A load-balancing approach where requests to one IP address are distributed among the multiple servers hosting the Website at the TCP/IP routing level is DNS (domain name server) balancing. False True TRUE ANSWER : ? YOUR ANSWER : ?
Both ASP and ColdFusion allow for the coding of custom tags within an HTML document. True False TRUE ANSWER : ? YOUR ANSWER : ?
Which of the following is true concerning Web services standards? Important so that the web can flourish. Led by only one group. Not necessary at this time. Helped by cooperation between companies. TRUE ANSWER : ? YOUR ANSWER : ?
Most browsers support e-mail, instant messaging, bookmarking of Websites, and Website addressing and searching. False True TRUE ANSWER : ? YOUR ANSWER : ?
XML is which of the following? A scripting language that states the rules for tagging elements. A programming language that states the rules for tagging elements. A programming language that allows the creation of customized tags. A scripting language that allows the creation of customized tags. TRUE ANSWER : ? YOUR ANSWER : ?
An intrusion detection system does not perform which of the following? Tries to identify attempts to hack into a computer system. Set up deception systems that attempt to trap hackers. May transmit message packets to the correct destination. May monitor packets passing over the network. TRUE ANSWER : ? YOUR ANSWER : ?
Which of the following is true concerning the standard network protocol for connecting a client to a Web or database server via the Internet? Both TCP and IP are needed. TCP is not needed but IP is needed. Neither TCP and IP are needed. TCP is needed but IP is not needed. TRUE ANSWER : ? YOUR ANSWER : ?
Most plug-ins download slowly because they are rather large files. True False TRUE ANSWER : ? YOUR ANSWER : ?
C++ is an object-oriented language and is simpler than Java. False True TRUE ANSWER : ? YOUR ANSWER : ?
Web servers should be configured in which of the following ways? unauthorized access is possible. unauthorized access is restricted. unauthorized access is impossible. unauthorized access is unrestricted. TRUE ANSWER : ? YOUR ANSWER : ?