A proxy server is used for which of the following?
A. To provide security against unauthorized users
B. To process client requests for Web pages
C. To process client requests for database access
D. To provide TCP/IP
Answer: Option A
Join The Discussion
Comments ( 2 )
An intrusion detection system does not perform which of the following?
A. Tries to identify attempts to hack into a computer system.
B. May monitor packets passing over the network.
C. May transmit message packets to the correct destination.
D. Set up deception systems that attempt to trap hackers.
Features of XML include which of the following?
A. The tags are used to describe the appearance of the content.
B. Addresses the structuring and manipulation of the data involved.
C. Governs the display of information in a Web browser.
D. All of the above.
What is Hypertext Transfer Protocol (HTTP)?
A. The protocol to copy files between computers
B. The transfer protocol to transfer Web pages to a browser
C. The database access protocol for SQL statements
D. The hardware/software protocol that limits access to company data
Which of the following is true concerning Web services standards?
A. Led by only one group.
B. Helped by cooperation between companies.
C. Not necessary at this time.
D. Important so that the web can flourish.
Plz iska explain hai kya. I mean dawa apatti ke liye..
Fishbone diagrams are drawn to