You run the following PHP script:
$name = mysql_real_escape_string($_POST["name"]);
$password = mysql_real_escape_string($_POST["password"]);
?>
What is the use of the mysql_real_ escape_string() function in the above script. Each correct answer represents a complete solution. Choose all that apply.
A. It can be used as a countermeasure against a SQL injection attack.
B. It escapes all special characters from strings $_POST["name"] and $_POST["password"]except ' and ".
C. It escapes all special characters from strings $_POST["name"] and $_POST["password"].
D. It can be used to mitigate a cross site scripting attack.
CORRECT TEXT
Fill in the blank with the appropriate method name. The__________ method is used to retrieve headers when the storage has been opened.
A. getHeader()
CORRECT TEXT
Fill in the blank with the appropriate class name. The______ class is used to load files
dynamically.
A. Zend_Loader
Which of the following methods of Zend_XmlRpc_Client can you use to instantiate a server proxy call?
A. call()
B. getLastResponse()
C. getProxy()
D. XMLResponse
You have given the following XML data in the tasks.XML file:
Now, you run the following PHP script:
$objDOM = new DOMDocument();
$objDOM->load("tasks.xml");
$note = $objDOM->getElementsByTagName("note");
foreach( $note as $value )
{
$tasks = $value->getElementsByTagName("tasks"); $task = $tasks->item(0)->nodeValue;
$details = $value->getElementsByTagName("details");
$detail = $details->item(0)->nodeValue;
echo "$task :: $detail
";
}
?>
What should be displayed when this script is executed?
A. The contents of the whole XML document
B. The XML of every tasks and details nodes
C. The contents of every tasks and details nodes
D. The XML of whole XML document
Which of the following clauses is used to specify a column or an array of columns by which to sort?
A. Order By
B. WHERE
C. FROM
D. LIMIT
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters ='o r''=' as a username and successfully logs in to the user page of the Web site. The We-are- secure login page is vulnerable to a __________.
A. Land attack
B. Replay attack
C. Dictionary attack
D. SQL injection attack
Which of the following are the valid methods of the Zend_Date class? Each correct answer represents a complete solution. Choose all that apply.
A. set()
B. add()
C. check()
D. get()
E. sub()
Which of the following is an example of a database connection that needs to be created once at the beginning of a script and then used throughout its code?
A. Model-view-controller
B. Factory pattern
C. ActiveRecord
D. Singleton
Which of the following are the configuration files that are used in Zend_Config?
A. Zend_Config_Server
B. Zend_Config_Xml
C. Zend_Config_Db
D. Zend_Config_Ini
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ZF-100-500 exam preparations and certification application, do not hesitate to visit our Vcedump.com to find your solutions here.