Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following code segments can be used to check the form validity?

A.

if (Zend_Form::isValid($_Post)) {

// success!

} else {

// failure!

}

B.

if (Zend_Form->isValid($form)) {

// success!

} else {

// failure!

}

C.

if ($form->isValid($_POST)) {

// success!

} else {

// failure!

}

D.

if (Zend_Form::isValid($form)) {

// success!

} else {

// failure!

}

Which of the following keywords will you use to set the default timezone? Each correct answer represents a complete solution. Choose all that apply.

A.

date.timezone setting in php.ini

B.

set_default_timezone

C.

set_timezone

D.

date_default_timezone_set()

Symonds works as a Database Administrator for Blue Well Inc. The company uses an Oracledatabase. The database contains a table named Employees. Following is the structure of the table:

EmployeeID NUMBER (5) PRIMARY KEY EmployeeName VARCHAR2 (35) NOT NULL Salary NUMBER (9, 2) NOT NULL Commission NUMBER (4, 2)

DepartmentID NUMBER (5)

Symonds queries the Employees table with the following statement:

SELECT e.EmployeeName, m.Salary

FROM Employees e, Employeesm

WHERE e.EmployeeID = m.EmployeeID;

Which of the following types of joins is used in the statement?

A.

Outer join

B.

Equijoin

C.

Cross join

D.

Self join

In which of the following situations will you use the set_exception_handler() function?

A.

When you want to restore a previously defined exception handler function.

B.

When the try/catch block is unable to catch an exception.

C.

When you want to set a user -defined function to handle errors.

D.

When you want to generate a user -level error/warning/notice message.

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters ='o r''=' as a username and successfully logs in to the user page of the Web site. The We-are-secure login page is vulnerable to a __________.

A.

Land attack

B.

Replay attack

C.

Dictionary attack

D.

SQL injection attack

Which of the following methods of Zend_Auth returns TRUE if and only if the result represents a successful authentication attempt?

A.

getIdentity()

B.

getCode()

C.

isValid()

D.

getMessages()

You run the following PHP script:

$name = mysql_real_escape_string($_POST["name"]);

$password = mysql_real_escape_string($_POST["password"]);

?>

What is the use of the mysql_real_ escape_string() function in the above script. Each correct answer represents a complete solution. Choose all that apply.

A.

It can be used as a countermeasure against a SQL injection attack.

B.

It escapes all special characters from strings $_POST["name"] and $_POST["password"] except ' and ".

C.

It escapes all special characters from strings $_POST["name"] and $_POST["password"].

D.

It can be used to mitigate a cross site scripting attack.

Which function is used to take a locale string as a parameter and set a new locale?

A.

setNewLocale()

B.

setLocale()

C.

locale_Set()

D.

newLocale()

Which of the following code snippets will create a memory manager object?

A.

$memoryManager = Zend_Memory:=>factory('None');

B.

$memoryManager = Zend_Memoryfactory::None;

C.

$memoryManager = Zend_Memory::factory.None;

D.

$memoryManager = Zend_Memory::factory('None');

Which of the following is known as Request Object?

A.

Zend_Controller_Response_Abstract

B.

Zend_Controller_Request_Abstract

C.

Zend_Controller_Request_Http

D.

Zend_Controller_Router