logo

CuriousTab

CuriousTab

Discussion


Home Database The Internet Database Environment Comments

  • Question
  • A proxy server is used for which of the following?


  • Options
  • A. To provide security against unauthorized users
  • B. To process client requests for Web pages
  • C. To process client requests for database access
  • D. To provide TCP/IP

  • Correct Answer
  • To provide security against unauthorized users 


  • The Internet Database Environment problems


    Search Results


    • 1. Which of the following is true about ColdFusion Markup Language (CFML)?

    • Options
    • A. It is stored in .asp files.
    • B. It is executed on the client.
    • C. It does not use tags.
    • D. It allows for coding of custom tags in an HTML file.
    • Discuss
    • 2. Which of the following is true about Microsoft Active Server Pages (ASP)?

    • Options
    • A. It is stored in .cfm files.
    • B. It is executed on the client.
    • C. It does not use tags.
    • D. It allows for coding of custom tags in an HTML file.
    • Discuss
    • 3. XML is which of the following?

    • Options
    • A. A scripting language that states the rules for tagging elements.
    • B. A programming language that states the rules for tagging elements.
    • C. A programming language that allows the creation of customized tags.
    • D. A scripting language that allows the creation of customized tags.
    • Discuss
    • 4. Web servers should be configured in which of the following ways?

    • Options
    • A. unauthorized access is restricted.
    • B. unauthorized access is unrestricted.
    • C. unauthorized access is impossible.
    • D. unauthorized access is possible.
    • Discuss
    • 5. Client-side extensions:

    • Options
    • A. add functionality to the server.
    • B. add functionality to the browser.
    • C. add functionality to the firewall.
    • D. add functionality to the network.
    • Discuss
    • 6. What is Hypertext Transfer Protocol (HTTP)?

    • Options
    • A. The protocol to copy files between computers
    • B. The transfer protocol to transfer Web pages to a browser
    • C. The database access protocol for SQL statements
    • D. The hardware/software protocol that limits access to company data
    • Discuss
    • 7. Common Gateway Interface (CGI) is which of the following?

    • Options
    • A. An interface that accepts and returns data that may be written in SQL.
    • B. An interface that accepts and returns data that may be written in any language that produces an executable file.
    • C. A small program that executes within another application and is stored on the server.
    • D. A small program that executes within another application and is stored on the client.
    • Discuss
    • 8. Which of the following could cause data to be unavailable?

    • Options
    • A. Data becoming lost or inaccurate
    • B. The database server
    • C. Planned database maintenance activities
    • D. All of the above.
    • Discuss
    • 9. Which of the following is the preferred way to recover a database after a transaction in progress terminates abnormally?

    • Options
    • A. Rollback
    • B. Rollforward
    • C. Switch to duplicate database
    • D. Reprocess transactions
    • Discuss
    • 10. Which of the following is part of an administrative policy to secure a database?

    • Options
    • A. Authentication policies
    • B. Limiting particular areas within a building to only authorized people
    • C. Ensure appropriate responses rates are in external maintenance agreements
    • D. All of the above.
    • Discuss


    Comments

    There are no comments.

Enter a new Comment