Free IC3-3 Exam Braindumps (page: 15)

Page 14 of 36

Sam works as a Web Developer for McRobert Inc. He creates a Web site. He wants to include the following table in the Web site:
He writes the following HTML code to create the table:
1.<TABLE BORDER="1" WIDTH="500">
2.<TR>
3.
4.
5.</TR>
6.<TR>
7.<TD>
8.</TD>
9.<TD>
10.</TD>
11.<TD>
12.</TD>
13.</TR>
14.<TR>
15.<TD>
16.</TD>
17.<TD>
18.</TD>
19.<TD>
20.</TD>
21.</TR>
22.</TABLE>
Which of the following tags will Sam place at lines 3 and 4 to create the table?

  1. at line 3at line 4
  2. at line 4at line
  3. at line 3at line 4
  4. at line 3at line 4

Answer(s): A

Explanation:

The tag is used to specify each cell of the table. It can be used only within a row in a table. The ROWSPAN attribute of the tag specifies the number of rows that a cell spans over in a table. Since, the first cell of the table spans over three rows, Sam will use . specifies the number of columns that the head row contains.
Answer option B is incorrect. Placing the tags given in this option at lines 3 and 4 will create the following table: Answer options D and C are incorrect. There are no attributes such as SPAN and SPANWIDTH for the tag.



Which of the following languages are used for Web site development? Each correct answer represents a complete solution. Choose all that apply.

  1. JavaScript
  2. VBScript
  3. PHP
  4. Ajax E. HTML

Answer(s): A,B,C,D

Explanation:

HTML, which stands for Hyper Text Markup Language, is the predominant markup language for Web pages. It provides a means to create structured documents by denoting structural semantics for text such as headings, paragraphs, lists, links, quotes, and other items. It allows images and objects to be embedded and can be used to create interactive forms. It is written in the form of HTML elements consisting of 'tags' surrounded by angle brackets within the web page content. It can load scripts in languages such as JavaScript which affect the behavior of HTML Web pages. HTML can also be used to include Cascading Style Sheets (CSS) to define the appearance and layout of text and other material.
The W3C, maintainer of both HTML and CSS standards, encourages the use of CSS over explicit presentational markup. Ajax (Asynchronous JavaScript and XML) is a method of building interactive applications for the Web that process user requests immediately. Ajax combines several programming tools including JavaScript, dynamic HTML (DHTML), Extensible Markup Language (XML), cascading style sheets (CSS), the Document Object Model (DOM), and the Microsoft object, XMLHttpRequest. Ajax allows content on Web pages to update immediately when a user performs an action, unlike an HTTP request, during which users must wait for a whole new page to load. For example, a weather forecasting site could display local conditions on one side of the page without delay after a user types in a zip code. Google Maps is one well-known application that uses Ajax. PHP is a script language and interpreter that is freely available and used primarily on Linux Web servers. PHP is originally derived from Personal Home Page Tools and now it stands for Hypertext Preprocessor. PHP is an alternative to Microsoft's Active Server Page (ASP) technology. As with ASP, the PHP script is embedded within a Web page along with its HTML. Before the page is sent to a user that has requested it, the Web server calls PHP to interpret and performs the operations called for in the PHP script. An HTML page that includes a PHP script is typically given a file name suffix of .php, .php3, or .phtml. PHP is free and offered under an open source license. JavaScript is a language that is used to make the Web pages interactive. The user can send and receive information with the use of JavaScript objects. JavaScript can be used to create image rollovers and validating forms. It can also be used to open a new browser window. It is placed in the HTML code by using the <script>... </script> tag pair. It was developed by Netscape in conjunction with Sun Microsystems. VBScript (Visual Basic Scripting Edition) is an Active Scripting language developed by Microsoft that is modeled on Visual Basic.
It is designed as a 'lightweight' language with a fast interpreter for use in a wide variety of Microsoft environments. VBScript uses the Component Object Model to access the elements of the environment within which it is running; for example, the FileSystemObject (FSO) is used to create, read, update, and delete files.
A VBScript script must be executed within a host environment, of which there are several provided with Microsoft Windows, including: Windows Script Host (WSH), Internet Explorer (IE), and Internet Information Services (IIS). Additionally, the VBScript hosting environment is embeddable in other programs, through technologies, such as the Microsoft Script Control.



John works as an Office Assistant in DataSoft Inc. He has received an e-mail from duesoft_lotterygroup@us.com with the following message: The DueSoft Lottery IncorporationThis is to inform you that you have just won a prize of $7,500.00 for this year's Annual Lottery promotion, which was organized by Msn/Yahoo Lottery in conjunction with DueSoft. We collect active online e- mails and select five people every year as our winners through an electronic balloting machine. Please reply within three days of receiving this e-mail with your full details like Name, Address, Sex, Occupation, Age, State, Telephone number, and Country to claim your prize. If John replies to this e- mail, which of the following attacks may he become vulnerable to?

  1. Salami attack
  2. Man-in-the-Middle attack
  3. DoS attack
  4. Phishing attack

Answer(s): D

Explanation:

Phishing is a type of scam that entices a user to disclose personal information such as social security number, bank account details, or credit card number. An example of phishing attack is a fraudulent e-mail that appears to come from a user's bank asking to change his online banking password.
When the user clicks the link available on the e-mail, it directs him to a phishing site which replicates the original bank site. The phishing site lures the user to provide his personal information.
Answer option B is incorrect. Man-in-the-middle attacks occur when an attacker successfully inserts an intermediary software or program between two communicating hosts. The intermediary software or program allows attackers to listen to and modify the communication packets passing between the two hosts. The software intercepts the communication packets and then sends the information to the receiving host. The receiving host responds to the software, presuming it to be the legitimate client.
Answer option A is incorrect.
A salami attack is a series of minor attacks that collectively result in a larger attack. Computers are ideally suited to automating this type of attack. It is a form of cybercrime usually used for the purpose of committing financial crimes. In this type of attack, cybercriminals steal money or resources a bit at a time from financial accounts on a computer.
Answer option C is incorrect.
A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as a network saturation attack or bandwidth consumption attack. Attackers perform DoS attacks by sending a large number of protocol packets to the network. The effects of a DoS attack are as follows: Saturates network resourcesDisrupts connections between two computers, thereby preventing communications between servicesDisrupts services to a specific computerCauses failure to access a Web siteResults in an increase in the amount of spamA Denial-of-Service attack is very common on the Internet because it is much easier to accomplish. Most of the DoS attacks rely on the weaknesses in the TCP/IP protocol.



A protocol is a set of rules which is used by computers to communicate with each other across a network.
Which of the following are the key features of a protocol? Each correct answer represents a part of the solution. Choose three.

  1. Syntax
  2. Timing
  3. Semantics
  4. Statistics

Answer(s): A,B,C

Explanation:

A protocol is a set of rules which is used by computers to communicate with each other across a network.
A protocol is a convention or standard that controls or enables the connection, communication, and data transfer between computing endpoints. The key features of a protocol are as follows:Syntax:
This feature of the protocol is concerned about the format of the data blocks.Semantics:
It includes control information for error handling and coordination.Timing:
It includes sequencing and speed matching.






Post your Comments and Discuss Certiport IC3-3 exam with other Community members:

IC3-3 Exam Discussions & Posts