InterviewSolution
This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Which of the following is a valid encryption technique?(a) Parallel key encryption(b) Public key encryption(c) Systematic key encryption(d) All of the mentionedThe question was asked in semester exam.The question is from Application Security in chapter Application Design and Development of RDBMS |
|
Answer» The correct option is (b) PUBLIC key ENCRYPTION |
|
| 2. |
A log of all changes to the application data is called as __________(a) Audit trail(b) Audit log(c) Audit lead(d) Data logI got this question by my college director while I was bunking the class.Origin of the question is Application Security topic in division Application Design and Development of RDBMS |
|
Answer» Correct CHOICE is (a) Audit trail |
|
| 3. |
What is the standard for exchanging authentication and authorization information between two different security domains?(a) SABM(b) STML(c) SPTA(d) SAMLThe question was asked in an interview for job.The query is from Application Security topic in portion Application Design and Development of RDBMS |
|
Answer» Correct choice is (d) SAML |
|
| 4. |
What are phishing attacks?(a) Users are forced to use a second server which causes the attack(b) Users are forced to divert to a fake site where the attack takes place(c) Users are fooled by similar GUI and data is extracted from them.(d) None of the mentionedI had been asked this question in a national level competition.The origin of the question is Application Security in chapter Application Design and Development of RDBMS |
|
Answer» Correct option is (c) USERS are fooled by similar GUI and data is extracted from them. |
|
| 5. |
What are man in the middle attacks?(a) Users are forced to use a second server which causes the attack(b) Users are forced to divert to a fake site where the attack takes place(c) Users are fooled by similar GUI and data is extracted from them.(d) None of the mentionedThe question was asked by my school principal while I was bunking the class.The query is from Application Security in portion Application Design and Development of RDBMS |
|
Answer» The correct option is (b) Users are forced to DIVERT to a fake site where the ATTACK takes place |
|
| 6. |
The system where two independent pieces of data are used to identify a user is called as ______(a) Two system authentication(b) ID password authentication(c) Two factor authentication(d) Multi data authenticationThe question was posed to me in an interview for job.This interesting question is from Application Security topic in division Application Design and Development of RDBMS |
|
Answer» Correct choice is (c) Two factor AUTHENTICATION |
|
| 7. |
State true or false: Password leakage is a major security problem(a) True(b) FalseI have been asked this question in an online quiz.My doubt is from Application Security in chapter Application Design and Development of RDBMS |
|
Answer» CORRECT option is (a) True To explain: PASSWORD leakage is a MAJOR security PROBLEM because the leaked password grants access to malicious VISITORS. |
|
| 8. |
The URL of the page that had the link that the user clicked to access the page is called as _____(a) Source(b) Linker(c) Leaker(d) ReferrerI had been asked this question by my college director while I was bunking the class.This interesting question is from Application Security in portion Application Design and Development of RDBMS |
|
Answer» Correct OPTION is (d) Referrer |
|
| 9. |
An attack on a website that stores and displays text to a user is known as ______ attack(a) SQL attack(b) XSS attack(c) XRP attack(d) None of the mentionedThe question was asked by my school principal while I was bunking the class.I need to ask this question from Application Security in chapter Application Design and Development of RDBMS |
|
Answer» Right CHOICE is (b) XSS attack |
|
| 10. |
If an attacker manages to get an application to execute an SQL query created by the attacker, then such attacks are called as _________(a) SQL attacks(b) SQL injection attacks(c) SQL usage attack(d) SQL destroyer attackThe question was posed to me during an interview.Origin of the question is Application Security topic in chapter Application Design and Development of RDBMS |
|
Answer» CORRECT option is (B) SQL injection attacks To explain: If an attacker manages to get an application to EXECUTE an SQL query created by the attacker, then such attacks are called as SQL injection attacks. |
|
| 11. |
Which of the following methods is used to reduce overhead?(a) Connection pooling(b) Parallel Processing(c) Caching Query Results at the server(d) All of the mentionedThe question was asked during a job interview.My question comes from Application Architectures in section Application Design and Development of RDBMS |
|
Answer» Right choice is (d) All of the mentioned |
|
| 12. |
What are report generators?(a) They are the tools to generate human readable reports from a database(b) They are the tools that generate reports on the statistics of the database usage(c) They are the tools that prevent database querying and instead they generate pie charts and graphs(d) None of the mentionedThe question was asked in unit test.I'm obligated to ask this question of Application Architectures topic in chapter Application Design and Development of RDBMS |
|
Answer» The correct option is (a) They are the TOOLS to generate human readable REPORTS from a database |
|
| 13. |
Which of the following is not a web application development framework feature?(a) An object oriented model(b) A declarative way of specifying a form with validation constraints(c) Creating mass servers for effective handling of data(d) A template scripting systemThe question was asked during an interview.I'm obligated to ask this question of Application Architectures in division Application Design and Development of RDBMS |
|
Answer» Correct ANSWER is (C) Creating mass SERVERS for effective handling of data |
|
| 14. |
Which of the following features does Rapid Application Development possess?(a) Provide a library of functions to generate UI elements(b) Provide drag and drop features in a n IDE(c) Auto generation of code for the user interface from a declarative specification(d) All of the mentionedThe question was posed to me in an interview for internship.This is a very interesting question from Application Architectures in section Application Design and Development of RDBMS |
|
Answer» Right answer is (d) All of the mentioned |
|
| 15. |
What is the full form of JSON?(a) JavaScript Object Native(b) JavaScript Object Notation(c) JavaScript Object Negation(d) Java Object NotationI had been asked this question in an internship interview.This is a very interesting question from Application Architectures topic in division Application Design and Development of RDBMS |
|
Answer» CORRECT OPTION is (b) JAVASCRIPT Object Notation The explanation: JSON – JavaScript Object Notation. This is an ENCODING for javascript objects. |
|
| 16. |
State true or false: The code implementing the actions in the business logic layer ensures that business rules are followed(a) True(b) FalseThis question was addressed to me in an online interview.I'd like to ask this question from Application Architectures topic in division Application Design and Development of RDBMS |
|
Answer» Right answer is (a) True |
|
| 17. |
What are workflows in a business logic layer?(a) They describe how a particular task that involves servers is handled(b) They describe how multiple tasks involving a single participant is handled(c) They describe how a particular task involving multiple participants is handled.(d) None of the mentionedThis question was addressed to me in semester exam.My query is from Application Architectures in division Application Design and Development of RDBMS |
|
Answer» Right choice is (c) They describe how a PARTICULAR task involving multiple participants is HANDLED. |
|
| 18. |
The _________ layer provides the interface between the business logic layer and the underlying database(a) Business-logic layer(b) Data access layer(c) Data transfer layer(d) Business manager layerThis question was addressed to me in a national level competition.This key question is from Application Architectures topic in section Application Design and Development of RDBMS |
|
Answer» Right ANSWER is (b) Data access layer |
|
| 19. |
The ___________ provides a high level view of data and actions on data(a) Business-logic layer(b) Data access layer(c) Data transfer layer(d) Business manager layerThis question was posed to me at a job interview.I'm obligated to ask this question of Application Architectures topic in division Application Design and Development of RDBMS |
|
Answer» Correct ANSWER is (a) Business-logic layer |
|
| 20. |
Which of the following is true regarding the model-view- controller architecture?(a) The model corresponds to the business logic layer(b) The view defines the presentation of data(c) The controller receives events, executes actions on the model and returns a view(d) All of the mentionedThis question was addressed to me in exam.This interesting question is from Application Architectures in division Application Design and Development of RDBMS |
|
Answer» The correct OPTION is (d) All of the mentioned |
|
| 21. |
State true or false: Executing programs at the client side is slower than executing programs on the server(a) True(b) FalseThis question was posed to me during an internship interview.This key question is from Servlets and JSP topic in portion Application Design and Development of RDBMS |
|
Answer» The correct ANSWER is (b) False |
|
| 22. |
What are client side scripting languages?(a) The languages designed to be executed on the client’s web browser(b) The languages designed to be executed on the server(c) The languages designed to reduce the amount of data costs incurred at the client end(d) The languages designed to be executed in multiple computers paralleled with each otherThe question was asked in quiz.I want to ask this question from Servlets and JSP in chapter Application Design and Development of RDBMS |
|
Answer» Correct choice is (a) The languages DESIGNED to be executed on the client’s web browser |
|
| 23. |
What are scripting languages?(a) The programming languages that pre decide the web page content(b) The programming languages that are simpler and offer same protection(c) The programming languages that trade off simplicity for protection.(d) None of the mentionedI got this question in an interview for job.I would like to ask this question from Servlets and JSP topic in division Application Design and Development of RDBMS |
|
Answer» Correct choice is (b) The PROGRAMMING LANGUAGES that are simpler and offer same protection |
|
| 24. |
Javascript is used to create dynamic webpages using technologies that are collectively called ________(a) Ajax(b) Thor(c) Dynamo(d) AchillesI had been asked this question at a job interview.My doubt stems from Servlets and JSP in chapter Application Design and Development of RDBMS |
|
Answer» The correct OPTION is (a) Ajax |
|
| 25. |
While using Javascript, the browser parses the HTML code into a tree like structure defined by a standard called ________(a) DOS(b) DOD(c) DOM(d) DONThe question was posed to me in an interview.This interesting question is from Servlets and JSP topic in portion Application Design and Development of RDBMS |
|
Answer» Right choice is (c) DOM |
|
| 26. |
What is the full form of JSP?(a) Java servlet program(b) Java server pages(c) Java server pages(d) Java server programI had been asked this question during an interview.The doubt is from Servlets and JSP in division Application Design and Development of RDBMS |
|
Answer» The CORRECT option is (B) Java server PAGES |
|
| 27. |
Which of the following application servers do not provide built in support for servlets?(a) Tomcat server(b) Glassfish(c) JBoss(d) None of the mentionedThe question was asked during an internship interview.My question is from Servlets and JSP in chapter Application Design and Development of RDBMS |
|
Answer» The CORRECT option is (d) None of the MENTIONED |
|
| 28. |
Which of these functions is not a part of the servlet lifecycle(a) Checking if an instance of servlet exists or not(b) Invoking the service method of the servlet(c) Shutting down the servlet(d) Pausing the servlet for a given period of time.I had been asked this question in an online quiz.This key question is from Servlets and JSP topic in division Application Design and Development of RDBMS |
|
Answer» Right choice is (d) Pausing the servlet for a GIVEN PERIOD of time. |
|
| 29. |
State true or false: Servlets are used to generate dynamic responses to HTTP requests.(a) True(b) FalseI had been asked this question by my school teacher while I was bunking the class.Asked question is from Servlets and JSP topic in section Application Design and Development of RDBMS |
|
Answer» The correct OPTION is (a) True |
|
| 30. |
The _______ specification defines an application programming interface for communication between the server and the application program(a) Java Servlet(b) JDBC(c) Java Applet(d) Java SwingThe question was posed to me in examination.This question is from Servlets and JSP topic in division Application Design and Development of RDBMS |
|
Answer» The CORRECT option is (a) JAVA Servlet |
|
| 31. |
What is the function of the cascading style sheet(a) Allows us to edit the HTML document(b) It is an IDE that allows us to write HTML codes more efficiently(c) It allows us to use the same style on multiple HTML documents(d) It acts as an intermediary to provide a variety of information servicesI have been asked this question in an international level competition.My enquiry is from Web Fundamentals topic in section Application Design and Development of RDBMS |
|
Answer» The correct choice is (c) It allows US to use the same style on multiple HTML documents |
|
| 32. |
Which of the following functions are done by a web server?(a) Accept requests from a web browser(b) Sends back results in HTML(c) Executes programs with arguments supplied by the user(d) All of the mentionedI had been asked this question in homework.Question is from Web Fundamentals in division Application Design and Development of RDBMS |
|
Answer» Correct answer is (d) All of the mentioned |
|
| 33. |
What is the full form of CGI?(a) Common graphics interface(b) Common gateway interface(c) Common gateway internet(d) Common gateway informationI had been asked this question during an online interview.This question is from Web Fundamentals topic in division Application Design and Development of RDBMS |
|
Answer» Correct option is (b) Common gateway INTERFACE |
|
| 34. |
State true or false: HTTP is connectionless(a) True(b) FalseI had been asked this question in homework.This interesting question is from Web Fundamentals in portion Application Design and Development of RDBMS |
|
Answer» The correct OPTION is (a) True |
|
| 35. |
The extra information of a site maintained at the client end is called as _______(a) Cookie(b) Password(c) History(d) SessionsI had been asked this question in examination.My doubt stems from Web Fundamentals topic in section Application Design and Development of RDBMS |
|
Answer» Correct choice is (a) COOKIE |
|
| 36. |
What is the use of CGI?(a) It specifies the path of data transfer(b) It specifies how the server communicates with the application programs(c) It charts out error handling procedures in case an error arises(d) None of the mentionedI have been asked this question in a job interview.This interesting question is from Web Fundamentals in chapter Application Design and Development of RDBMS |
|
Answer» Correct choice is (b) It SPECIFIES how the SERVER COMMUNICATES with the application PROGRAMS |
|
| 37. |
A ______ is a program running on the server which accepts requests from a browser and sends HTML documents(a) Web server(b) Web transmitter(c) Web intermediate(d) Web multitaskerI got this question in an international level competition.My question is from Web Fundamentals in division Application Design and Development of RDBMS |
|
Answer» RIGHT choice is (a) WEB server The explanation: A Web Server is a program running on the server which accepts requests from a browser and sends HTML DOCUMENTS. The browser and the web server communicate via HTTP. |
|
| 38. |
What is the full form of HTTP?(a) Hyper Text Trial Program(b) Hyper Text Transfer Protocol(c) Hyper Text Technology Protocol(d) Hyper Text Trial ProtocolThis question was posed to me during an interview for a job.This key question is from Web Fundamentals in section Application Design and Development of RDBMS |
|
Answer» Right option is (b) HYPER Text Transfer Protocol |
|
| 39. |
A ______ is a globally unique name for every document that can be accessed on the Web(a) ID(b) UCL(c) URL(d) UMLThis question was addressed to me in a national level competition.Asked question is from Web Fundamentals in division Application Design and Development of RDBMS |
|
Answer» The correct option is (c) URL |
|
| 40. |
Browsers use a standardized syntax called?(a) TCP/IP(b) HTML(c) XML(d) JavaThe question was asked in my homework.My enquiry is from Web Fundamentals topic in division Application Design and Development of RDBMS |
|
Answer» Right ANSWER is (B) HTML |
|