

MCQOPTIONS
Saved Bookmarks
This section includes 12 Mcqs, each offering curated multiple-choice questions to sharpen your Php knowledge and support exam preparation. Choose a topic below to get started.
1. |
Which is the most powerful authentication method among the four? |
A. | Hard-coding a login pair directly into the script |
B. | File-based authentication |
C. | Data-based authentication |
D. | PEAR’S HTTP authentication |
Answer» D. PEAR’S HTTP authentication | |
2. |
In which of the following situations does file-based authentication become inconvenient. |
A. | i) and iv) |
B. | i) and iii) |
C. | ii) and iii) |
D. | ii) and iv)View Answer |
Answer» D. ii) and iv)View Answer | |
3. |
Which function is used to split a string into a series of substrings, with each string boundary is determined by a specific separator? |
A. | break() |
B. | divide() |
C. | explode() |
D. | md5() |
Answer» D. md5() | |
4. |
The authenticationFile.txt, the file which stores username and password should be stored ___ the server document root. |
A. | Inside |
B. | Outside |
C. | Within |
D. | None of the mentioned |
Answer» C. Within | |
5. |
In which authentication method does changing the username or password can be done only by entering the code and making the manual adjustment. |
A. | Hard-coding a login pair directly into the script |
B. | File-based authentication |
C. | Data-based authentication |
D. | PEAR’S HTTP authentication |
Answer» B. File-based authentication | |
6. |
Which function is used to verify whether a variable contains a value? |
A. | header() |
B. | footer() |
C. | inset() |
D. | isset() |
Answer» E. | |
7. |
How many predefined variables does PHP use to authenticate a user? |
A. | 1 |
B. | 2 |
C. | 3 |
D. | 4 |
Answer» C. 3 | |
8. |
WHICH_IS_THE_MOST_POWERFUL_AUTHENTICATION_METHOD_AMONG_THE_FOUR??$ |
A. | Hard-coding a login pair directly into the script |
B. | File-based authentication |
C. | Data-based authentication |
D. | PEAR’S HTTP authentication |
Answer» D. PEAR‚Äö√Ñ√∂‚àö√ë‚àö¬•S HTTP authentication | |
9. |
In which of the following situations does file-based authentication become inconvenient? |
A. | small list |
B. | large number of user |
C. | users are being regularly added |
D. | static authentication |
Answer» D. static authentication | |
10. |
Which of the following are types of PHP authentication implementation methodologies? |
A. | Hard-coding a login pair directly into the script |
B. | File-based authentication |
C. | Data-based authentication |
D. | PEAR’S HTTP authentication |
Answer» E. | |
11. |
Which of the following PHP function is commonly used when handling authentication via PHP? |
A. | header() |
B. | footer() |
C. | inset() |
D. | isset() |
Answer» B. footer() | |
12. |
Which of the following variables does PHP use to authenticate a user? |
A. | $_SERVER[‘PHP_AUTH_USER’]. |
B. | $_SERVER[‘PHP_AUTH_USERS’]. |
C. | $_SERVER[‘PHP_AUTH_PU’]. |
D. | $_SERVER[‘PHP_AUTH_PW’]. |
Answer» D. $_SERVER[‚Äö√Ñ√∂‚àö√ë‚àö‚â§PHP_AUTH_PW‚Äö√Ñ√∂‚àö√ë‚àö¬•]. | |