Question No: 7
Consider the following code:
<film>
<year>1942</year>
<title>Casablanca</title>
<director>Michael Curtiz</director>
</film>
What kind of code is shown in the preceding example?
A. XML
B. HTML
C. VBScript
D. activescript
Answer: A
Question No: 8
In order to create two simultaneous moving objects, you would need at least:
A. one layer, one timeline and four keyframes.
B. one layer, two timelines and two keyframes.
C. two layers, one timeline and two keyframes.
D. two layers, one timeline and four keyframes.
Answer: D
Question No: 9
What is the primary purpose of navigational elements within a Web site?
A. To organize a list of hyperlinks
B. To make it easy for users to visit other sites
C. To enable user movement throughout the site
D. To make it easy for users to reach the home page
Answer: C
Question No: 10
User feedback can be evaluated in many ways. Which of the following methods is more quantitative than direct user feedback, and will provide indirect feedback from the majority of users who do not respond?
A. User surveys
B. Site server logs
C. Online e-mail links
D. Opt-in bulk mail services
Answer: B
Question No: 11
You are working for a financial services company. The company has a Web site that allows its customers to review their statements online. Your Web site uses the Document Object Model (DOM), ActiveX, JavaScript and Java. Which of these technologies is most likely to cause customers problems with their browsers when they try to access information?
A. Java
B. ActiveX
C. JavaScript
D. Document Object Model (DOM)
Answer: B
Question No: 12
Which of the following techniques helps stop a denial-of-service (DOS) attack in which an attacker has sent multiple ICMP or TCP packets to crash a Web server on the Internet?
A. Filtering traffic at the firewall
B. Changing passwords on a regular basis
C. Installing Apache server rather than Microsoft IIS
D. Placing the database and the Web server on separate systems
Answer: A
Question No: 13
During a project meeting, Eric explains the need for a development server to host the company's new Web site during development. Eric's IT co-workers want to know who will have access to the development server. What should Eric tell them?
A. The development server will be accessible to all members of the organization as well as the public.
B. The development server will be accessible to the development team and to authorized members of the organization.
C. The development server will be accessible to the public in order to collect public opinion
on the development of the Web site.
D. The development server will be accessible to all members of the organization in order to obtain their suggestions on the development of the Web site.
Answer: B
Question No: 14
The best way to thwart a dictionary attack is by enforcing a:
A. proxy server policy.
B. strong password policy.
C. restricted access policy.
D. firewall configuration policy.
Answer: B
Question No: 15
Processes that take client input, perform functions on the Web server and then return content to the Web browser are known as:
A. scripting languages.
B. client-side technologies.
C. server-side technologies.
D. hyperthreading technologies.
Answer: C
Question No: 16
Suandi is documenting the technology choices of his Web development team. In the document, he explains his reasons for using JavaScript as a development language on the client side because:
A. it is best suited for open-source browsers.
B. it is compatible with the widest variety of Web browsers.
C. it is the scripting version of the popular Java programming language.
D. it was specifically developed for use with the Internet Explorer Web browser.
Answer: B
Recommend!! Get the High value 1D0-520 dumps in VCE and PDF From 2passeasy, Welcome to download: https://www.2passeasy.com/dumps/1D0-520/ (New Q&As Version)