Which is the most powerful authentication method among the four?
A. Hard-coding a login pair directly into the script
B. File-based authentication
C. Data-based authentication
D. PEAR’S HTTP authentication
Answer: Option C
Solution(By Examveda Team)
It not only enhances administrative convenience and scalability, but also can be integrated into a larger database infrastructure.Related Questions on HTML Forms Handling
Which two predefined variables are used to retrieve information from forms?
A. $GET & $POST
B. $_GET & $_POST
C. $__GET & $__POST
D. GET & POST
A. basic sql injection
B. advanced sql injection
C. cross-site scripting
D. scripting
When you use the $_GET variable to collect data, the data is visible to.
A. none
B. only you
C. everyone
D. selected few
When you use the $_POST variable to collect data, the data is visible to.
A. none
B. only you
C. everyone
D. selected few
Join The Discussion