TH2

cortegesmashInternet και Εφαρμογές Web

10 Νοε 2013 (πριν από 3 χρόνια και 11 μήνες)

62 εμφανίσεις

TH2

XIX


(
1
)

1.

Web Pub Folder is a ________

(a)

Write Only

(b)

Read Only

(c)

Both (a) and (b)

(d)

Execute

2.

There are 2 main "types" of patches:
small bugfixes and

(a)

bugFinders

(b)

tugChecks

(c)

general improvements

(d)

None of the above

3.

What len function tells you about ?

(a)

Length of string without s
pace

(b)

Length of string including space

(c)

Length of anything

(d)

None of the above

4.

IIS is a product of which Organiation ?

(a)

Microsoft

(b)

IBM

(c)

Sun Micro

system

(d)

None of the above

5.

An example of ISAPI is

(a)

The Microsoft Internet Database
connector

(b)

Visual Basic


(c)

C++


(d)

An SQL

server


6.

What are the CF system requirements ?

(a)

Windows
NT 3.51 or higher or
Windows
95

(b)

486
CPU
or higher with a Pentium
preferred

(c)

24 MB or ram with 32 MB
preferred

(d)

All of the above

7.

Textboxes allow the user to enter what ?

(a)

single line of text

(b)

paragraph of t
ext

(c)

multiple line

(d)

None of the above

8.

CF LOCATION Allows you to do what ?

(a)

To create a file or read a file

(b)

to Pass control to another template
or HTM file

(c)

to copy a template into your current
template

(d)

None of the above

9.

What do you mean by HTML ?

(a)

Hyper

Text
Markup Language

(b)

Hyper

Test Markup Language

(c)

Higher

Text Markup language

(d)

None of the above

10.

What is the Extension of Microsoft
Word files ?

(a)

DOC

(b)

TXT

(c)

WORD

(d)

XLS

11.

What is a Cookie ?

(a)

to keep information to client
computer

(b)

to keep information from user in our
server.

(c)

Both (a) and (b)

(d)

None of the above

12.

IIS is a collection of server. Which
server it contain by default ?

(a)

FTP server

(b)

HTTP server

(c)

both FTP & HTTP server

(d)

None of the above

13.

ISAPI application and filters are ?

(a)

Implemented as DLL

(b)

Implemented as EXE


(c)

Implemented

as OXSs


(d)

Implemented as CMD


14.

Telnet service communicate through
which port number ?

(a)

20

(b)

21

(c)

23

(d)

24

15.

Name the root directory where
configuration files stays ?

(a)

/etc/httpd

(b)

/etc/httpd/conf

(c)

/etc/httpd/logs

(d)

/etc/httpd/modules

16.

What is a Session?

(a)

to keep information
from user in
client

(b)

to keep information from user in our
server.

(c)

Both (a) and (b)

(d)

None of the above of the above

17.

When this option is checked, users can
view content in your site without any
authentication

(a)

Allow Anonymous Access

(b)

Basic Authentication

(c)

Windo
ws NT Challenge/ Response

(d)

No Permission

TH2


XIX


(
2
)

18.

Message Queue Server Supports
Activex Component

(a)

Yes

(b)

No

(c)

Depends on version

(d)

None of the above

19.

To display the current year what will
you do?

(a)

< % =year %>

(b)

<% =year(now) %>

(c)

<% =now %>

(d)

<% =%>

20.

What is cold fusion?

(a)

web bas
ed applications that access
database

(b)

website

(c)

home directory

(d)

All of the above

21.

What is a Microsoft management Console?

(a)

is a console windows.

(b)

A program that let you do all local task

(c)

A program that lets you control most
aspect of a windows 2000 computer
from

a single common interface

(d)

None of the above

22.

Which protocol is used By WWW
service?

(a)

TCP/IP

(b)

HTTP

(c)

FTP

(d)

None of the above of the above

23.

Ineted mode is only supported on which
Platform?

(a)

Unix


(b)

Linux

(c)

Solaries

(d)

Windows

24.

What do you mean by directory MetaDir?

(a)

Name of

the file or files to use as a
prewritten HTML directory index

(b)

Specifies the name of the directory
in which apache can find meta
information file

(c)

specifies the file name suffix for the
file containing the meta information

(d)

None of the above

25.

Which of these

is not an IP Address?

(a)

1.0.0.0

(b)

0.0.0.1

(c)

1.1.1.1

(d)

None of the above

26.

Erase keyword destroy array comple
tely

(a)

Yes

(b)

No

(c)

Depends on program

(d)

None of the above

27.

if you use the <script> tag to specify the
scripting language you must use the
key

word _________ to indic
ate that
the script must be execute on server.

(a)

RunOn

(b)

Runat

(c)

language

(d)

%

28.

_______ that processes the form fields

(a)

Template

(b)

CFML

(c)

CFM

(d)

HTML

29.

Any type of variable can be used along
with Form variables _____

and ______

variables.

(a)

CGI, Perl

(b)

CGI

(c)

Perl

(d)

None of the above

30.

Which of the following
Date

Format
function show Date “
21

Jan 20
11


(a)

D mmm YYYY

(b)

d MM yy

(c)

d
MMM YYYY

(d)

None of the above

31.

Which of the following terms could be
considered security zones? (Select all
that apply.)

(a)

Intranet

(b)

Internet

(c)

DMZ

(d)

Extranet

32.

When you think of
Virtual Local Area
Networks (VLANs), how are
workstations connected? (Select all
that apply.)

(a)

Same functional department

(b)

Same group of users

(c)

Same application

(d)

All of the above

TH2

XIX


(
3
)

33.

What is the primary purpose for
Network Address Translation ?

(a)

Multiple users s
haring one IP
address for Instant Messenger (IM)

(b)

Hiding the IP addresses of the
internal network from those outside
of the network

(c)

Showing the IP addresses of the
external network to clients on the
internal network

(d)

Single users gaining access to
multiple e
mail accounts

34.

Which of the following is an example of
a private IP address, which is not to be
used on the Internet?

(a)

172.111.12.15

(b)

192.168.141.15

(c)

192.165.142.15

(d)

19.176.134.15

35.

Which of the following devices is
specially designed to forward packets
to sp
ecific ports based on the packet's
address?

(a)

Specialty hub

(b)

Switching hub

(c)

Port hub

(d)

Filtering hub

36.

Your primary concern is LAN security.
You want to subnet your internal
network with a device that provides
security and stability. Which of the
following devices

do you choose to
meet these needs?

(a)

Static router

(b)

Dynamic router

(c)

Static switch

(d)

Dynamic switch

37.

Most networks employ devices for
routing services. Routers work at which
of the following OSI layers?

(a)

Transport

(b)

Network

(c)

Presentation

(d)

Session

38.

____________ is t
he program run by
user to read incoming mail or to send
message to others

(a)

MDA


(b)

MUA


(c)

MTA


(d)

MCA

39.

The _____ is a free mail server that
runs on LINUX and other UNIX system

(a)

Exim


(b)

Send mail


(c)

Postfix


(d)

Qmail

40.

The time out event _______ gives the
acknowledgment of o
ther SMTP command


(a)

Smtp


(b)

Command


(c)

Misc


(d)

Cannect

41.

The login names for the users are
found in file _______

(a)

/etc/login



(b)

/ftp/login



(c)

/etc/passwd


(d)

/etc/ftp/login

42.

________ User are similar to the real
user, but access to the computer’s file
system in more restr
icted way

(a)

Real



(b)

Guest


(c)

Anonymous


(d)

Private

43.

Command the enables compression of
files for the FTP site for all users is
____

(a)

zip



(b)

.z



(c)

.tar



(d)

All of the above

44.

When _______ is run, it creates a
shutdown file

(a)

Ftp shut


(b)

Shut ftp



(c)

Ftp shut down


(d)

Ftp down

45.

The
maximum number of server
process kept spare is indicated by
_______ parameter

(a)

Max spare




(b)

Max spare server

(c)

Max server




(d)

All of the above

46.

________ & _______ controls the
number of threads available that are
not being used

(a)

Min, Max





(b)

Min spare, Max spar
e


(c)

Max threads, Min threads



(d)

Max spare thread, Min spare threads

TH2


XIX


(
4
)

47.

DSO module that enables a customized
format for information contained within
the log files is ____________

(a)

Mod
-
log




(b)

Mod
-
files

(c)

Mod
-
log
-
files



(d)

All of the above

48.

The special server feature
______
indicates that the server will traverse
symbolic links

(a)

Follow link




(b)

Follow syslink

(c)

Follow symlink



(d)

None of the above

49.

The ____ directive assign are of the
defined log format formats to a file
name

(a)

Customlog




(b)

Log

(c)

Customfile



(d)

None of the above

50.

You want to have a private
communication between two sites that
also allows for encryption and
authorization. Which of the following is
the best choice in this instance?

(a)

Modem

(b)

Firewall

(c)

VPN

(d)

Bastion Host

51.

Which of the following devices is used
to monitor netw
ork traffic, including
DOS
attacks in real time?

(a)

A host
-
based Intrusion Detection
System

(b)

A network
-
based Intrusion
Detection System

(c)

A router
-
based Intrusion Detection
System

(d)

A server
-
based Intrusion Detection
System

52.

Which one of the following is a small
ne
twork device that is a security
concern for network administrators
because the device is easily
misplaced?

(a)

Workstation

(b)

Server

(c)

Mobile device

(d)

VPN

53.

A Class Factory implements a special
COM interface called as _______

(a)

Iunknown



(b)

Iknown



(c)

AddRef



(d)

IClassFactory

54.

__________ is a pointer to a machine
on which the class object is instantiated

(a)

PClassInfo



(b)

ClassInfo



(c)

PServerInfo



(d)

None of the above

55.

If the dwclsContext parameter is
______ the COM sub system look for
an EXE

(a)

CLSCTX__INDROC__SERVER


(b)

CLSCTX__LOCAL__SERVER

(c)

No error

(d)

None of the above

56.

The COM function ___________ is
called for runtime registration of objects
in out of process component modules

(a)

CoClassObject


(b)

RegisterClassObject


(c)

CoRegisterClassObject


(d)

None of the above

57.

The mechanism of converting
parameters
to andfrom Data Streams is
called ____________

(a)

IDL




(b)

MIDL



(c)

Conversion



(d)

Marshalling

58.

In C++ ___________ is used to factor
out common behavior into a reusable
base class

(a)

Encapsulation


(b)

Inheritence



(c)

Polymorphism


(d)

Aggregation

59.

The client can have direct acce
ss
through the innerobject interfaces via

(a)

Containment


(b)

Aggregation


(c)

Both
(a) and (b)



(d)

Inheritance

60.

If Vt is ___
__

then VARIANT’S value from
ival, which contain a 2 byte integer is read

(a)

VT_I2



(b)

VT_R8



(c)

VT_D2



(d)

VT_C8

TH2

XIX


(
5
)

61.

The global functions used to register an

u
nregistered COM component is __
___

(a)

DLLRegisterServer



(b)

DLLUnregisterServer

(c)

RegisterServer



(d)

UnRegisterServer

62.

ATL control class ___________enables
rapid loading of the control

(a)

IprovideClassInfo2Impl


(b)

IpersistStreamInitImpl

(c)

IpersistStorageImpl



(d)

IquickActi
vateImpl

63.

The ATL control class ______

provides
a default implementation of the
IViewObject interface which enables a
control to display itself in the container

(a)

IOleControlImpl




(b)

IOleObjectImpl


(c)

IOleInplaceActiveObjectImpl


(d)

IViewObjectExImpl

64.

The ATL contr
ol class ______

provides an
implementation of the
ISpecifyPropertyPages interface which
enables a container to obtain the CLSID, for
the property pages for a control

(a)

IOleObjectImpl


(b)

IOleControlImpl


(c)

ISpecifyPropertyPagesImpl


(d)

None of the above

65.

__________fu
nction give the current
screen resolution

(a)

GetMatrics



(b)

GetSystemMatrix


(c)

GetSysMatrics


(d)

None of the above

66.

The second argument to the
InvokeHelper(

) determines that a
___________

is being called

(a)

Event



(b)

Property



(c)

Method



(d)

All of these

67.

If the COM library in
itialisation is a
success the return value is _________

(a)

S_TRUE



(b)

S_FALSE



(c)

S_OK



(d)

None of the above

68.

ColeDespatchDriver wraps up
GetClassObject( ) in a member function
called _____

(a)

Despatch( )



(b)

Create( )



(c)

CreateDespatch( )


(d)

None of the above

69.

_________func
tion specifies
information to a container about
whether the control has a solid
background and is opaque or not

(a)

DECLARE_VIEW( )


(b)

DECLARE_STATUS( )

(c)

VIEW_STATUS( )


(d)

DECLARE_VIEW_STATUS( )

70.

When WinMain is called it looks for
globally constructed application
object
derieved from __________

(a)

CObject



(b)

CWinApp



(c)

CApp



(d)

All of the

above