Zend 100-500 - Zend Framework Certification
Fill in the blank with the appropriate method name.
The________ method is used to check whether a date is valid or not.
Consider the PHP program (which includes a file specified by request):
$color = 'blue';
if (isset( $_GET['COLOR'] ) )
$color = $_GET['COLOR'];
require( $color . '.php' );
?>
A malicious user injects the following command:
/vulnerable.php?COLOR=C:\\notes.txt%00
where vulnerable.php is a remotely hosted file containing an exploit.
What does the malicious user want to do?
Which of the following clauses is used to specify a column or an array of columns by which to sort?
Which of the following functions can be used as a countermeasure to a Shell Injection attack?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following is used for separation of hierarchies in Zend_config_Ini file?
Maria writes a query that uses outer join between two tables. Which of the following operators are not allowed in the query?
Each correct answer represents a complete solution. Choose two.
Which of the following methods sends log data to a PHP stream?
Which of the following functions in SimpleXML can be used to return an iterator containing a list of all subnodes of the current node?
Which of the following is used to persist the content between view scripts and view instances?
Which of the following functions is the best choice to retrieve the fingerprint of a string?