Which of the following is used for separation of hierarchies in Zend_config_Ini file?
Which of the following is used for separation of hierarchies in Zend_config_Ini file?
Which of the following methods dynamically loads the Adapter class file on demand using Zend_Loader::loadClass
Which of the following methods dynamically loads the Adapter class file on demand using
Zend_Loader::loadClass()?
Which of the following keywords will you use to set the default timezone?
Which of the following keywords will you use to set the default timezone? Each correct answer
represents a complete solution. Choose all that apply.
Which of the following methods is used to attach files to an e-mail and returns a Zend_Mime_Part object?
Which of the following methods is used to attach files to an e-mail and returns a Zend_Mime_Part
object?
Which of the following error constants gives all errors and warnings, except the E_STRICTerror level?
Which of the following error constants gives all errors and warnings, except the E_STRICTerror
level?
Which of the following inherits from Zend_Log_Writer_Abstract and is responsible for saving data to storage?
Which of the following inherits from Zend_Log_Writer_Abstract and is responsible for saving data
to storage?
Which of the following methods is triggered when a dispatched action is done even if apreDispatch() plugin has
Which of the following methods is triggered when a dispatched action is done even if
apreDispatch() plugin has skipped the action and is mainly useful for cleanup?
which includes a file specified by request): <code> <?
Consider the PHP program (which includes a file specified by request):
<code>
<?php
$color = ‘blue’;
if (isset( $_GET[‘COLOR’] ) )
$color = $_GET[‘COLOR’];
require( $color . ‘.php’ );
?>
<form method=”get”>
<select name=”COLOR”>
<option value=”red”>red</option>
<option value=”blue”>blue</option>
</select>
<input type=”submit”>
</form>
</code>
A malicious user injects the following command:
<code>
/vulnerable.php?COLOR=C:\\notes.txt%00
</code>
Where vulnerable.php is a remotely hosted file containing an exploit. What does the malicious
user want to do?
What will be the output of the following PHP script?
What will be the output of the following PHP script?
<code>
<?php include(“xml.inc”);
if (!$dom = domxml_open_mem($xmlstr)) {
echo “Error while parsing the XML document \n”;
exit;
}
$a = $dom->document_element();
print_r($a);
?>
</code>
Which of the following methods are run by the Zend_Controller_Front::run($path) method at a time?
Which of the following methods are run by the Zend_Controller_Front::run($path) method at a
time? Each correct answer represents a complete solution. Choose all that apply.