Which of the following methods of Zend_Auth returns TRUE if and only if the result represents a successful authentication attempt?
Which of the following is the method that is used to check whether the version required for running the application exists or not?
Which of the following functions in SimpleXML can be used to return an iterator containing a list of all subnodes of the current node?
Which of the following can be used as a countermeasure against the SQL injection attack?
Each correct answer represents a complete solution. Choose two.
A table named employees is given below:
Which of the following statements would return the employees names , in ascending order, based on their last name and first name? Each correct answer represents a complete solution. Choose all that apply.
Which of the following joins retrieves all rows from one table and only the matching rows from the joined table?
Which of the following methods of Zend_XmlRpc_Client can you use to instantiate a server proxy call?
Fill in the blank with the appropriate method name. The__________ method is used to convert an existing money value to a localized currency formatted output.
Which of the following is used to provide a tree structure onto which multiple resources can be added?
Which of the following is used to render a specific template within its own variable scope?
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. On the We-are-secure login page, he enters ='o r''=' as a username and successfully logs in to the user page of the Web site. The We-are-secure login page is vulnerable to a __________.
You are using a database named SalesDB to keep all sales records. The SalesDB database contains a table named Orders. You are required to create a new t able named OldOrders and transfer all the data from the Orders table to the new table. Which of the following statements will you use to accomplish the task?
Ross creates a database for a school. He creates two tables named Students and Courses. Which of the following SELECT statements will he use to define an outer join?
Fill in the blank with the appropriate term. _______________is used to process all requests that are received by the server and then dispatch them to the appropriate action controllers.
Consider the following script:
This is a test script.
echo 'This is some sample text';
?>
Which of the following tags is used in the php script?
Consider the PHP program (which includes a file specified by request):
$color = 'blue';
if (isset( $_GET['COLOR'] ) )
$color = $_GET['COLOR'];
require( $color . '.php' );
?>
A malicious user injects the following command:
/vulnerable.php?COLOR=C:\\notes.txt%00
Where vulnerable.php is a remotely hosted file containing an exploit. What does the malicious user want to do?
Which of the following SPL Interfaces/classes extends the standard Iterator interface and enables the ability to retrieve a specific item from internal data store?
Which of the following retrieves the request URI, path, $_GET & $_POST parameters, etc. and tracks whether an action has been dispatched via Zend_Controller_Dispatcher?
Fill in the blank with the appropriate term. ________is used to implement a classic Two -StepView pattern that allows a user to wrap the application content within another view.
Which method can be used to determine whether text within a source file has been translated in Zend_Translate?
Which of the following methods is used to change the session configuration options?
Which of the following methods is used to associate multiple filters and validators, apply them to collections of data, and retrieve input values?
Which of the following methods dynamically loads the Adapter class file on demand using Zend_Loader::loadClass()?
Which of the following OOPS design patterns is used to encapsulate a data source so that accessing the data source components becomes hidden within the class that implements the pattern?
Which of the following modes is the default Fetch mode for Adapter classes and returns data in an associative array on which the keys are the column names?
Fill in the blank with the appropriate method name. The________ method is used to check whether a date is valid or not.
Which of the following clauses is used to specify a column or an array of columns by which to sort?
Which of the following functions is the best choice to retrieve the fingerprint of a string?