Summer Special Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

ZF-100-500 Sample Questions Answers

Questions 4

Which of the following methods of Zend_Auth returns TRUE if and only if the result represents a successful authentication attempt?

Options:

A.

getIdentity()

B.

getCode()

C.

isValid()

D.

getMessages()

Buy Now
Questions 5

Which of the following is the method that is used to check whether the version required for running the application exists or not?

Options:

A.

$var = Zend_Version->compareVersion($version)

B.

Zend_compareVersion($version)

C.

Zend_Version::VERSION

D.

Zend_Version::compareVersion($version)

Buy Now
Questions 6

Which of the following code segments can be used to check the form validity?

Options:

A.

if (Zend_Form::isValid($_Post)) {

// success!

} else {

// failure!

}

B.

if (Zend_Form->isValid($form)) {

// success!

} else {

// failure!

}

C.

if ($form->isValid($_POST)) {

// success!

} else {

// failure!

}

D.

if (Zend_Form::isValid($form)) {

// success!

} else {

// failure!

}

Buy Now
Questions 7

Which of the following methods sends log data to a PHP stream?

Options:

A.

Zend_Log_Writer_Stream

B.

Zend_Log_Writer_Filestream

C.

Zend_Log_Writer_Abstract

D.

Zend_Log_Writer_Db

Buy Now
Questions 8

Which of the following functions in SimpleXML can be used to return an iterator containing a list of all subnodes of the current node?

Options:

A.

asXML()

B.

attributes()

C.

getName()

D.

children()

Buy Now
Questions 9

Which of the following can be used as a countermeasure against the SQL injection attack?

Each correct answer represents a complete solution. Choose two.

Options:

A.

session_regenerate_id()

B.

Prepared statement

C.

mysql_escape_string()

D.

mysql_real_escape_string()

Buy Now
Questions 10

A table named employees is given below:

Which of the following statements would return the employees names , in ascending order, based on their last name and first name? Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

select fname, lname from employees order by lname;

B.

select fname, lname from employees order by lname desc;

C.

select fname, lname from employees group by lname;

D.

select fname, lname from employees order by lname asc;

Buy Now
Questions 11

Which of the following joins retrieves all rows from one table and only the matching rows from the joined table?

Options:

A.

Self join

B.

Outer join

C.

Equijoin

D.

Non-equijoin

Buy Now
Questions 12

Which of the following methods of Zend_XmlRpc_Client can you use to instantiate a server proxy call?

Options:

A.

call()

B.

getLastResponse()

C.

getProxy()

D.

XMLResponse

Buy Now
Questions 13

Fill in the blank with the appropriate method name. The__________ method is used to convert an existing money value to a localized currency formatted output.

Options:

Buy Now
Questions 14

Which of the following is used to provide a tree structure onto which multiple resources can be added?

Options:

A.

Zend_Acl_Assert_Interface

B.

Zend_Acl_Assert

C.

Zend_Acl_Role

D.

Zend_Acl

Buy Now
Questions 15

Which of the following is used to render a specific template within its own variable scope?

Options:

A.

Action View Helpers

B.

Initial Helpers

C.

Partial Helpers

D.

View Helpers

Buy Now
Questions 16

John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters ='o r''=' as a username and successfully logs in to the user page of the Web site. The We-are-secure login page is vulnerable to a __________.

Options:

A.

Land attack

B.

Replay attack

C.

Dictionary attack

D.

SQL injection attack

Buy Now
Questions 17

You are using a database named SalesDB to keep all sales records. The SalesDB database contains a table named Orders. You are required to create a new t able named OldOrders and transfer all the data from the Orders table to the new table. Which of the following statements will you use to accomplish the task?

Options:

A.

IMPORT INTO

B.

INSERT INTO

C.

ADD INTO

D.

SELECT INTO

Buy Now
Questions 18

Ross creates a database for a school. He creates two tables named Students and Courses. Which of the following SELECT statements will he use to define an outer join?

Options:

A.

SELECT Stud.Student_ID, Cou.Course_ID FROM Students Stud, Courses Cou WHERE

Stud.Course_ID (+) = Cou.Course_ID;

B.

SELECT Stud.Student_ID, Cou.Course_ ID FROM Students Stud, Courses Cou WHERE

Stud.Fees BETWEEN Cou.Min_Fees and Cou.Max_Fees;

C.

SELECT Stud.Student_ID, Cou.Course_ID FROM Students Stud, Courses Cou WHERE

Stud.Course_ID = Cou.Course_ID;

D.

SELECT Stud.Student_ID, Cou.Course_ID FROM Students Stud, Courses Cou WHERE

Stud.Student_ID = Cou.Course_ID;

Buy Now
Questions 19

Fill in the blank with the appropriate term. _______________is used to process all requests that are received by the server and then dispatch them to the appropriate action controllers.

Options:

Buy Now
Questions 20

Which inheritance does Zend_Acl support among Resource objects?

Options:

A.

Multiple

B.

It does not support any type of inheritance.

C.

Single

D.

Cyclic

Buy Now
Questions 21

Consider the following script:

</p><p>This is a test script.</p><p>

echo 'This is some sample text';

?>

Which of the following tags is used in the php script?

Options:

A.

ASP tag

B.

Short tag

C.

Script tag

D.

Standard tag

Buy Now
Questions 22

Which of the following is known as Request Object?

Options:

A.

Zend_Controller_Response_Abstract

B.

Zend_Controller_Request_Abstract

C.

Zend_Controller_Request_Http

D.

Zend_Controller_Router

Buy Now
Questions 23

Consider the PHP program (which includes a file specified by request):

$color = 'blue';

if (isset( $_GET['COLOR'] ) )

$color = $_GET['COLOR'];

require( $color . '.php' );

?>

A malicious user injects the following command:

/vulnerable.php?COLOR=C:\\notes.txt%00

Where vulnerable.php is a remotely hosted file containing an exploit. What does the malicious user want to do?

Options:

A.

Perform a cross-site scripting attack.

B.

Execute the malicious code that exists in the file vulnerable.php.

C.

Remove the .php suffix, allowing access to files other than .php.

D.

Inject a remotely hosted file containing an exploit.

Buy Now
Questions 24

Which of the following SPL Interfaces/classes extends the standard Iterator interface and enables the ability to retrieve a specific item from internal data store?

Options:

A.

ArrayAccess

B.

Recursive Iterator

C.

FilterIterator

D.

SeekableIterator

Buy Now
Questions 25

Which of the following provides the quota limit in Zend_Mail?

Options:

A.

Maildir

B.

IMAP

C.

Mbox

D.

POP3

Buy Now
Questions 26

Which of the following retrieves the request URI, path, $_GET & $_POST parameters, etc. and tracks whether an action has been dispatched via Zend_Controller_Dispatcher?

Options:

A.

Zend_Controller_Get_Request

B.

Zend_Controller_Router

C.

Zend_Controller_Request_Abstract

D.

Zend_Controller_Response_Abstract

Buy Now
Questions 27

Fill in the blank with the appropriate term. ________is used to implement a classic Two -StepView pattern that allows a user to wrap the application content within another view.

Options:

Buy Now
Questions 28

Which method can be used to determine whether text within a source file has been translated in Zend_Translate?

Options:

A.

isLocatedAt()

B.

isLocated()

C.

isTranslated()

D.

isTranslatedAt()

Buy Now
Questions 29

Which of the following methods is used to change the session configuration options?

Options:

A.

Zend_Session::start()

B.

Zend_Session::setOptions()

C.

Zend_Session_Namespace()

D.

Zend_config_options

Buy Now
Questions 30

Which of the following methods is used to associate multiple filters and validators, apply them to collections of data, and retrieve input values?

Options:

A.

Zend_Validate_Interface

B.

isValid()

C.

setMessage()

D.

Zend_Filter_Input

Buy Now
Questions 31

Which of the following methods dynamically loads the Adapter class file on demand using Zend_Loader::loadClass()?

Options:

A.

Zend_Db_Adapter_Pdo_Mysql()

B.

Zend_load_Adaptor()

C.

fetchAll()

D.

Zend_Db::factory()

Buy Now
Questions 32

Which method is used to store the cache records into a SQLite database?

Options:

A.

Zend_Cache_Backend_Sqlite

B.

Zend_Cache_cache_Sqlite

C.

Zend_Cache_file_ Sqlite

D.

Zend_Cache_read_Sqlite

Buy Now
Questions 33

Which of the following OOPS design patterns is used to encapsulate a data source so that accessing the data source components becomes hidden within the class that implements the pattern?

Options:

A.

Registry

B.

ActiveRecord

C.

Model-view-controller

D.

Factory

Buy Now
Questions 34

Which method is used to clear or invalidate a particular cache ID?

Options:

A.

delete()

B.

cancel()

C.

remove()

D.

clear()

Buy Now
Questions 35

Which of the following modes is the default Fetch mode for Adapter classes and returns data in an associative array on which the keys are the column names?

Options:

A.

Zend_Db::FETCH_BOTH

B.

Zend_Db::FETCH_ASSOC

C.

Zend_Db::FETCH_OBJ

D.

Zend_Db::FETCH_COLUMN

Buy Now
Questions 36

Fill in the blank with the appropriate method name. The________ method is used to check whether a date is valid or not.

Options:

Buy Now
Questions 37

Which of the following clauses is used to specify a column or an array of columns by which to sort?

Options:

A.

Order By

B.

WHERE

C.

FROM

D.

LIMIT

Buy Now
Questions 38

Which of the following functions is the best choice to retrieve the fingerprint of a string?

Options:

A.

md5()

B.

fingerprint()

C.

crypt()

D.

hash()

Buy Now
Exam Code: ZF-100-500
Exam Name: Zend Framework CertificationVersion 4.1
Last Update: May 1, 2025
Questions: 128
$66  $164.99
$50  $124.99
$42  $104.99
buy now ZF-100-500