Question No: 6
Which of the following languages is used to update a table in a relational database?
A. C#
B. SQL
C. Java
D. PHP
Answer: B
Question No: 7
Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. This type of attack is known as a:
A. brute-force attack.
B. forced-entry attack.
C. buffer overflow attack.
D. denial-of-service attack.
Answer: A
Question No: 8
Martin has created a Web site that uses colors to direct users through the site. Although the site looks great, users are frustrated when trying to find content. What should Martin do to enhance navigability but retain the look and feel of the site?
A. Use the same color throughout the site.
B. Add a color legend in the navigation menu.
C. Place a path marker at the bottom of each page.
D. Ensure that page headings are sufficiently descriptive.
Answer: B
Question No: 9
Suandi is documenting the technology choices of his Web development team. In the document, he explains his reasons for using JavaScript as a development language on the client side because:
A. it is best suited for open-source browsers.
B. it is compatible with the widest variety of Web browsers.
C. it is the scripting version of the popular Java programming language.
D. it was specifically developed for use with the Internet Explorer Web browser.
Answer: B
Question No: 10
The best way to thwart a dictionary attack is by enforcing a:
A. proxy server policy.
B. strong password policy.
C. restricted access policy.
D. firewall configuration policy.
Answer: B
Question No: 11
Gordon has been asked to create a focus group to aid in finishing the production of a Web site for the company World Stocks, Bonds and Currency Inc. What should this process definitely include?
A. Asking the corporate customers for their favorite colors, and then incorporating those colors into a style guide
B. Choosing at least five individuals who represent the target audience demographic, and then using testers with varying degrees of computer experience to
review the site
C. Creating a set of real-world activities that the company wants to provide to its customers, and then assigning those activities as tasks to accomplish, with
step-by-step directions for completing them
D. Using the bottom-up approach to site development by asking the corporate customers for the type of functionality they expect from the site, and then
designing the look and feel of the site around those functions
Answer: B
Question No: 12
You have been asked to insert an image named kayak.jpg in a Web page. Which of the following code examples will validate as XHTML 1.0 Transitional?
A. <img src=kayak.jpg alt=kayak />
B. <img src=kayak.jpg desc=kayak />
C. <img src=kayak.jpg alt=kayak></img>
D. <img ref=kayak.jpg desc=kayak></img>
Answer: A
Question No: 13
Which of the following is a standard use of cookies?
A. Capturing keystrokes
B. Scanning hard disk drives
C. Storing password information
D. Recording financial information
Answer: C
Question No: 14
Which of the following is an example of structural markup?
A. <b />Summary
B. <title>Summary</title>
C. <font size=6 />Summary
D. <center>Summary</center>
Answer: B
Question No: 15
What is another name for the staging server?
A. Live server
B. Production server
C. Redundant server
D. Development server
Answer: D
P.S. Easily pass 1D0-520 Exam with Examcollectionplus Pinpoint Dumps & pdf vce, Try Free: https://www.examcollectionplus.net/vce-1D0-520/ ( New Questions)