I NEED HELP WITH THESE QUESTIONS. PLEASE HELP 51. Which of the following refers
ID: 3665667 • Letter: I
Question
I NEED HELP WITH THESE QUESTIONS. PLEASE HELP
51. Which of the following refers to the total time between when an operation is initiated and when
the operation completes?
a. Latency
b. Responsiveness
c. Scalability
d. Security rating
e. Throughput f. Reliability
52. Under what conditions would you use $(“#something”) as part of your code?
a. There is exactly one item on the page that you want to modify
b. There are exactly two items on the page that you want to modify
c. There are items on the page that you want to modify, but you’re unsure how many
d. All of the above
53. Which of these is NOT true about jQuery?
a. jQuery can insert and remove elements from the DOM
b. jQuery can change the appearance of elements in the DOM
c. jQuery works even when JavaScript is turned off in the browser
d. jQuery supports sending and receiving JSON
e. jQuery supports a range of plug-ins, including some for data validation
54. Where is it ok to cache information, when trying to improve scalability?
a. Cache information in the server if feasible; never cache in the client (JS or browser)
b. Cache information in the client (JS or browser) if feasible; never cache at the server
c. Cache information in both the client (JS or browser) and the server if feasible
d. Never cache information in the client (JS or browser) or the server
55. What is a key benefit of using jQuery, compared to using just JavaScript?
a. jQuery improves the scalability of your code
b. jQuery improves the security of your code
c. jQuery improves the usability of your page
d. jQuery improves the likelihood your code will work on many browsers
56. What is a key benefit of caching?
a. Caching eliminates the need to recompute results
b. Caching requires no storage to store values
c. Caching reduces the risk that users will receive 404 (page not found) errors
d. Caching eliminates the risk of security holes
e. All of the above
f. None of the above
57. When should you AVOID caching information?
a. When the information is used repeatedly
b. When the information is expensive to compute or retrieve
c. When the information changes very frequently and thus requires recomputing
d. When the information is small and requires little memory to store
58. How is indexing related to caching?
a. Indexing is often a good way to organize and find information in a cache (e.g., to
retrieve values from an associative array)
b. Caching is often a good way to ensure that information is kept secure before it is
indexed (e.g., by recording its primary keys in content-addressable storage)
c. Indexing is a useful way of validating data before you cache it
d. Caching is a useful way of validating data before you index it
59. Which of the following is true about most database systems?
a. Most databases will automatically create an index based on your primary key
b. Most database systems lack support for indexing
c. Most database systems will automatically delete your data once you add it to the index
d. Most databases will automatically create an index based on all mediumblob columns
e. In most databases, creating an index will speed up “insert” operations but slow down
“read” (or “select”) operations
60. Suppose that somebody steals a copy of all the social security numbers in your system. Which is
violated?
a. Confidentiality
b. Availability
c. Integrity
d. Compatibility with HTML5 standards
61. Suppose your site is susceptible to a denial-of-service attack. Which of the following is
threatened?
a. Confidentiality
b. Availability
c. Integrity
d. Compatibility with HTML5 standards
62. Suppose that your site has a URL where anybody can issue a GET request to retrieve a JSON –
formatted list of puppies from your database. This page is very very slow. Which of the following is most likely to suffer as a result?
a. Confidentiality
b. Availability
c. Integrity
d. Compatibility with HTML5 standards
63. Consider again that puppy JSON feed mentioned in the last question above. What could you do
to improve your site and definitely eliminate the problem mentioned in the question above?
a. Require all incoming requests to use POST
b. Require incoming requests to include a specially-formatted cookie
c. Only allow requests from certain IP addresses; ignore all other requests
d. All of the above: any of these three strategies would definitely solve the problem
e. None of the above: none of these strategies would definitely solve the problem
64. How can you prevent most man-in-the-middle attacks?
a. Require all users to authenticate (with a login form) before you send them any data
b. Disable autocomplete on all form fields
c. Install an SSL certificate and use https instead of http
d. Replicate your server onto as many machines as possible
e. Be sure to use htmlspecialchars() in your PHP when sending data to the client
65. Which of the following is the best explanation of what injection attacks are?
a. Inserting something into your code that does not belong there
b. Accessing your server before it finishes booting up
c. Storing data in the database without encrypting it
d. Tricking the user's browser into trashing your site
66. Which of the following attacks is most likely to harm the largest number of users in the worst
possible way?
a. Somebody steals your database
b. SQL injection attack
c. HTML injection attack
d. Cross-site scripting attack
e. Cross-site request forgery
f. It’s hard to tell: any of the above could be the worst, depending on the details
67. How can you prevent an injection attack from succeeding?
a. Escape all values before you use them
b. Require the browser to transmit all data via POST
c. Avoid server-to-server requests
d. Use https instead of http
e. Cache values whenever possible
f. None of the above: None of these will definitely prevent an attack from succeeding
68. How can you prevent a cross-site scripting (XSS) attack from succeeding?
a. Escape all values before you use them
b. Require the browser to transmit all data via POST
c. Avoid server-to-server requests
d. Use https instead of http
e. Cache values whenever possible
f. None of the above: None of these will definitely prevent an attack from succeeding
69. How can you prevent a cross-site request forgery (CSRF) attack from succeeding?
a. Escape all values before you use them
b. Require the browser to transmit all data via POST
c. Avoid server-to-server requests
d. Use https instead of http
e. Cache values whenever possible
f. None of the above: None of these will definitely prevent an attack from succeeding
70. Which of these sentences is a true statement about how one specific technology can be used to
improve security, usability and scalability?
a. AJAX can be used to prevent CSRF, to improve responsiveness, and to reduce latency.
b. CSS can be used to conceal CSRF, to improve aesthetics, and to implement caching.
c. Hashing can be used to encrypt passwords, to track usability, and to raise throughput.
d. IFRAMES can be used to detect XSS, to improve accessibility, and to duplicate indexes.
Explanation / Answer
I NEED HELP WITH THESE QUESTIONS. PLEASE HELP
51. Which of the following refers to the total time between when an operation is initiated and when
the operation completes?(a,b)
a. Latency
b. Responsiveness
c. Scalability
d. Security rating
e. Throughput f. Reliability
52. Under what conditions would you use $(“#something”) as part of your code?(a)
a. There is exactly one item on the page that you want to modify
b. There are exactly two items on the page that you want to modify
c. There are items on the page that you want to modify, but you’re unsure how many
d. All of the above
53. Which of these is NOT true about jQuery?(c)
a. jQuery can insert and remove elements from the DOM
b. jQuery can change the appearance of elements in the DOM
c. jQuery works even when JavaScript is turned off in the browser
d. jQuery supports sending and receiving JSON
e. jQuery supports a range of plug-ins, including some for data validation
54. Where is it ok to cache information, when trying to improve scalability?(a)
a. Cache information in the server if feasible; never cache in the client (JS or browser)
b. Cache information in the client (JS or browser) if feasible; never cache at the server
c. Cache information in both the client (JS or browser) and the server if feasible
d. Never cache information in the client (JS or browser) or the server
55. What is a key benefit of using jQuery, compared to using just JavaScript?(d)
a. jQuery improves the scalability of your code
b. jQuery improves the security of your code
c. jQuery improves the usability of your page
d. jQuery improves the likelihood your code will work on many browsers
56. What is a key benefit of caching?(a)
a. Caching eliminates the need to recompute results
b. Caching requires no storage to store values
c. Caching reduces the risk that users will receive 404 (page not found) errors
d. Caching eliminates the risk of security holes
e. All of the above
f. None of the above
57. When should you AVOID caching information?(c)
a. When the information is used repeatedly
b. When the information is expensive to compute or retrieve
c. When the information changes very frequently and thus requires recomputing
d. When the information is small and requires little memory to store
58. How is indexing related to caching?(a)
a. Indexing is often a good way to organize and find information in a cache (e.g., to
retrieve values from an associative array)
b. Caching is often a good way to ensure that information is kept secure before it is
indexed (e.g., by recording its primary keys in content-addressable storage)
c. Indexing is a useful way of validating data before you cache it
d. Caching is a useful way of validating data before you index it
59. Which of the following is true about most database systems?(a)
a. Most databases will automatically create an index based on your primary key
b. Most database systems lack support for indexing
c. Most database systems will automatically delete your data once you add it to the index
d. Most databases will automatically create an index based on all mediumblob columns
e. In most databases, creating an index will speed up “insert” operations but slow down
“read” (or “select”) operations
60. Suppose that somebody steals a copy of all the social security numbers in your system. Which is
violated?(a)
a. Confidentiality
b. Availability
c. Integrity
d. Compatibility with HTML5 standards
61. Suppose your site is susceptible to a denial-of-service attack. Which of the following is
threatened?(c)
a. Confidentiality
b. Availability
c. Integrity
d. Compatibility with HTML5 standards
62. Suppose that your site has a URL where anybody can issue a GET request to retrieve a JSON –
formatted list of puppies from your database. This page is very very slow. Which of the following is most likely to suffer as a result?(b)
a. Confidentiality
b. Availability
c. Integrity
d. Compatibility with HTML5 standards
63. Consider again that puppy JSON feed mentioned in the last question above. What could you do
to improve your site and definitely eliminate the problem mentioned in the question above?(d)
a. Require all incoming requests to use POST
b. Require incoming requests to include a specially-formatted cookie
c. Only allow requests from certain IP addresses; ignore all other requests
d. All of the above: any of these three strategies would definitely solve the problem
e. None of the above: none of these strategies would definitely solve the problem
64. How can you prevent most man-in-the-middle attacks?(c)
a. Require all users to authenticate (with a login form) before you send them any data
b. Disable autocomplete on all form fields
c. Install an SSL certificate and use https instead of http
d. Replicate your server onto as many machines as possible
e. Be sure to use htmlspecialchars() in your PHP when sending data to the client
65. Which of the following is the best explanation of what injection attacks are?
a. Inserting something into your code that does not belong there
b. Accessing your server before it finishes booting up
c. Storing data in the database without encrypting it
d. Tricking the user's browser into trashing your site
66. Which of the following attacks is most likely to harm the largest number of users in the worst
possible way?(f)
a. Somebody steals your database
b. SQL injection attack
c. HTML injection attack
d. Cross-site scripting attack
e. Cross-site request forgery
f. It’s hard to tell: any of the above could be the worst, depending on the details
67. How can you prevent an injection attack from succeeding?(d)
a. Escape all values before you use them
b. Require the browser to transmit all data via POST
c. Avoid server-to-server requests
d. Use https instead of http
e. Cache values whenever possible
f. None of the above: None of these will definitely prevent an attack from succeeding
68. How can you prevent a cross-site scripting (XSS) attack from succeeding?(a)
a. Escape all values before you use them
b. Require the browser to transmit all data via POST
c. Avoid server-to-server requests
d. Use https instead of http
e. Cache values whenever possible
f. None of the above: None of these will definitely prevent an attack from succeeding
69. How can you prevent a cross-site request forgery (CSRF) attack from succeeding?
a. Escape all values before you use them
b. Require the browser to transmit all data via POST
c. Avoid server-to-server requests
d. Use https instead of http
e. Cache values whenever possible
f. None of the above: None of these will definitely prevent an attack from succeeding
70. Which of these sentences is a true statement about how one specific technology can be used to
improve security, usability and scalability?(a)
a. AJAX can be used to prevent CSRF, to improve responsiveness, and to reduce latency.
b. CSS can be used to conceal CSRF, to improve aesthetics, and to implement caching.
c. Hashing can be used to encrypt passwords, to track usability, and to raise throughput.
d. IFRAMES can be used to detect XSS, to improve accessibility, and to duplicate indexes.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.