The Internet Database Environment A load-balancing approach where requests to one IP address are distributed among the multiple servers hosting the Website at the TCP/IP routing level is DNS (domain name server) balancing. True False True False ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment A server-side extension is needed to do what? Allow a request from a client to access the database. All of these Allow a request from a client to access Web pages. Allow a request from a client to access a HTML-formatted page. Allow a request from a client to access the database. All of these Allow a request from a client to access Web pages. Allow a request from a client to access a HTML-formatted page. ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Virus detection is a problem with encrypted messages, because the virus may not be detectable until the message is unencrypted. True False True False ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment An intrusion detection system does not perform which of the following? Set up deception systems that attempt to trap hackers. May transmit message packets to the correct destination. May monitor packets passing over the network. Tries to identify attempts to hack into a computer system. Set up deception systems that attempt to trap hackers. May transmit message packets to the correct destination. May monitor packets passing over the network. Tries to identify attempts to hack into a computer system. ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Websites without a database attached to them have which of the following characteristics? The inability to use a browser to display Web pages. The need to use TCP/IP as the network protocol. The ability to generate data via SQL. Static information using HTML or JavaScript. The inability to use a browser to display Web pages. The need to use TCP/IP as the network protocol. The ability to generate data via SQL. Static information using HTML or JavaScript. ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Web servers should be configured in which of the following ways? unauthorized access is unrestricted. unauthorized access is impossible. unauthorized access is restricted. unauthorized access is possible. unauthorized access is unrestricted. unauthorized access is impossible. unauthorized access is restricted. unauthorized access is possible. ANSWER DOWNLOAD EXAMIANS APP