IT Questions and Answers :)

Tuesday, June 19, 2018

Which of the following languages requires server-side interpretation?

Which of the following languages requires server-side interpretation?

  • CFML
  • XML
  • Java
  • CSS 

 
Which of the following languages requires server-side interpretation?

EXPLANATION

ColdFusion Markup Language (CFML) is a scripting language that augments standard HTML files with database commands, conditional operators, high-level formatting functions, and other elements to produce web applications. CFML also includes numerous other constructs, including ColdFusion Components (CFCs), CFML's version of objects, which allow for separation of business logic from presentation.
CFML can be written using either tags or CFScript, which is an ECMA script-style language.
The pages in a CFML application include the server-side CFML tags and functions in addition to HTML tags. Modern CFML applications also tend to have CFCs that are accessed by the CFML pages for executing business logic. When a web browser requests a page in a ColdFusion application, it is automatically pre-processed by the ColdFusion application server.
ability
CFML can also be used to generate other languages,such as XML, JavaScript, and CSS.
Source: https://en.wikipedia.org/wiki/ColdFusion_Markup_Language

Share:

Monday, June 18, 2018

Heaps and stacks are affected by which of the following attacks?

Heaps and stacks are affected by which of the following attacks?

  • Buffer overflows
  • Ping flood
  • SQL injection
  • Cross site scripting 

 
Heaps and stacks are affected by which of the following attacks?

EXPLANATION

Heaps and stacks are data structures that can be affected by buffer overflows. A buffer overflow vulnerability allows an attacker to corrupt the execution stack of an application by inserting data into adjacent memory locations. This can cause application or operating system instability or, in the hands of a skilled attacker, even allow arbitrary code execution.

SQL Injection is a vulnerability that allows an attacker to query or manipulate a database using user input fields.
Cross site scripting is a vulnerability that allows for an attacker to inject client site scripts into web pages that is intended to be executed by other users.

A ping flood is a method of performing denial of service (DoS or DDoS) against network devices.
Share:

Friday, June 15, 2018

The VHDX virtual hard disk format supports what maximum storage capacity?

The VHDX virtual hard disk format supports what maximum storage capacity?

  • 640GB
  • 6.4PB
  • 64TB
  • 6.4TB 

 
The VHDX virtual hard disk format supports what maximum storage capacity?

EXPLANATION

The VHDX disk format supports virtual hard disks as large as 64TB with power failure resiliency.


Share:

Thursday, June 14, 2018

Which of the following features of cloud computing matches resources to the current demand?

Which of the following features of cloud computing matches resources to the current demand?

  • Elasticity
  • Security
  • Redundancy
  • Availability 

Which of the following features of cloud computing matches resources to the current demand?

EXPLANATION

Elasticity refers to the ability of a cloud service to scale on demand. Resources such as storage, bandwidth, or memory can be provisioned in a matter of minutes and scaled down when no longer needed.
https://en.wikipedia.org/wiki/Elasticity_(cloud_computing)
Share:

Tuesday, June 12, 2018

What does a hop count of 16 mean in RIPv1?

What does a hop count of 16 mean in RIPv1?

  • The administrative distance is 16
  • The destination is an infinite distance away and unreachable
  • The device is 16 hops away
  • It established a 16 Mb connection to the device 
What does a hop count of 16 mean in RIPv1?

EXPLANATION




RIPv1 is a Classful routing protocol. Classful routing protocols support only the networks which are not subnetted. The maximum number of hops allowed for RIP is 15,
which limits the size of networks that RIP can support. A hop count of 16 is considered an infinite distance and the route is considered unreachable.

Share:

Popular Posts