MCQOPTIONS
Saved Bookmarks
This section includes 12 Mcqs, each offering curated multiple-choice questions to sharpen your Php knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which is the most powerful authentication method among the four? |
| A. | Hard-coding a login pair directly into the script |
| B. | File-based authentication |
| C. | Data-based authentication |
| D. | PEAR’S HTTP authentication |
| Answer» D. PEAR’S HTTP authentication | |
| 2. |
In which of the following situations does file-based authentication become inconvenient. |
| A. | i) and iv) |
| B. | i) and iii) |
| C. | ii) and iii) |
| D. | ii) and iv)View Answer |
| Answer» D. ii) and iv)View Answer | |
| 3. |
Which function is used to split a string into a series of substrings, with each string boundary is determined by a specific separator? |
| A. | break() |
| B. | divide() |
| C. | explode() |
| D. | md5() |
| Answer» D. md5() | |
| 4. |
The authenticationFile.txt, the file which stores username and password should be stored ___ the server document root. |
| A. | Inside |
| B. | Outside |
| C. | Within |
| D. | None of the mentioned |
| Answer» C. Within | |
| 5. |
In which authentication method does changing the username or password can be done only by entering the code and making the manual adjustment. |
| A. | Hard-coding a login pair directly into the script |
| B. | File-based authentication |
| C. | Data-based authentication |
| D. | PEAR’S HTTP authentication |
| Answer» B. File-based authentication | |
| 6. |
Which function is used to verify whether a variable contains a value? |
| A. | header() |
| B. | footer() |
| C. | inset() |
| D. | isset() |
| Answer» E. | |
| 7. |
How many predefined variables does PHP use to authenticate a user? |
| A. | 1 |
| B. | 2 |
| C. | 3 |
| D. | 4 |
| Answer» C. 3 | |
| 8. |
WHICH_IS_THE_MOST_POWERFUL_AUTHENTICATION_METHOD_AMONG_THE_FOUR??$ |
| A. | Hard-coding a login pair directly into the script |
| B. | File-based authentication |
| C. | Data-based authentication |
| D. | PEAR’S HTTP authentication |
| Answer» D. PEAR‚Äö√Ñ√∂‚àö√ë‚àö¬•S HTTP authentication | |
| 9. |
In which of the following situations does file-based authentication become inconvenient? |
| A. | small list |
| B. | large number of user |
| C. | users are being regularly added |
| D. | static authentication |
| Answer» D. static authentication | |
| 10. |
Which of the following are types of PHP authentication implementation methodologies? |
| A. | Hard-coding a login pair directly into the script |
| B. | File-based authentication |
| C. | Data-based authentication |
| D. | PEAR’S HTTP authentication |
| Answer» E. | |
| 11. |
Which of the following PHP function is commonly used when handling authentication via PHP? |
| A. | header() |
| B. | footer() |
| C. | inset() |
| D. | isset() |
| Answer» B. footer() | |
| 12. |
Which of the following variables does PHP use to authenticate a user? |
| A. | $_SERVER[‘PHP_AUTH_USER’]. |
| B. | $_SERVER[‘PHP_AUTH_USERS’]. |
| C. | $_SERVER[‘PHP_AUTH_PU’]. |
| D. | $_SERVER[‘PHP_AUTH_PW’]. |
| Answer» D. $_SERVER[‚Äö√Ñ√∂‚àö√ë‚àö‚â§PHP_AUTH_PW‚Äö√Ñ√∂‚àö√ë‚àö¬•]. | |