (choose best answer) a. ADD b. PUT c. INSERT INTO d. LOAD

INSERT INTO

The two most notable versions of IP in use today are: Select one: a. IP Standard and IP Elite b. IPv6 and IPv7 c. IPv1 and IPv2 d. IPv4 and IPv6

IPv4 and IPv6

IP is one reason hacking occurs. IP stands for which of the following? (chose best answer from presentation; not in this case related to Internet Protocol) a. Internet Privacy b. Internet Protection c. Intellectual Property d. Internet Property

Intellectual property

CMS stands for which of the following? Select one: a. CSS Management Systems b. Content Management Systems c. CSS Markup Systems d. Content Markup Systems

Content Management Systems

The dbutils utility setup at the College does what (chose best answer)? Select one: a. Log into MySQL and run SQL commands b. All of the above c. Create your MySQL username, password, and database d. Backup your database

Create your MySQL username, password, and database

A ____________________ attack is one in which a malicious user embeds scripting commands in data/content that will be displayed to visitors of the web site, and thus executed in the visitor's web browser when they browser your web site. It can allow attacker to steal sensitive information or install malware on victim's computer. Select one: a. DoS b. blue fi attack c. Cross-site scripting (XSS) d. Win attack e. SQL Injection

Cross-site scripting (XSS)

What is the name of the PHP functionality / code that uses the period (.) symbol to join two (or more) things together? For example, echo a string and a date function on one line. Choose best answer. Select one: a. join b. nest c. concatenation d. append e. merge

concatenation

The Internet is an example of circuit switching technology. Select one: True False

False

Visitors to a web site/page are typically able to view the server-side code to the web page. Select one: True False

False

Zero Day Attacks are one's involving known exploits. Select one: True False

False

RWD stands for which of the following? (chose best answer) Select one: a. Responsive Web Design b. Responsible Web Design c. Reactive Web Design d. Retina Web Design

Responsive Web Design

Which of the following is the standard SQL command used to query, or retrieve, data from a relational database table? (choose best answer) a. SELECT b. FIND c. SEARCH d. QUERY

SELECT

Is Windows 2016 most likely a client or server software? Select one: a. Client b. Server

Server

Is the web software Apache typically a client or server software? Select one: a. Client b. Server

Server

Which computer in the client/server model is most likely the "listerner" that awaits requests and fullfils them? Select one: a. Server b. Client

Server

What output will be produced when this program runs on the server? $total = 99; if ($total >= 70) echo "<p>Your grade is passing</p>"; else ($total > 70) echo "<p>Your grade is not passing</p>";

The program will cause a syntax error.

CSS is typically rendered client-side. Select one: True False

True

Phishing is a form of social engineering Select one: True False

True

Is HTML most commonly a client or server interpreted language? Select one: a. Server b. Client

Client

Is a tablet computer, such as an iPad, most likely a client computer or a server computer? Select one: a. Server b. Client

Client

Which computer in the client/server model most likely is the one making the requests for data/information/resources and is also sometimes refered to the front-end? Select one: a. Client b. Server

Client

Windows 8 is an example of which type of operating system? Select one: a. Client b. Server

Client

In the CIA Triad, the "C" stands for which of the following? a. Corporate b. Computer c. Confidentiality d. Compromise e. Customer

Confidentiality

What permissions did we set our files to on the cislinux server to ensure they were the least permissions that would work and allow others to browse our web pages? Select one: a. 704 b. 601 c. 700 d. 604

604

How many lines of output on a web page will this PHP code produce? for ($x = 1; $x < 8; $x++){echo "<p>$x</p>";} Select one: a. 1 b. 9 c. 8 d. 6 e. 7

7

What port number does the HTTP protocol typically communication through? Select one: a. 100 b. 20 c. 1 d. 80

80

What character is used to create a variable (placed before variable name) in PHP? Select one: a. @ b. # c. $ d. & e. !

$

Which of the following is NOT a valid variable name in PHP? a. $name5 b. $2tommorrow c. $firstName d. $First_Name

$2tommorrow

Which line of PHP code below correctly creates a variable that stores a string (and without a syntax error/mistake)? (chose best answer) a. name = "Stacey" b. $name = "Stacey"; c. name = Stacey; d. $name = "Stacey"

$name = "Stacey";

What output will this program produce when run on the server? for ($x = 1; $x < 3; $x++) echo "<p>$x</p>"; echo "<p>Next</p>";

1 2 Next

What output will this program produce when it runs? $value = 15.1234598; echo "<p>" . number_format($value,3) . "</p>";

15.123

In the CIA Triad, the "I" stands for which of the following? a. Internet b. Interruption c. Intent d. Information e. Integrity

Integrity

What output will this program produce when it runs on the server? for ($x = 1; $x > 0; $x++) { print "<p>$x</p>"; }

It will cause an endless loop to run: 1, 2, 3, etc

The "s" at the end of the https ensures which of the following? Select one: a. improves the speed of data transfer b. data transferred is encrypted (scrambled) so no one can read it during transit c. data transferred in public (open to view) to anyone d. the software being used if free and not copyrighted

data transferred is encrypted (scrambled) so no one can read it during transit

Which of the following PHP lines is valid? Select one: a. echo "<p>Hello /"John/"</p>"; b. echo "<p>Hello "John"</p>"; c. echo "<p>Hello \"John\"</p>"; d. echo "<p>Hello \"John\"</p>"

echo "<p>Hello \"John\"</p>";

If the address bar in a web browser contains the following, is the web page most likely stored and being viewed on a client computer or server computer? (chose best answer) https://cislinux.hfcc.edu/~username/clientserver.html Select one: a. server computer b. client computer

server computer

A database table does which of the following (choose best answer)? Select one: a. Stores data b. A programming language to access the database c. Formats user input d. A formatting language for the database output

stores data

Assume that an HTML text input field named "CustomerName" is being passed into a PHP using the GET method and the following was typed into the field: John Smith Given the following two lines of PHP code, what would be the output to the web page? $CustomerName= substr(filter_input(INPUT_GET, 'CustomerName', FILTER_SANITIZE_STRING),0,5); echo $CustomerName; Select one: a. Smith b. John S c. John Smith d. John

John

What is the name of the malicious software or device that records keys typed in users on their computer that can be used to steal usernames and password? Select one: a. keyboard recorder b. stealth logger c. Botnet tracker d. keystroke logger e. key recorder

keystroke logger

What do you place next to a field (i.e. attribute) when creating a table to indicate that the field cannot be left blank (empty) when storing a record in the table (chose best answer)? Select one: a. auto_increment b.X require c. not null d. not zero e.X not empty

not null

In a __________________________, attacker(s) attempt to make a server or network unavailable to its intended users by "flooding" it with information (chose best answer) Select one: a. Flame b. DoS c. SQL Injection d. SpamX e. Phishing

A Denial-of-Service (DoS)

Java is short for JavaScript, i.e. they are the same programming language. Select one: True False

False

Which of the following is a SQL language command? Select one: a. RUN TABLE b. CREATE PHP c. CREATE TABLE d. CREATE FIELD

CREATE TABLE

Generally speaking, in most cases, Windows is not case-sensitive, but Linux is. Select one: True False

True

On most computers (at your home or in our college computer labs), you can run/view a .html web page without uploading it to the server. Select one: True False

True

PHP is free to download and install on your own computer if you want. Select one: True False

True

The term "hacker" originally did not have a negative/malicious meaning. Select one: True False

True

The varchar data type is similar to a string data type in many programming languages. Select one: True False

True

Variable names in PHP are case-sensitive. Select one: True False

True

You can store the database login credentials (e.g. username, password, database name) in a separate file and folder than web page being run/executed to increase security protections. Select one: True False

True

Your database name (dbname) in your College database account is the same your College username. Select one: True False

True

What is the name of the web-based database administration tool we can use on campus and that is very common at hosting companies (chose best answer)? It allows you to use a web page/site to log into the database and perform database administration tasks like creating a table, modifying a table, backing up the database, running SQL commands, etc. Select one: a. AdminTools b. Myadmin c. dbadmin d. phpMyAdmin

phpMyAdmin

What network utility is used to determine/test if a web site or other host is available (reachable/working) on the network? (choose best answer) Select one: a. ping b. cmd c. ftp d. telnet

ping

Every (each individual) student in a College students table would be considered which of the following (choose best answer)? Select one: a. record b. data type c. field d. table

record

Which of the following is NOT an advantage of a Content Management System? Select one: a. They create easily changeable, dynamic database-backed web sites b. They often have many professional-looking templates to choose from c. They have have many plug-ins (modules) available to expand their features/uses d. All of these are advantages of Content Management Systems

All of these are advantages of Content Management Systems

Which of the following is NOT a tip for good computer security and personal privacy (chose best answer)? Select one: a. Use two-factor authentication b. Browse reputable web sites c. All of these are good tips d. Ensure all software, firmware, and operating systems are up-to-date and have all the latest patches e. Shred documents with sensitive data and information on them f. Use antivirus, anti-malware and firewall software g. Don't open attachments from unknown source h. Use different passwords for different web sites

All of these are good tips

Ransomware typically involves which of the following? (chose best answer) Select one: a. Poor Human Resource (HR) policies b. A Denial of Service attack c. An attack where the victims computer is encrypted d. Flaming e. A botnet attack

An attack where the victims computer is encrypted

Which of the following is NOT a tip in being safe on social media/social networking? Select one: a. Avoid two factor authentication b. Use caution when you click links c. Assume that everything you put on a social networking site is permanent d. Become familiar with the privacy policies e. Be careful about what you share

Avoid two factor authentication

__________ is a collection of internet-connected devices, which may include PCs, servers, mobile devices and internet of things devices that are infected and controlled by a common type of malware. They are often used to send spam or viruses to other computers or carry our a denial of service attack. Select one: a. Botnet b. NetDoS c. NetSpy d. AttackWare

Botnet

Which of the following statements is True? Select one: a. Curly braces are never used in an IF ELSEIF ELSE b. Curly braces are needed when there is ONE statement under an IF ELSEIF or ELSE c. Curly braces are needed when there are MANY statement under an IF ELSEIF or ELSE d. Curly braces are always needed to enclose statements under an IF ELSEIF or ELSE

Curly braces are needed when there are MANY statement under an IF ELSEIF or ELSE

What is the name of the server/protocol that translates domain names into IP address? Select one: a. DNS b. DHCP c. SMTP d. FTP

DNS

_________________________ is the security/information assurance technique in which multiple layers of security controls are built into the system to provide redundancy and greater security protection. Select one: a. Defense in Depth b. Multi-Pronged Defense c. Multi-Vectored Defense d. Concurrent Controls

Defense in Depth

In which phase of the web development process would a wireframe be developed? Select one: a. Design b. Analysis and planning c. Testing d. Production

Design

Web site usage logs and errors logs are reviewed as a part of which SDLC phase? (choose best answer) Select one: a. Evaluation and maintenance b. Design c. Launch d. Planning

Evaluation and maintenance

Which of the following is a PHP command/parameter that we used to help provide user input filtering and security? Select one: a. FILTER_SANITIZE_STRING b. INPUT_STRING c. CHECK_STRING d. VALID_STRING

FILTER_SANITIZE_STRING

________________ attacks are a common type of cybersecurity attack that allows attackers to eavesdrop on the communication between two targets. The attack takes place in between two legitimately communicating hosts, allowing the attacker to "listen" to a conversation they should normally not be able to listen to. "Sniffing" is one example/method of this type of attack. Select one: a. Pharming b. Man-in-the-middle c. Botnets d. DDoS

Man-in-the-middle

What is the name of the free, open-source relational database that was created as an alternative to MySQL when MySQL was purchased by Oracle Corporation? a. FutureSQL b. NewSQL c. MariaDB d. NextGenSQL

MariaDB

What output will this program produce when run on the server? for ($x = 1; $x > 2; $x++) echo "<p>$x</p>";

No output will display.

Which list contains only database software/engines? Select one: a. Oracle, Excel, Access b. MySQL, Word, PHP c. Oracle, MySQL, Access d. MySQL, Access, Excel

Oracle, MySQL, Access

Which of the following statements about PHP is NOT TRUE? a. PHP is a programming language. b. PHP is a client-side language c. PHP was created by Rasmus Lerdorf d. PHP is listed in the top 10 of the TIOBE Programming Index (most common languages)

PHP is a client-side language

Which of the following is a form of "legal hacking" or an occupation to find security vulnerabilities for others? (chose best answer) a. Ransomware test b. Malware coder c. Penetration tester d. Phishing coder

Penetration tester

_____________________ is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Select one: a. SQL Injection b. DoS c. Spam d. Flame e. DDoS f. Phishing

Phishing

An order_id field in an order table is most likely also which of the following (chose best answer)? Select one: a. Substitute Key b. Primary Key c. Foreign Key d. Field Key e. Object Key

Primary Key

In the field of web design and development, the practice of ensuring a web site has good navigation, information is presented in a clear, organized and concise way, and the visitor's experience is a positive one, is commonly referred to as which of the following? Select one: a. Wireframing b. Usability c. Marketing d. Maintenance

Usability

Which of the following is NOT an example of GOOD netiquette? (chose best answer) Select one: a. Spellcheck emails before sending b.X Do not flame c. Use To or CC if you are emailing numerous individuals who do not known each other d. Respect other people's privacy e. Avoid sarcasmX

Use To or CC if you are emailing numerous individuals who do not known each other

Which of the following is NOT a GOOD password rule? Select one: a. Use a word from the dictionary for the password b. Take a sentence and turn it into a long password c. Make the password 10 or more characters d. Use upper and lower case characters e. Use different password on different web sites/systems f. Include a special character

Use a word from the dictionary for the password

Parallax, mobile first, RWD and one-page are all examples of which of the following? Select one: a. Web site design techniques b. Web site analytics software c. Web site programming software packages d. Web site testing methodologies

Web site design techniques

WEP, WPA, and WPA2 are all examples of _________________________. a. VPN vendors b. Ransomware tactics c. Unsecure software bugs d. Wireless encryption standards e. Botnet examples

Wireless encryption standards

Which of the following is NOT a way you can identify a web site/page is secure, i.e. is transferring data encrypted? Select one: a. Web address (URL) begins with HTTPS b. You must log into the web site c. Closed padlock in browser

You must log into the web site

Which of the following statements is the most accurate? Select one: a. You will upload your files to the cislinux server with the FileZilla FTP software so they can be viewed by Web site visitors b. The cislinux software allows you to upload files to the FileZilla server so they can be viewed by visitors c. You will upload your files to FileZilla so they can be viewed by Web site visitors d. The FileZilla server software is used in the computer lab to upload files to the cislinux server

You will upload your files to the cislinux server with the FileZilla FTP software so they can be viewed by Web site visitors

What will this PHP code produce as output when run on the server? $total = 99; if ($total > 60) echo "<p>Your grade is a D</p>";

Your grade is a D

What output will this PHP program produce when run the server? $total = 99; if ($total >= 90) echo "<p>Your grade is an A</p>";

Your grade is an A

On a web server, which of the following server software would need to be kept up-to-date with the latest updates, patches, and new versions? Select one: a. the operating system, e.g. Windows Server, Linux, etc. b. the web server, e.g. Apache, IIS, etc. c. the database, e.g. MySQL, etc. d. the Content Management Systems, e.g. WordPress, Drupal, etc. e. the PHP interpreter f. the email server g. any shopping cart software present h. all of the above

all of the above

Which of the following can be encrypted? Select one: a. database fields b. web pages c. all of these d. USB drives e. email f. hard drive g. files

all of these

What is the name of the MySQL database field attribute that will cause the data stored in the table field to automatically populate with a sequential number? Select one: a. add_num b. auto_num c. counter d. auto_increment

auto_increment

A password attack where all possible combinations are tried, is called a __________________________. a. Infinity attack b. universal attack c. brute force attack d. X attack

brute force attack

In the following URL/web address, what is the name of the sub-domain name (or host name)? https://cislinux.hfcc.edu/~dasmith1234/cis122/clientserver.html Select one: a. cislinux b. edu c. hfcc d. https e. hfcc.edu

cislinux

Most lines/commands in PHP end (terminate) with which of the following characters? Select one: a. period b. colon c. comma d. semi-colon

semi-colon

If the address bar in a web browser contains the following, is the web page most likely stored and being viewed on a client computer or server computer? (chose best answer) h:\cis122\clientserver.html Select one: a. client computer b. server computer

client computer

Google Chrome, Microsoft Edge, Opera and Firefox are all best described as client-side or server-side software? Select one: a. server-side b. client-side

client-side

Which of the following would be the most likely example of a table field name (chose best answer)? Select one: a.X orders b. varchar(40) c.X customers d. first_name

first_name

Which of the following statements is True? Select one: a. if you want to validate a PHP at the W3C, you can provide the web server address or upload the file b. You cannot validate at PHP file on the W3C web site c. if you want to validate a PHP at the W3C, you must do so by providing the web server address d. if you want to validate a PHP at the W3C, you can provide the web server address or upload the file, or copy the code into the text box on the W3C web site

if you want to validate a PHP at the W3C, you must do so by providing the web server address

Which of the following HTML image tags looks for the image in a sub-folder to the current location? (chose best answer) Select one: a. images/logo.jpg b. ../images/logo.jog c. logo.jpg/sub/ d. /images/logo.jpg

images/logo.jpg

Which of the following is an example of a field data type (chose best answer)? Select one: a. record b. integer c. customers d. customer_id

integer

What network utility is usually the first choice to use to look, release, or renew the IP address on the computer a user is currently on? Select one: a. ping b. config c. ipset d. ipconfig

ipconfig


Set pelajaran terkait

Introductory Psychology - Chapters 8 and 9: Practice Quiz

View Set

Chapter 9 - Making Capital Investment Decisions

View Set

ESL Supplemental Practice Test 2

View Set

Chapter 25: Complications of Pregnancy

View Set

1.2b & c: Cell Theory, Prokaryotes & Eukaryotes

View Set

Acute and chronic pyelonephritis

View Set