Which of the following is directly exploited by a brute-force attack?
A. The Web server's available bandwidth
B. The Web server's authentication mechanisms
C. The TCP/IP software installed on the Web server
D. The log file mechanisms that exist on the Web server
XML tags must be written:
A. in lowercase letters only.
B. in uppercase letters only.
C. in both uppercase and lowercase letters.
D. consistently in uppercase or lowercase letters.
Which of the following is the minimal requirement for an XML document?
A. It must be delimited.
B. It must be well-formed.
C. It must be embedded within HTML code.
D. It must be embedded within XHTML code.
Which of the following is true of both SWF and SVG file formats?
A. Both can be streamed.
B. Both are open industry standards.
C. Both are W3C Recommendations.
D. Both describe two-dimensional vector graphics.
According to the W3C XML Recommendation, XML documents that are not well-formed:
A. will not load in the browser.
B. will load in the browser and then generate an error.
C. will generate an error and then load in the browser.
D. will load in the browser until reaching the violation, and then stop.
The best use of an XHTML table is to:
A. display tabular data.
B. create complex layouts.
C. occupy the entire space of a Web page.
D. generate fluid design using percentages.
You are creating a Web site for a customer, which will have many pages. You want to implement a single style sheet to control all the pages on the site. Which of the following would be the preferred method for doing so?
A. Use an internal style sheet.
B. Use an external style sheet.
C. Use an exported style sheet.
D. Use an embedded style sheet.
Which of the following will best protect a server from Web server vulnerabilities that are exploited by hackers?
A. Using strong passwords
B. Installing updates (for example, service packs)
C. Using the POST method instead of the GET method for a Web form
D. Using the GET method instead of the POST method for a Web form
During a project meeting, Eric explains the need for a development server to host the company's new Web site during development. Eric's IT co-workers want to know who will have access to the development server. What should Eric tell them?
A. The development server will be accessible to all members of the organization as well as the public.
B. The development server will be accessible to the development team and to authorized members of the organization.
C. The development server will be accessible to the public in order to collect public opinion on the development of the Web site.
D. The development server will be accessible to all members of the organization in order to obtain their suggestions on the development of the Web site.
Your site development team has created a Web site, and you want to test its accessibility. Which of the following do you need to conduct the test?
A. A test pool of very unskilled users
B. A test pool of at least five or six typical users
C. A test pool of at least six members of the Web team
D. A test pool of fewer than five moderately skilled users