Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which of the following functions sets up start and end element handlers?

A.

xml_parse_into_struct()

B.

xml_parser_create_ns()

C.

xml_set_object()

D.

xml_set_element_handler()

Full Access
Question # 5

Which of the following statements correctly explain the working of Zend_Sera ch_Lucene?

Each correct answer represents a complete solution. Choose all that apply.

A.

It supports ranked searching, phrase queries, wildcard queries, and proximity queries.

B.

It is a text search engine.

C.

It requires the Zend_Db class to connect to a database server.

D.

It can also be used to search by any specific field, such as, title, author, etc.

Full Access
Question # 6

Which of the following methods sends log data to a PHP stream?

A.

Zend_Log_Writer_Stream

B.

Zend_Log_Writer_Filestream

C.

Zend_Log_Writer_Abstract

D.

Zend_Log_Writer_Db

Full Access
Question # 7

Which of the following methods of Zend_Auth returns TRUE if and only if the result represents a successful authentication attempt?

A.

getIdentity()

B.

getCode()

C.

isValid()

D.

getMessages()

Full Access
Question # 8

Angela works as a Database Administrator for AznoTech Inc. She writes the following query:

SELECT Dept_Name, Emp_Name

FROM Departments d1, Employees e1

WHERE d1.Dept_No = e1.Dept_No

ORDER BY Dept_Name, Emp_Name;

Which of the following joins is used in this query?

A.

Non-equijoin

B.

Outer join

C.

Equijoin

D.

Self join

Full Access
Question # 9

Which of the following SPL Interfaces/classes extends the standard Iterator interface and enables the ability to retrieve a specific item from internal data store?

A.

ArrayAccess

B.

Recursive Iterator

C.

FilterIterator

D.

SeekableIterator

Full Access
Question # 10

In which of the following situations will you use the set_exception_handler() function?

A.

When you want to restore a previously defined exception handler function.

B.

When the try/catch block is unable to catch an exception.

C.

When you want to set a user -defined function to handle errors.

D.

When you want to generate a user -level error/warning/notice message.

Full Access
Question # 11

You have to select persons whose age is between twenty -five and forty from a database named HumanResource. Which of the following criteria will you use in the query to accomplish thetask?

A.

BETWEEN 25 AND 40

B.

BETWEEN 25 TO 40

C.

BETWEEN 25 - 40

D.

BETWEEN 25 & 40

Full Access
Question # 12

Which of the following methods dynamically loads the Adapter class file on demand using Zend_Loader::loadClass()?

A.

Zend_Db_Adapter_Pdo_Mysql()

B.

Zend_load_Adaptor()

C.

fetchAll()

D.

Zend_Db::factory()

Full Access
Question # 13

Which of the following is used to persist the content between view scripts and view instances?

A.

Action View Helpers

B.

Placeholder Helper

C.

Initial Helpers

D.

Partial Helper

Full Access
Question # 14

Which of the following are the configuration files that are used in Zend_Config?

A.

Zend_Config_Server

B.

Zend_Config_Xml

C.

Zend_Config_Db

D.

Zend_Config_Ini

Full Access
Question # 15

Which of the following types of content is expected by Zend_Rest_Client when using a RESTservice?

A.

JSON

B.

HTML

C.

Simple text

D.

XML

Full Access
Question # 16

Consider the PHP program (which includes a file specified by request):

$color = 'blue';

if (isset( $_GET['COLOR'] ) )

$color = $_GET['COLOR'];

require( $color . '.php' );

?>

A malicious user injects the following command:

/vulnerable.php?COLOR=C:\\notes.txt%00

Where vulnerable.php is a remotely hosted file containing an exploit. What does the malicious user want to do?

A.

Perform a cross-site scripting attack.

B.

Execute the malicious code that exists in the file vulnerable.php.

C.

Remove the .php suffix, allowing access to files other than .php.

D.

Inject a remotely hosted file containing an exploit.

Full Access
Question # 17

Which of the following methods of Zend_XmlRpc_Client can you use to instantiate a server proxy call?

A.

call()

B.

getLastResponse()

C.

getProxy()

D.

XMLResponse

Full Access
Question # 18

Which component is used to offer an API to manipulate dates and times?

A.

Zend_Date

B.

Zend_Time

C.

Zend_Timezone

D.

Zend_Timestamp

Full Access
Question # 19

You run the following PHP script:

$name = mysql_real_escape_string($_POST["name"]);

$password = mysql_real_escape_string($_POST["password"]);

?>

What is the use of the mysql_real_ escape_string() function in the above script. Each correct answer represents a complete solution. Choose all that apply.

A.

It can be used as a countermeasure against a SQL injection attack.

B.

It escapes all special characters from strings $_POST["name"] and $_POST["password"]except ' and ".

C.

It escapes all special characters from strings $_POST["name"] and $_POST["password"].

D.

It can be used to mitigate a cross site scripting attack.

Full Access