Skip to content

Page397

  1. A database contains an entry with an empty primary key. Which database concept has been violated?
    A. Entity Integrity
    B. Normalization
    C. Referential Integrity
    D. Semantic Integrity

  2. Which vulnerability allows a third party to redirect static content within the security context of a trusted site?
    A. Cross-Site Request Forgery (CSRF)
    B. Cross-Site Scripting (XSS)
    C. PHP Remote File Inclusion (RFI)
    D. SQL Injection

  3. Which language allows CORBA (Common Object Request Broker Architecture) objects to communicate via a message interface?
    A. Distributed Component Object Model (DCOM)
    B. Interface Definition Language (IDL)
    C. Object Linking and Embedding (OLE)
    D. Object Management Guidelines (OMG)

  4. Which database high availability option allows multiple clients to access multiple database servers simultaneously?
    A. Database commit
    B. Database journal
    C. Replicated database
    D. Shadow database

  5. Which component of an expert system consists of “if/then” statements?
    A. Backward chaining
    B. Forward chaining
    C. Inference engine
    D. Knowledge base

Self-Test Quick Answer Key

  1. B
  2. C
  3. D
  4. A
  5. A
  6. D
  7. C
  8. A
  9. A
  10. A
  11. A
  12. A
  13. B
  14. C
  15. D