The Internet Database Environment A server-side extension is needed to do what? Allow a request from a client to access the database. Allow a request from a client to access a HTML-formatted page. Allow a request from a client to access Web pages. All of these Allow a request from a client to access the database. Allow a request from a client to access a HTML-formatted page. Allow a request from a client to access Web pages. All of these ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Websites without a database attached to them have which of the following characteristics? The need to use TCP/IP as the network protocol. The inability to use a browser to display Web pages. The ability to generate data via SQL. Static information using HTML or JavaScript. The need to use TCP/IP as the network protocol. The inability to use a browser to display Web pages. The ability to generate data via SQL. Static information using HTML or JavaScript. ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Web servers should be configured in which of the following ways? unauthorized access is restricted. unauthorized access is impossible. unauthorized access is possible. unauthorized access is unrestricted. unauthorized access is restricted. unauthorized access is impossible. unauthorized access is possible. unauthorized access is unrestricted. ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Which of the following is true concerning the standard network protocol for connecting a client to a Web or database server via the Internet? TCP is not needed but IP is needed. Both TCP and IP are needed. TCP is needed but IP is not needed. Neither TCP and IP are needed. TCP is not needed but IP is needed. Both TCP and IP are needed. TCP is needed but IP is not needed. Neither TCP and IP are needed. ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment An intrusion detection system does not perform which of the following? Tries to identify attempts to hack into a computer system. May monitor packets passing over the network. Set up deception systems that attempt to trap hackers. May transmit message packets to the correct destination. Tries to identify attempts to hack into a computer system. May monitor packets passing over the network. Set up deception systems that attempt to trap hackers. May transmit message packets to the correct destination. ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment A proxy server is used for which of the following? To process client requests for database access To process client requests for Web pages To provide TCP/IP To provide security against unauthorized users To process client requests for database access To process client requests for Web pages To provide TCP/IP To provide security against unauthorized users ANSWER DOWNLOAD EXAMIANS APP