Sail E0 Webinar

MCQs

Total Questions : 70 | Page 2 of 7 pages
Question 11. How many predefined variables does PHP use to authenticate a user?
  1.    1
  2.    2
  3.    3
  4.    4
 Discuss Question
Answer: Option B. -> 2
Question 12. Which of the following variables does PHP use to authenticate a user?
1. $_SERVER[‘PHP_AUTH_USER’].
2. $_SERVER[‘PHP_AUTH_USERS’].
3. $_SERVER[‘PHP_AUTH_PU’].
4. $_SERVER[‘PHP_AUTH_PW’].
  1.    1 and 2
  2.    2 and 4
  3.    1 and 4
  4.    2 and 3
 Discuss Question
Answer: Option C. -> 1 and 4
Question 13. Which of the following PHP function is commonly used when handling authentication via PHP?
1. header()
2. footer()
3. inset()
4. isset()
  1.    1 and 4
  2.    2 and 4
  3.    2 and 3
  4.    1 and 3
 Discuss Question
Answer: Option A. -> 1 and 4
Question 14. Which function is used to verify whether a variable contains a value?
  1.    header()
  2.    footer()
  3.    inset()
  4.    isset()
 Discuss Question
Answer: Option D. -> isset()
Question 15. Which of the following are types of PHP authentication implementation methodologies?
1. Hard-coding a login pair directly into the script
2. File-based authentication
3. Data-based authentication
4. PEAR’S HTTP authentication
  1.    2 and 3
  2.    1 and 4
  3.    2, 3 and 4
  4.    All of the mentioned
 Discuss Question
Answer: Option D. -> All of the mentioned
Question 16. In which authentication method does changing the username or password can be done only by entering the code and making the manual adjustment.
  1.    Hard-coding a login pair directly into the script
  2.    File-based authentication
  3.    Data-based authentication
  4.    PEAR’S HTTP authentication
 Discuss Question
Answer: Option A. -> Hard-coding a login pair directly into the script
Question 17. The authentication File.txt, the file which stores username and password should be stored ________ the server document root.
  1.    Inside
  2.    Outside
  3.    Within
  4.    None of the mentioned
 Discuss Question
Answer: Option B. -> Outside
Question 18. Which function is used to split a string into a series of substrings, with each string boundary is determined by a specific separator?
  1.    break()
  2.    divide()
  3.    explode()
  4.    md5()
 Discuss Question
Answer: Option C. -> explode()
Question 19. In which of the following situations does file-based authentication become inconvenient.
1. small list
2. large number of user
3. users are being regularly added
4. static authentication
  1.    1 and 4
  2.    1 and 3
  3.    2 and 3
  4.    2 and 4
 Discuss Question
Answer: Option C. -> 2 and 3
Question 20. Which is the most powerful authentication method among the four?
  1.    Hard-coding a login pair directly into the script
  2.    File-based authentication
  3.    Data-based authentication
  4.    PEAR’S HTTP authentication
 Discuss Question
Answer: Option C. -> Data-based authentication

Latest Videos

Latest Test Papers