Professional Documents
Culture Documents
1 Solutions For YXGO
1 Solutions For YXGO
a None
b None
c <ul>
d <ol>
e <dl>
f <list>
a /user
c /usr
d /home
e /tmp
f /etc
Q3: Which of the following statements are true about SQL injection attacks??
a None
d Usage of later versions of MySQL, validation, and explicit setting of the charset of
user input are valid measures to decrease vulnerability to SQL injections.
e SQL injections are not possible, if only emulated prepared statements are used.
Q4: How are functions in PHP which starts with __ (double underscore) known as??
a Magic Function
c None
d None
e Inbuilt Function
f Default Function
a docker ls service
b docker service ps
c None
d None
f docker service ls
a <input=checkbox>
b None
c <input type="checkbox">
d <checkbox>
e None
f <input checkbox>
a Specifies a context menu for an element. The menu appears when a user right-
clicks on the element
b Update content from the server
d Return the position of the first found occurrence of content inside a string
e None
f None
Q8: From which file does the command `free` takes it's information?
a /proc/freemem
b /dev/memfree
c /dev/meminfo
d /dev/freemem
e /proc/meminfo
f /proc/memfree
Q9: Volume mapping maps the host server's directory into the Docker container. The data
will remain in a safe and accessible place if you do which of the following??