 
			 
			MCQOPTIONS
 Saved Bookmarks
				This section includes 29 Mcqs, each offering curated multiple-choice questions to sharpen your Database knowledge and support exam preparation. Choose a topic below to get started.
| 1. | A load-balancing approach where requests to one IP address are distributed among the multiple servers hosting the Website at the TCP/IP routing level is DNS (domain name server) balancing. | 
| A. | 1 | 
| B. | |
| Answer» C. | |
| 2. | Servlets are stored on the server rather than with an application on a client. | 
| A. | 1 | 
| B. | |
| Answer» B. | |
| 3. | Both ASP and ColdFusion allow for the coding of custom tags within an HTML document. | 
| A. | 1 | 
| B. | |
| Answer» B. | |
| 4. | A proxy server controls the passage of messages or files through to the organization's network. | 
| A. | 1 | 
| B. | |
| Answer» B. | |
| 5. | Routers are used to transmit message packets and forward them to the correct destination over the most efficient pathway available. | 
| A. | 1 | 
| B. | |
| Answer» B. | |
| 6. | Virus detection is a problem with encrypted messages, because the virus may not be detectable until the message is unencrypted. | 
| A. | 1 | 
| B. | |
| Answer» B. | |
| 7. | VBScript is similar to JavaScript. | 
| A. | 1 | 
| B. | |
| Answer» B. | |
| 8. | An intranet provides which of the following? | 
| A. | Connectivity to all customers | 
| B. | Connectivity to selected customers | 
| C. | Connectivity to no customers | 
| D. | Connectivity to all of the above | 
| Answer» D. Connectivity to all of the above | |
| 9. | Hypertext Transfer Protocol (HTTP) is secure. | 
| A. | 1 | 
| B. | |
| Answer» C. | |
| 10. | XML is a rapidly developing scripting language that may, in conjunction with XHTML, replace HTML. | 
| A. | 1 | 
| B. | |
| Answer» B. | |
| 11. | Client-side extensions: | 
| A. | add functionality to the server. | 
| B. | add functionality to the browser. | 
| C. | add functionality to the firewall. | 
| D. | add functionality to the network. | 
| Answer» C. add functionality to the firewall. | |
| 12. | Which of the following is true concerning the standard network protocol for connecting a client to a Web or database server via the Internet? | 
| A. | Both TCP and IP are needed. | 
| B. | TCP is needed but IP is not needed. | 
| C. | TCP is not needed but IP is needed. | 
| D. | Neither TCP and IP are needed. | 
| Answer» B. TCP is needed but IP is not needed. | |
| 13. | XML is which of the following? | 
| A. | A scripting language that states the rules for tagging elements. | 
| B. | A programming language that states the rules for tagging elements. | 
| C. | A programming language that allows the creation of customized tags. | 
| D. | A scripting language that allows the creation of customized tags. | 
| Answer» E. | |
| 14. | The World Wide Web Consortium (W3C) is the chief standards body for HTTP and HTML. | 
| A. | 1 | 
| B. | |
| Answer» B. | |
| 15. | XSL is a language used to develop style sheets from XML documents. | 
| A. | 1 | 
| B. | |
| Answer» B. | |
| 16. | Which of the following is true about ColdFusion Markup Language (CFML)? | 
| A. | It is stored in .asp files. | 
| B. | It is executed on the client. | 
| C. | It does not use tags. | 
| D. | It allows for coding of custom tags in an HTML file. | 
| Answer» E. | |
| 17. | Most browsers support e-mail, instant messaging, bookmarking of Websites, and Website addressing and searching. | 
| A. | 1 | 
| B. | |
| C. | 1 | 
| D. | |
| Answer» B. | |
| 18. | Websites without a database attached to them have which of the following characteristics? | 
| A. | The ability to generate data via SQL. | 
| B. | The inability to use a browser to display Web pages. | 
| C. | Static information using HTML or JavaScript. | 
| D. | The need to use TCP/IP as the network protocol. | 
| Answer» D. The need to use TCP/IP as the network protocol. | |
| 19. | C++ is an object-oriented language and is simpler than Java. | 
| A. | 1 | 
| B. | |
| C. | 1 | 
| D. | |
| Answer» C. 1 | |
| 20. | Web servers should be configured in which of the following ways? | 
| A. | unauthorized access is restricted. | 
| B. | unauthorized access is unrestricted. | 
| C. | unauthorized access is impossible. | 
| D. | unauthorized access is possible. | 
| Answer» B. unauthorized access is unrestricted. | |
| 21. | A proxy server is used for which of the following? | 
| A. | To provide security against unauthorized users | 
| B. | To process client requests for Web pages | 
| C. | To process client requests for database access | 
| D. | To provide TCP/IP | 
| Answer» B. To process client requests for Web pages | |
| 22. | Common Gateway Interface (CGI) is which of the following? | 
| A. | An interface that accepts and returns data that may be written in SQL. | 
| B. | An interface that accepts and returns data that may be written in any language that produces an executable file. | 
| C. | A small program that executes within another application and is stored on the server. | 
| D. | A small program that executes within another application and is stored on the client. | 
| Answer» C. A small program that executes within another application and is stored on the server. | |
| 23. | Which of the following is true concerning Web services standards? | 
| A. | Led by only one group. | 
| B. | Helped by cooperation between companies. | 
| C. | Not necessary at this time. | 
| D. | Important so that the web can flourish. | 
| Answer» E. | |
| 24. | Most plug-ins download slowly because they are rather large files. | 
| A. | 1 | 
| B. | |
| C. | 1 | 
| D. | |
| Answer» C. 1 | |
| 25. | Features of XML include which of the following? | 
| A. | The tags are used to describe the appearance of the content. | 
| B. | Addresses the structuring and manipulation of the data involved. | 
| C. | Governs the display of information in a Web browser. | 
| D. | All of the above. | 
| Answer» C. Governs the display of information in a Web browser. | |
| 26. | Which of the following is true about Microsoft Active Server Pages (ASP)? | 
| A. | It is stored in .cfm files. | 
| B. | It is executed on the client. | 
| C. | It does not use tags. | 
| D. | It allows for coding of custom tags in an HTML file. | 
| Answer» E. | |
| 27. | What is Hypertext Transfer Protocol (HTTP)? | 
| A. | The protocol to copy files between computers | 
| B. | The transfer protocol to transfer Web pages to a browser | 
| C. | The database access protocol for SQL statements | 
| D. | The hardware/software protocol that limits access to company data | 
| Answer» C. The database access protocol for SQL statements | |
| 28. | A server-side extension is needed to do what? | 
| A. | Allow a request from a client to access the database. | 
| B. | Allow a request from a client to access a HTML-formatted page. | 
| C. | Allow a request from a client to access Web pages. | 
| D. | All of the above. | 
| Answer» B. Allow a request from a client to access a HTML-formatted page. | |
| 29. | An intrusion detection system does not perform which of the following? | 
| A. | Tries to identify attempts to hack into a computer system. | 
| B. | May monitor packets passing over the network. | 
| C. | May transmit message packets to the correct destination. | 
| D. | Set up deception systems that attempt to trap hackers. | 
| Answer» D. Set up deception systems that attempt to trap hackers. | |