Which of the following methods are used by Zend_Controller_Action_Helper_Abstract?
Which of the following methods are used by Zend_Controller_Action_Helper_Abstract?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following are the valid methods of the Zend_Date class?
Which of the following are the valid methods of the Zend_Date class?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is an example of a database connection that needs to be created once at the beginning o
Which of the following is an example of a database connection that needs to be created once at
the beginning of a script and then used throughout its code?
which to sort?
Which of the following clauses is used to specify a column or an array of columns by which to
sort?
The We-are-secure login page is vulnerable to a __________.
John works as a professional Ethical Hacker. He has been assigned a project to test the security
of www.we-are-secure.com. On the We-are-secure login page, he enters =’or”=’ as a username
and successfully logs in to the user page of the Web site. The We-are-secure login page is
vulnerable to a __________.
The__________ method is used to retrieve headers when the storage has been opened.
Fill in the blank with the appropriate method name.
The__________ method is used to retrieve headers when the storage has been opened.
The______ class is used to load files dynamically.
Fill in the blank with the appropriate class name.
The______ class is used to load files dynamically.
Which of the following methods of Zend_XmlRpc_Client can you use to instantiate a server proxy call?
Which of the following methods of Zend_XmlRpc_Client can you use to instantiate a server proxy
call?
What should be displayed when this script is executed?
You have given the following XML data in the tasks.XML file:
<?xml version=”1.0″ encoding=”ISO-8859-1″?>
<tasklist>
<note>
<tasks>Validate data</tasks>
<details>String Validation</details>
</note>
<note>
<tasks>Secure data</tasks>
<details>Encryption</details>
</note>
</tasklist>
Now, you run the following PHP script:
<?php
$objDOM = new DOMDocument();
$objDOM->load(“tasks.xml”);
$note = $objDOM->getElementsByTagName(“note”);
foreach( $note as $value )
{
$tasks = $value->getElementsByTagName(“tasks”);
$task = $tasks->item(0)->nodeValue;
$details = $value->getElementsByTagName(“details”);
$detail = $details->item(0)->nodeValue;
echo “$task :: $detail <br>”;
}
?>
What should be displayed when this script is executed?
Which of the following can be used as a countermeasure against the SQL injection attack?
Which of the following can be used as a countermeasure against the SQL injection attack?
Each correct answer represents a complete solution. Choose two.