Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Zend Framework Certification

Last Update 17 hours ago Total Questions : 202

The Zend Framework Certification content is now fully updated, with all current exam questions added 17 hours ago. Deciding to include 100-500 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our 100-500 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these 100-500 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Zend Framework Certification practice test comfortably within the allotted time.

Question # 51

Which method can be used to determine whether text within a source file has been translated in Zend_Translate?

A.

isLocatedAt()

B.

isLocated()

C.

isTranslated()

D.

isTranslatedAt()

Question # 52

You run the following PHP script:

< ?php

$name = mysql_real_escape_string($_POST[ " name " ]);

$password = mysql_real_escape_string($_POST[ " password " ]);

? >

What is the use of the mysql_real_escape_string() function in the above script.

Each correct answer represents a complete solution. Choose all that apply.

A.

It can be used as a countermeasure against a SQL injection attack.

B.

It escapes all special characters from strings $_POST[ " name " ] and $_POST[ " password " ] except ' and " .

C.

It escapes all special characters from strings $_POST[ " name " ] and $_POST[ " password " ].

D.

It can be used to mitigate a cross site scripting attack.

Question # 53

Fill in the blank with the appropriate method name.

The________ method is used to check whether a date is valid or not.

A.

isDate()

Question # 54

Which of the following are the configuration files that are used in Zend_Config?

A.

Zend_Config_Server

B.

Zend_Config_Xml

C.

Zend_Config_Db

D.

Zend_Config_Ini

Question # 55

Which of the following methods dynamically loads the Adapter class file on demand using Zend_Loader::loadClass()?

A.

fetchAll()

B.

Zend_Db_Adapter_Pdo_Mysql()

C.

Zend_load_Adaptor()

D.

Zend_Db::factory()

Question # 56

Which of the following code snippets will you use if you want to connect to a Pop3 server using TLS?

A.

< ?php

$mail = new Zend_Mail_Storage_Pop3(array( ' host '

= ' example.com ' , ' user ' = ' user_name ' ,

' protocol_used ' = ' tls ' )); ? >

B.

< ?php

$mail = new Zend_Mail_Storage_Pop3(array( ' host '

= ' example.com ' , ' user ' = ' user_name ' ,

' connectTo ' = ' tls ' )); ? >

C.

< ?php

$mail = new Zend_Mail_Storage_Pop3(array( ' host '

= ' example.com ' , ' user ' = ' user_name ' ,

' ssl ' = ' tls ' )); ? >

D.

< ?php

$mail = new Zend_Mail_Storage_Pop3(array( ' host '

= ' example.com ' , ' user ' = ' user_name ' ,

' protocol_used ' = ' ssl/tls ' )); ? >

Question # 57

Which of the following code segments can be used to check the form validity?

A.

if (Zend_Form::isValid($_Post)) {

// success!

} else {

// failure!

}

B.

if (Zend_Form- > isValid($form)) {

// success!

} else {

// failure!

}

C.

if ($form- > isValid($_POST)) {

// success!

} else {

// failure!

}

D.

if (Zend_Form::isValid($form)) {

// success!

} else {

// failure!

}

Question # 58

Write the appropriate word to complete the sentence below.

___________is used for logging of multiple backends, formatting messages which are sent to the log, and filtering those messages, which should not be logged.

A.

Zend_Log

Question # 59

Which of the following is an example of a database connection that needs to be created once at the beginning of a script and then used throughout its code?

A.

ActiveRecord

B.

Factory pattern

C.

Singleton

D.

Model-view-controller

Question # 60

Consider the PHP program (which includes a file specified by request):

< ?php

$color = ' blue ' ;

if (isset( $_GET[ ' COLOR ' ] ) )

$color = $_GET[ ' COLOR ' ];

require( $color . ' .php ' );

? >

< form method= " get " >

< select name= " COLOR " >

< option value= " red " > red < /option >

< option value= " blue " > blue < /option >

< /select >

< input type= " submit " >

< /form >

A malicious user injects the following command:

/vulnerable.php?COLOR=C:\\notes.txt%00

where vulnerable.php is a remotely hosted file containing an exploit.

What does the malicious user want to do?

A.

Perform a cross-site scripting attack.

B.

Execute the malicious code that exists in the file vulnerable.php.

C.

Remove the .php suffix, allowing access to files other than .php.

D.

Inject a remotely hosted file containing an exploit.

Go to page: