SD3 1. 2. 3. 4. 5. 6. 7. 8. _____ in XML means that the language can be extended & adopted to meet any difference needs (a) Extra (b) Extended (c) Extensible (d) All of the above _____ for XML documents is specific enough to allow development of XML parsers (a) Text data (b) Attributes (c) Language compiler (d) Grammar XML documents that satisfy the grammar are called as _____ (a) type 4 grammar (b) well fared grammar (c) structured grammar (d) None of the above The _____ in an XML document describes the documents structure (a) Data (b) text data (c) markup (d) attributes _____ lists all the legal markup & specifies where & how the markup may be included in a document (a) XLT (b) DTD (c) XTD (d) None of the above _____ is responsible for dividing the document into individual attributes & other pieces (a) Compiler (b) Parser (c) Interpreter (d) Co-processor SGML stands for ________ (a) Standard Generalized ML (b) Secured General ML (c) Stored Genuine ML (d) None of the above XML 1.0 was invented in ________ (a) 1999 (b) 2000 (c) 996 (d) 1998 XIX 9. 10. 11. 12. 13. 14. 15. 16. XSLT stands for ________ (a) Extensible Style sheet Language Transformations (b) Extensible Spreadsheet Language Table (c) Extensible Smart Language Theory (d) Extensible Secure Language Table To enhance interoperability, individuals or organizations may agree to use only certain tags called as _____ (a) Standard tags (b) XML applications (c) XML text tags (d) DTD ________ is an XML application that describes the layout of both printed & web pages (a) XSLT (b) XSL-FO (c) CSS (d) XSLM CSS stands for ________ (a) Cascading Spread Server (b) Cascading Super Server (c) Cascaded Secure Server (d) None of the above ________ is an effect to make sense out of XML document pieces that may not be considered well formed documents in isolation (a) XML schema (b) X Fragments (c) XHTML (d) XSL ________ is a reformulation of HTML as a well fared, modular, potentially, valid XML application (a) XHTML (b) XSL (c) XSLT (d) XSL-FO All XML documents must be ________ (a) edited (b) well fared (c) syntactically correct (d) All of the above The start tag & end tag jointly are called as ________ (a) delimiter (b) markup (c) syntax (d) All of the above (1) SD3 17. The start tag & end tag ends with ____ (a) //> (b) /> (c) > (d) >> 18. ________ is case sensitive (a) HTML (b) XML (c) Both (a) and (b) (d) BML 19. Each element in an XML document has exactly ________ parent element (a) 2 (b) 3 (c) 4 (d) 5 20. If an elements start tag is inside an element then its end tag must be ________ that element (a) Inside (b) Outside (c) cannot say (d) no need to put the tag 21. Overlapping tags are ________ in XML (a) prohibited (b) allowed (c) cannot say (d) in same versions are allowed 22. The dictionary between elements that contains only character data & elements that contain only child elements is seen in ________ (a) data oriented document (b) object oriented document (c) class oriented document (d) None of the above 23. XML elements can have ________ (a) parameters (b) value (c) name value (d) attribute 24. ________ are enclosed in single of double quotation marks (a) Name value (b) Attributes (c) Value (d) All of the above 25. Elements & other XML names may contain any ________ (a) ASCII (b) UNICODE (c) Alphanumeric (d) All of the above XIX 26. XML names cannot start with ________ (a) number (b) hyphen (c) period (d) All of the above 27. XML predefines exactly ________ number of entity reference (a) 5 (b) 6 (c) 10 (d) None of the above 28. ________ always replaces the particular markup with the actual characters the entity reference refers to (a) Compiler (b) Editor (c) Parser (d) All of the above 29. Entity reference _____ is replaced by & (a) & lt (b) & gt (c) & amp (d) & apos 30. Entity reference & quote is replaced by ________ (a) ` (b) : (c) “ (d) :31. The only thing that cannot appear in a CDATA section is the ________ (a) CDATA section (b) Delimiter ]] (c) Both (a) and (b) (d) Elements 32. A CDATA section is set of t by a _____ (a) <! [CDATA [and]] > (b) <! [CDATA [and]] /> (c) </ [CDATA [and]] \> (d) [</ [CDATA] > \ ] 33. In CDATA sections everything is simply ________ not ________ (a) markup, character data (b) character data, markup (c) both (a) and (b) (d) None of the above 34. The comments that are intended for the computer programs are called as ____ (a) processing parameters (b) attributes (c) name value (d) processing instructions (2) SD3 35. The Apache Web Server parser comments in ______ files to recognizes server side includes (a) Html (b) Stml (c) Shtml (d) All of the above 36. Processing instructions certain ______ amount of text (a) Limited (b) unlimited (c) cannot say (d) depends upon the elements data type 37. XML documents should, but do not have to, begin with an ________ (a) XML declamations (b) XML comments (c) Both (a) and (b) (d) XML CDATA 38. ________ are written in a formal syntax that explains precisely which elements & entities elements contents & attributes are (a) SVG (b) DTD (c) STD (d) P3P 39. ________ is an optional step in processing XML (a) Validation (b) Parsing (c) Interpretation (d) Compilation 40. ________ may list items the documents does not use (a) DTD (b) XML-names (c) CDATA (d) PCDATA 41. A DTD never says about the ________ of an elements text content (a) length (b) structure (c) meaning (d) All of the above 42. #PCDATA, key wards stands for _____ (a) parsed character data (b) pre created data (c) pre counted data (d) None of the above XIX 43. _____ is everything in the XML document before the root element start tag (a) PCDATA (b) Prolog (c) CDATA (d) None of the above 44. Internal & External DTD subsets _____ override the element or attribute declarations the other makes (a) cannot (b) can (c) cannot say (d) sometimes allowed 45. Suffixes can be affixed to an element name in a content model to indicate (a) number of instances that element are expected (b) number of XML-names it can attached with (c) Both (a) and (b) (d) formatting 46. _____ can be combined in arbitrarily complex fashions to describe essentially any reasonable content model (a) choices (b) sequences (c) suffixes (d) All of the above 47. _____ provide much stranger data typing for attribute values such as URI’S prices and addresses that DTD’S that DTD’S have to lump together as CDATA (a) XML-names (b) XML-schema (c) Both (a) and (b) (d) Tags 48. Different attribute type exists in XML are _____ (a) ENTITY (b) ID (c) IDEF (d) All of the above 49. _____ is an interpreted flavor of Java, which means that the web browser interprets and executes each live in the script (a) VB-script (b) Java-swing (c) Java script (d) All of the above (3) SD3 50. Perl programs are not compiled, which is why they are called as _____ (a) interpreted (b) scripts (c) markup (d) None of the above 51. Which of the following file systems allows for both file and folder level permissions? (a) FAT (b) FAT16 (c) FAT32 (d) NTFS 52. Which of the following steps might be appropriate to harden your network system? (Select all that apply.) (a) Configure ACL settings on select servers (b) Configure your servers to have unused services disabled (c) Both (a) and (b) (d) Configure your servers to all run in promiscuous mode 53. You have added a new Web server to your network. Which of the following are sound practices when checking a Web server for security features? (Select all that apply.) (a) Check with the vendor for the latest security patches for the Web software (b) Check the Web Server for any additional unused services (c) Check the Internet for any reports of software vulnerabilities (d) All of the above 54. Which of the following is frequently used to send and receive text-based files and messages, including router configurations and ACL information? (a) File Transport Protocol (FTP) (b) Trivial File Transfer Protocol (TFTP) (c) Fast File Transfer Protocol (d) Trivial Transport Protocol XIX 55. Which of the following is considered a Directory Service? (a) Lightweight Directory Access Protocol (b) Heavyweight Directory Access Protocol (c) Hierarchical Directory Access Protocol (d) Local Directory Access Protocol 56. The non-linearities cause signal spreading in the frequency domain and generate ________ frequency (a) Inter domain (b) Inter modulation (c) Inter mode (d) All of the above 57. ____________ must be used with TDMA (a) Digital data (b) Digital modulation (c) Both (a) and (b) (d) Demodulation 58. Which of the following are true statements about Network Address Translation? (Select all that apply.) (a) Provides for private addressing ranges for internal network (b) Hides the true IP addresses of internal computer systems (c) Translates private IP addresses into registered Internet IP addresses (d) All of the above 59. Which of the following terms relates to sending an ICMP request to each IP address on a subnet and waiting for replies? (a) Port scanning (b) Echo scanning (c) Ping scanning (d) Node scanning 60. Your company receives Internet access through a network or gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? (a) DSL modem (b) A multi-homed firewall (c) VLAN (d) A router that acts both as a bridge and a router (4) SD3 61. Remember, routers work at the Network Layer of the International Standards Organization/Open Systems Interconnection (ISO/OSI) established sequence of OSI Layers. What is the correct and complete OSI sequence in order from user interface (Layer 7) to the delivery of binary bits (Layer 1)? (a) Physical Layer, Network Layer, Data Link Layer, Transport Layer, Session Layer, Presentation Layer, Application Layer (b) Application Layer, Presentation Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, Physical Layer (c) Application Layer, Physical Layer, Session Layer, Transport Layer, Network Layer, Data Link Layer, Presentation Layer (d) Physical Layer, Data Link Layer, Network Layer, Session Layer, Transport Layer, Presentation Layer, Application Layer 62. SMTP stands for (a) Send Mail Transfer Protocol (b) Send Mail Transport Party (c) Simple Mail Transfer Protocol (d) None of the above 63. The procedure name that should be used for most messages generating from mailing list, is _________ (a) First class (b) List (c) Bulk (d) Junk 64. Worthless e-mail that is possibly the output of program or a test message, will have the precedence name as (a) Bulk (b) Junk (c) List (d) First class XIX 65. The timeout event ________ gives the acknowledgement of the Mail command (a) Smail (b) Mail (c) Connect (d) Received 66. The results of a host status check is given by the timeout event_______ (a) Status (b) Hoststatus (c) Host (d) Helo 67. The send mail program Heet is used to handle the incoming mails vis UUCp is (a) Smail (b) Vmail (c) Smrch (d) Uucp 68. for ($count=1:$count<11:$count++) { print “cool\n” } gives result (a) print “cool” 11 times (b) print “cool” 10 times (c) gives error (d) None of the above 69. To get a portion of a string value we use (a) substr($value) (b) substring($value,start number,length) (c) substr($value,start number,length) (d) substring($value) 70. Contextual selector are merely strings of two or more simple selectors separated by? (a) White space (b) Underscore (c) Comma (d) Astrick (5)