Menti Review Questions Flashcards

1
Q

Is HTML more of a WWW or Internet technology?
A. WWW
B. Internet

A

A. WWW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Is email more of a WWW or Internet technology?
A. WWW
B. Internet

A

B. Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is multiplayer Halo more of a WWW or Internet technology?
A. WWW
B. Internet

A

B. Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Is blogging more of a WWW or Internet technology?
A. WWW
B. Internet

A

A. WWW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is chat more of a WWW or Internet technology?
A. WWW
B. Internet

A

B. Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Are podcasts more of a WWW or Internet technology?
A. WWW
B. Internet

A

WWW and Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the biggest problem with IPv4?
A. Slow
B. Old
C. Not enough addresses
D. Not everyone has it

A

C. Not enough addresses
Only 32 bits of address space vs 128 bits supported by IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the biggest problem with IPv6?
A. Slow
B. Old
C. Not enough addresses
D. Not everyone has it

A

D. Not everyone has it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Internet is the global ___________________.
A. Network of computers
B. Network of networks
C. Network of pages

A

B. Network of networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Ethernet is used to connect ____________________.
A. Computers on network
B. Networks on internet
C. Web pages with hyperlinks

A

A. Computers on network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IPv4/IPv6 is used to connect ____________________.
A. Computers on network
B. Networks on internet
C. Web pages with hyperlinks

A

B. Networks on internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which one goes inside of the other?
A. IPv4/IPv6 packet inside of Ethernet packet
B. Ethernet packet inside of IPv4/IPv6 packet

A

A. IPv4/IPv6 packet inside of Ethernet packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS usually goes over (inside)?
A. UDP
B. TCP

A

A. UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

HTTP 1 usually goes over (inside)
A. UDP
B. TCP

A

B. TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TCP usually goes over (inside)?
A. UDP
B. IP
C. HTTP
D. DNS

A

B. IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNS can be slow because…
A. UDP is slow
B. IP is slow
C. Might need to contact multiple servers
D. It doesn’t use TCP

A

C. Might need to contact multiple servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The primary purpose of DNS is…
A. Sending websites
B. Uploading files
C. Interconnecting networks
D. Names to numbers

A

D. Names to numbers
DNS turns the name of a site into either an IPv4 or IPv6 address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The primary purpose of HTTP is…
A. Sending websites
B. Uploading files
C. Interconnecting networks
D. Names to numbers

A

A. Sending websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

First part of a URL (URI)?
A. fragment/argument
B. query
C. host
D. scheme/protocol
E. path
F. login

A

D. scheme/protocol
e.g. http, https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Second part of a URL (URI)?
A. fragment/argument
B. query
C. host
D. scheme/protocol
E. path
F. port

A

C. host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Third part of a URL (URI)?
A. fragment/argument
B. query
C. host
D. scheme/protocol
E. path
F. port

A

F. port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Fourth part of a URL (URI)?
A. fragment/argument
B. query
C. host
D. scheme/protocol
E. path
F. port

A

E. path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fifth part of a URL (URI)?
A. fragment/argument
B. query
C. host
D. scheme/protocol
E. path
F. port

A

B. query

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Last part of a URL (URI)?
A. fragment/argument
B. query
C. host
D. scheme/protocol
E. path
F. port

A

A. fragment/argument

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What separates the scheme from the host in a URL (URI)? A. ? B. @ C. / D. # E. : F. ://
F. ://
26
What separates the scheme and something else, for schemes that don't have a host? A. ? B. @ C. / D. # E. : F. ://
E. : The "something else" is referring to the port number
27
What separates the host from the port in a URL (URI)? A. ? B. @ C. / D. # E. : F. ://
E. :
28
What separates host/port and path of a URL (URI)? A. ? B. @ C. / D. # E. : F. ://
C. /
29
What separates the path and query of a URL (URI)? A. ? B. @ C. / D. # E. : F. ://
A. ?
30
What separates the path/query and fragment of a URL (URI)? A. ? B. @ C. / D. # E. : F. ://
D. #
31
Fix this URL: http://::1:8000/index.html
http://[::1]:8000/index.html
32
What (out of the options) is the scheme used for? A. specifying arguments such as what to search for B. changing to an alternate server on the same computer C. identifies the file, program, or database entry D. determines protocol E. jumping to a particular part of a page F. picks a computer to connect to
D. determines protocol
33
What (out of the options) is the host used for? A. specifying arguments such as what to search for B. changing to an alternate server on the same computer C. identifies the file, program, or database entry D. determines protocol E. jumping to a particular part of a page F. picks a computer to connect to
F. picks a computer to connect to
34
What (out of the options) is the port used for? A. specifying arguments such as what to search for B. changing to an alternate server on the same computer C. identifies the file, program, or database entry D. determines protocol E. jumping to a particular part of a page F. picks a computer to connect to
B. changing to an alternate server on the same computer
35
What (out of the options) is the path used for? A. specifying arguments such as what to search for B. changing to an alternate server on the same computer C. identifies the file, program, or database entry D. determines protocol E. jumping to a particular part of a page F. picks a computer to connect to
C. identifies the file, program, or database entry
36
What (out of the options) is the query used for? A. specifying arguments such as what to search for B. changing to an alternate server on the same computer C. identifies the file, program, or database entry D. determines protocol E. jumping to a particular part of a page F. picks a computer to connect to
A. specifying arguments such as what to search for
37
What (out of the options) is the fragment used for? A. specifying arguments such as what to search for B. changing to an alternate server on the same computer C. identifies the file, program, or database entry D. determines protocol E. jumping to a particular part of a page F. picks a computer to connect to
E. jumping to a particular part of a page
38
What usually separates query keys from query values? A. % B. ? C. # D. = E. : F. &
D. =
39
What usually separates query key-value pairs from each other? A. % B. ? C. # D. = E. : F. &
F. &
40
What is used to encode hex character values in URLs? A. % B. ? C. # D. = E. : F. &
A. %
41
What HTTP method can be used to avoid URL length limits? A. GET B. PUT C. POST D. DELETE E. HEAD F. OPTIONS
C. POST (by utilizing the request body which has a more generous limit than a URL)
42
What HTTP method is usually used to request webpage content? A. GET B. PUT C. POST D. DELETE E. HEAD F. OPTIONS
A. GET
43
What HTTP method is usually used to submit searches? A. GET B. PUT C. POST D. DELETE E. HEAD F. OPTIONS
A. GET
44
What HTTP method is usually used to submit username and password? A. GET B. PUT C. POST D. DELETE E. HEAD F. OPTIONS
C. POST
45
What is an advantage of HTTP 1? Choose all that apply: A. Easier to debug B. Faster C. Fewer Connections D. Universally implemented E. Easier to implement
A. Easier to debug D. Universally implemented E. Easier to implement
46
What is an advantage of HTTP 2/3? A. Easier to debug B. Faster C. Fewer Connections D. Universally implemented E. Easier to implement
B. Faster C. Fewer Connections
47
What is the most common HTTP method? A. GET B. DELETE C. POST D. PUT E. MKCOL F. OPTIONS
A. GET
48
Scenario: posting a video of your pet to Instagram. Which HTTP method is used here? A. GET B. DELETE C. POST D. PUT E. MKCOL F. OPTIONS
C. POST
49
Scenario: replacing a record in a database. Which HTTP method is used here? A. GET B. DELETE C. POST D. PUT E. MKCOL F. OPTIONS
D. PUT
50
Which HTTP method is used with application/x-www-form-urlencoded? A. GET B. DELETE C. POST D. PUT E. MKCOL F. OPTIONS
C. POST
51
Which HTTP method is used with multipart/form-data? A. GET B. DELETE C. POST D. PUT E. MKCOL F. OPTIONS
C. POST
52
application/x-www-form-urlencoded is better for? A. File uploads B. Short forms like login C. Getting around URL length limits D. Large amounts of data in a single value E. Web search (google, ddg) query
B. Short forms like login C. Getting around URL length limits
53
multipart/form-data is better for? A. File uploads B. Short forms like login C. Getting around URL length limits D. Large amounts of data in a single value E. Web search (google, ddg) query
A. File uploads D. Large amounts of data in a single value
54
What was the first web browser? A. Firefox B. Internet Explorer C. Edge D. Chrome/Chromium E. Safari F. Mosaic
F. Mosaic
55
Which web browser killed Mosaic? A. Firefox B. Internet Explorer C. Edge D. Chrome/Chromium E. Safari F. Netscape Navigator
F. Netscape Navigator
56
What web browser is based on Netscape? A. Firefox B. Internet Explorer C. Edge D. Chrome/Chromium E. Safari F. Netscape Navigator
A. Firefox
57
What web browsers want to say they're compatible with Netscape 5? A. Firefox B. Internet Explorer C. Edge D. Chrome/Chromium E. Safari
All choices given: Firefox, Internet Explorer, Edge, Chrome/Chromium, Safari
58
What web browser was based on KHTML (from KDE for Linux)? A. Firefox B. Internet Explorer C. Edge D. Chrome/Chromium E. Safari
E. Safari
59
What web browser was based on Safari? A. Firefox B. Internet Explorer C. Edge D. Chrome/Chromium E. Safari
D. Chrome/Chromium
60
What browser is this: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36 Edge/119.0.0.0 A. Firefox B. Internet Explorer C. Edge D. Chrome/Chromium E. Safari
C. Edge
61
What response code is used for sending the content of the index page? A. 200 B. 301 C. 303 D. 401 E. 404 F. 500
A. 200
62
What response code is used for asking the browser to use https instead of http? A. 200 B. 301 C. 303 D. 401 E. 404 F. 500
B. 301
63
What response code is returned by a script that handles login crashes? A. 200 B. 301 C. 303 D. 401 E. 404 F. 500
F. 500
64
What response code asks the browser to ask for login? A. 200 B. 301 C. 303 D. 401 E. 404 F. 500
D. 401
65
What response code prevents the following message: "In order to refresh we need to resend prompt"? A. 200 B. 301 C. 303 D. 401 E. 404 F. 500
C. 303
66
What response code is returned when no database record for a requested URI exists? A. 200 B. 301 C. 303 D. 401 E. 404 F. 500
E. 404
67
What response code is returned when a user needs to login using a HTML login page first? A. 200 B. 301 C. 303 D. 401 E. 404 F. 500
C. 303
68
What is the Authorization header used for? A. Speed B. Authentication C. Anti-Exploit D. Describing Content/Typing
B. Authentication
69
What is the Accept header used for? A. Speed B. Authentication C. Anti-Exploit D. Describing Content/Typing
D. Describing Content/Typing
70
What is the Access-Control-x-x header used for? A. Speed B. Authentication C. Anti-Exploit D. Describing Content/Typing
C. Anti-Exploit
71
What is the Cache-x header used for? A. Speed B. Authentication C. Anti-Exploit D. Describing Content/Typing
A. Speed
72
What is the Content-Disposition header used for? A. Speed B. Authentication C. Anti-Exploit D. Describing Content/Typing
D. Describing Content/Typing
73
What is the Cookie header used for? A. Speed B. Authentication C. Anti-Exploit D. Describing Content/Typing E. Tracking
B. Authentication E. Tracking
74
What is the If-x-x header used for? A. Speed B. Authentication C. Anti-Exploit D. Describing Content/Typing E. Tracking
A. Speed
75
What is the Origin header used for? A. Speed B. Authentication C. Anti-Exploit D. Describing Content/Typing E. Tracking
C. Anti-Exploit
76
What is the Range header used for? A. Speed B. Authentication C. Anti-Exploit D. Describing Content/Typing E. Tracking
A. Speed
77
What is the Referer header used for? A. Speed B. Authentication C. Anti-Exploit D. Describing Content/Typing E. Tracking
E. Tracking
78
What is the Sec-x header used for? A. Speed B. Authentication C. Anti-Exploit D. Describing Content/Typing E. Tracking
C. Anti-Exploit
79
What is the User-Agent header used for? A. Speed B. Authentication C. Anti-Exploit D. Describing Content/Typing E. Tracking
D. Describing Content/Typing E. Tracking
80
What is the Content-Security-Policy header used for? A. Speed B. Authentication C. Anti-Exploit D. Describing Content/Typing E. Tracking
C. Anti-Exploit
81
Which of these is required? A. Vary B. Date C. Allow D. Host E. X-Forwarded-For
D. Host
82
What is the correct way to start a modern HTML document? A. C.
C.
83
There is a void element "link" which specifies another URL that the current page needs. How should it be written? A. B. C.
B.
84
You made an element called "apple" that puts an apple on the page. How should its tag be written? A. B. C. D. You can't create "apple"
A.
85
You made a void tag called "banana" which specifies an "apple" HTML element you created. If it can have content inside, how should it be written? A. B. C. D. You can't create "banana"
D. You can't create "banana"
86
Which tag style is wrong but browsers will accept it anyway? A. B. C. D. All of these are correct HTML
C. Note: React components are formatted this way, but this is invalid HTML
87
What is the outermost tag? A. B. C.

D. E. F.
E.
88
What goes first inside? A. B. C.

D. E. F.
B.
89
What goes second inside? A. B. C.

D. E. F.
A.
90
Where does stuff that goes on the page go? A. B. C.

D. E. F.
A.
91
Where does metadata about the page go? A. B. C.

D. E. F.
B.
92
HTML or CSS? Indicating a chapter title
HTML
93
HTML or CSS? Making something bold
CSS
94
HTML or CSS? Making a hyperlink clickable
HTML
95
HTML or CSS? Marking some links as navigation
HTML
96
HTML or CSS? Making title nice and big
CSS
97
In Slashdot.org: News for Nerds Stuff that Matters what's the href? A. tag B. element C. item D. attribute
D. attribute
98
Which is selected by the CSS selector .banana A. B. C. D.
A.
99
Which is selected by CSS selector banana A. B. C. D.
B.
100
Which is selected by CSS selector #banana A. B. C. D.
C.
101
Which CSS selector selects the li of
  • x
(there may be multiple answers) A. section.ul.li B. ul #li C. section>ul>li D. section, ul, li E. section ul li F. section:ul:li
C. section>ul>li D. section, ul, li E. section ul li
102
Which CSS selector selects the li of
  • x
(choose the most specific selector that selects li) A. section.ul.li B. ul #li C. section>ul>li D. section, ul, li E. section ul li F. section:ul:li
C. section>ul>li
103
Which attribute of becomes the key? A. type B. value C. name D. form E. class F. id
C. name
104
Which attribute of becomes the value? A. type B. value C. name D. form E. class F. id
B. value
105
What is the key of a element if there is no name attribute? A. browser error popup B. browser error console C. form will not work D. runs javascript E. key value not sent F. sent anonymously
E. key value not sent
106
should be inside of? A.
B. C.
A.
107
In the HTML

x

the b is what relative to the p? A. parent B. child C. container D. subclass E. descendant
B. child E. descendant
108
In the HTML

  • x

the li is what relative to the p? A. parent B. child C. container D. subclass E. descendant
E. descendant
109
What CSS property makes bold? A. font-style B. font-face C. font-size D. font-weight E. font-variant
D. font-weight
110
What CSS property makes italics? A. font-style B. font-face C. font-size D. font-weight E. font-variant
A. font-style
111
A CSS px is equal to... A. one pixel B. 1/72 of an inch C. 1/96 of an inch D. the font size E. width of a 0 F. height of an x
C. 1/96 of an inch
112
A CSS ex is equal to... A. one pixel B. 1/72 of an inch C. 1/96 of an inch D. the font size E. width of a 0 F. height of an x
F. height of an x
113
A CSS ch is equal to... A. one pixel B. 1/72 of an inch C. 1/96 of an inch D. the font size E. width of a 0 F. height of an x
E. width of a 0
114
A CSS pt is equal to... A. one pixel B. 1/72 of an inch C. 1/96 of an inch D. the font size E. width of a 0 F. height of an x
B. 1/72 of an inch
115
A CSS em is equal to... A. one pixel B. 1/72 of an inch C. 1/96 of an inch D. the font size E. width of a 0 F. height of an x
D. the font size (e.g. 2em means 2 times the size of the current font)
116
In CSS, nothing is equal to... A. one pixel B. 1/72 of an inch C. 1/96 of an inch D. the font size E. width of a 0 F. height of an x
A. one pixel
117
Which is NOT a way to add JS to HTML? A. element event B. inline script element C. link element in head D. script element
C. link element in head
118
What is a closure? A. same as scope B. an anonymous function C. functions can see vars from when they were defined D. special kind of class method
C. functions can see vars from when they were defined
119
What should you put at the top of every JS file? A. let, const & var B. imports C. doctype D. use strict
D. use strict
120
Which one scopes variables to the enclosing block? A. let B. const C. var D. nothing before the variable declaration
A. let B. const
121
Which one scopes variables to the enclosing function? A. let B. const C. var D. nothing before the variable declaration
C. var
122
Which one scopes variables to global? A. let B. const C. var D. nothing before the variable declaration
D. nothing before the variable declaration
123
What is the following JS code used for: '' + someVar A. Nothing B. Cast to Boolean C. Cast to Number D. Cast to String E. Rounding to Integer F. Serialize
D. Cast to String
124
Identifiers in JS cannot... A. be words B. have underscores C. be keywords D. be properties E. have digits F. be unicode
C. be keywords
125
Methods in JS are... A. early binding B. late binding C. not bound unless .call() is used D. not bound unless .bind() is used
B. late binding (i.e. a function is not bound to anything unless it is explicitly called or the function is binded to a variable)
126
Methods in Python are... A. early binding B. late binding C. not bound unless .call() is used D. not bound unless .bind() is used
A. early binding
127
General numbers in JS are always... A. integers B. singles C. doubles D. integers or doubles depending on the operation
C. doubles
128
JS really likes to turn things into ______ when you least expect it? A. integers B. objects C. arrays D. strings E. errors F. null
D. strings
129
Which comparison should you use in JS? A. == B. === C. := D. .equals() E. <=> F. =
B. ===
130
What does !!someVar in JS used for? A. Doesn't do anything B. Cast to Boolean C. Cast to Number D. Cast to String E. Rounding to Integer F. Serialize
B. Cast to Boolean
131
Given !!someVar, it will be true if someVar is... A. 0 B. "" C. null D. undefined E. NaN F. []
F. []
132
In JS, what value is returned when going past the end of an array? A. Error! B. null C. false D. undefined E. NaN F. []
D. undefined
133
To loop over the values in an array in JS, we use: A. for (thing in array) B. for (thing of array) C. for (thing:array)
B. for (thing of array)
134
To loop over the properties of an object in JS, we use: A. for (thing in array) B. for (thing of array) C. for (thing:array)
A. for (thing in array)
135
Arrow functions are different from regular functions (i.e. function fn()) because they... A. are anonymous B. They aren't! They are the same! C. are pass-by-reference D. can access identifiers from closure E. get this from closure F. are faster
E. get this from closure
136
The DOM is what kind of data structure? A. Stack B. Queue C. Hash D. Tree
D. Tree
137
Everything in the DOM tree is a ________? A. Element B. Text C. Tag D. Point E. Vertex F. Node
F. Node
138
is represented in the DOM tree by __________? A. Element B. Text C. Tag D. Point E. Vertex F. JSON
A. Element
139
Actual words on the page are represented in the DOM tree by _____________? A. Element B. Text C. Tag D. Point E. Vertex F. JSON
B. Text
140
In JS, private fields are indicated by: A. Name begins with _ B. Name begins with # C. private keyword D. static keyword E. @private F. this
B. Name begins with #
141
In JS, static fields are indicated by: A. Name begins with _ B. Name begins with # C. private keyword D. static keyword E. @private F. this
D. static keyword
142
In JS, how can one get element that match a CSS selector? A. document.querySelector() B. document.getElementsBySelector() C. document.getElements()
A. document.querySelector()
143
In JS, how can one instantiate a new element in the DOM? A. document.createElement() B. document.insertAt(parent, element) C. parent.appendChild(element) D. document.addElementById(parent) E. element.someAttribute
A. document.createElement()
144
In JS, how can one attach an element inside another element? A. document.createElement() B. document.insertAt(parent, element) C. parent.appendChild(element) D. document.addElementById(parent) E. element.someAttribute
C. parent.appendChild(element)
145
In JS, how can one modify the style of an element? A. element.setStyle() B. document.setStyleById() C. parent.appendStyle() D. element.style
D. element.style
146
fetch() argument is a... A. Function B. Request C. Response D. Promise E. Headers F. Body
B. Request
147
fetch() returns... A. Function B. Request C. Response D. Promise E. Headers F. Body
D. Promise
148
promise.then() takes an argument... A. Function B. Request C. Response D. Promise E. Headers F. Body
A. Function
149
promise.then() returns... A. Function B. Request C. Response D. Promise E. Headers F. Body
D. Promise
150
fetch.then() takes... A. Function B. Request C. Response D. Promise E. Headers F. Body
A. Function
151
fetch.then() returns... A. Function B. Request C. Response D. Promise E. Headers F. Body
D. Promise
152
fetch.then() takes a function that takes... A. Function B. Request C. Response D. Promise E. Headers F. Body
C. Response E. Headers
153
fetch.then() takes a function that returns... A. Function B. Request C. Response D. Promise E. Headers F. Body
D. Promise F. Body
154
fetch.then().then() takes a function that takes... A. Function B. Request C. Response D. Promise E. Headers F. Body
F. Body
155
fetch.then().then() returns... A. Function B. Request C. Response D. Promise E. Headers F. Body
D. Promise
156
await can only be used in what kind of function? A. anonymous B. arrow C. promise D. async E. without loops
D. async
157
await(x) where x is an expression that returns a ____________ A. anonymous function B. arrow function C. promise D. async function
C. promise
158
await should be avoided inside a... A. anonymous function B. arrow function C. promise D. async function E. loop
E. loop
159
async functions return a... A. anonymous function B. arrow function C. promise D. async function E. iterator
C. promise
160
async function with return 1 resolves when... A. after return statement B. when its called C. after all functions D. after returned value resolves
A. after return statement
161
async function with "return somePromise" resolves when... A. after return statement B. when its called C. after all functions D. after returned value resolves
D. after returned value resolves
162
When is a request repeatable? A. doing it twice in a row doesn't change the effect B. the URL is valid for a long period of time (doesn't expire) C. when the results are split into multiple pages that must be requested
A. doing it twice in a row doesn't change the effect
163
When is a request stateless? A. able to be processed without knowing previous requests B. when the request doesn't contain any information about state C. similar to repeatable
A. able to be processed without knowing previous requests
164
When is a request cacheable? A. when there is a caching proxy layer B. when it includes the Cache-Control header C. when the response is known to not change for some period of time
C. when the response is known to not change for some period of time
165
In a stateless system, which end keeps track of whether someone is logged in (or not)? A. Server B. Client C. Proxy
B. Client
166
What is a potential disadvantage of REST? A. Reliability B. Scalability C. Caching D. Bandwidth E. Distribution
D. Bandwidth
167
In session-cookie auth, when does the session cookie get generated? A. Login: Correct username & password B. When database entry is set to not authenticated C. When database entry is set to authenticated D. Logout E. On any request
E. On any request
168
In session-cookie auth, what is a good response to attempting to access a private page by an unauthenticated user? A. 200 OK B. 301 Moved Permanently C. 302 Found D. 401 Unauthorized E. 403 Forbidden F. 503 Service Unavailable
C. 302 Found
169
In session-cookie auth, what is a good response to a successful login? A. 200 OK B. 301 Moved Permanently C. 303 See Other D. 401 Unauthorized E. 403 Forbidden F. 503 Service Unavailable
C. 303 See Other
170
How does JWT prevent tokens from being forged by the user? A. Database entry that user can't manipulate B. Cryptographic signature C. Keeping the state in special browser-protected storage D. Encrypted HTTPS connections
B. Cryptographic signature
171
True/False: REST with caching always decreases latency?
False
172
It's usually fastest to perform operations on the... A. Client B. Reverse Proxy Webserver C. Middleware Server D. Storage Server
A. Client
173
How does HTTP Basic prevent your password from being stolen? A. Cryptographic Signature B. Encryption C. Cryptographic Hash D. It doesn't
D. It doesn't
174
How does HTTP Digest prevent your password from being stolen? A. Cryptographic Signature B. Encryption C. Cryptographic Hash D. It doesn't
C. Cryptographic Hash
175
Why does HTTP Basic encode the username and password? A. Prevent "sessionjacking" B. Make sure the username and password was not corrupted during transfer C. HTTP 1 is a text based protocol, password can have any character D. It doesn't
C. HTTP 1 is a text based protocol, password can have any character
176
Scenario: Attackers modified server data so that when users clicked checkout they were taken to a fake website that stole their credit card. Which vulnerability is present in the scenario given? A. XSS (Cross-Site Scripting) B. RCE (Remote Code Execution) C. CSRF (Cross-Site Request Forgery) D. SSRF (Server-Side Request Forgery) E. DoS (Denial of Service)
A. XSS (Cross-Site Scripting)
177
Scenario: Attackers stole authorization info and submitted requests to TikTok that appeared to be coming from users, but wasn't really. Which vulnerability is present in the scenario given? A. XSS (Cross-Site Scripting) B. RCE (Remote Code Execution) C. CSRF (Cross-Site Request Forgery) D. SSRF (Server-Side Request Forgery) E. DoS (Denial of Service)
C. CSRF (Cross-Site Request Forgery)
178
Scenario: Server A only responds to server B. Attacker tricks B into making a request to A and returning the result over the web. B should only respond to A if both servers are rented by the same company. Which vulnerability is present in the scenario given? A. XSS (Cross-Site Scripting) B. RCE (Remote Code Execution) C. CSRF (Cross-Site Request Forgery) D. SSRF (Server-Side Request Forgery) E. DoS (Denial of Service)
D. SSRF (Server-Side Request Forgery)
179
Scenario: Attacker customized a social media profile with JS that would cause anyone visiting the profile to automatically add them as a friend. Which vulnerability is present in the scenario given? A. XSS (Cross-Site Scripting) B. RCE (Remote Code Execution) C. CSRF (Cross-Site Request Forgery) D. SSRF (Server-Side Request Forgery) E. DoS (Denial of Service)
A. XSS (Cross-Site Scripting)
180
Scenario: Attacker makes a request with a special path, server uses log4j to log request paths, special string in log4j can run any code. Which vulnerability is present in the scenario given? A. XSS (Cross-Site Scripting) B. RCE (Remote Code Execution) C. CSRF (Cross-Site Request Forgery) D. SSRF (Server-Side Request Forgery) E. DoS (Denial of Service)
B. RCE (Remote Code Execution)
181
Scenario: Attackers used a flaw in Perl's implementation of hashes (dicts) to make access to data O(2^n) and webservers use up all CPU. Which vulnerability is present in the scenario given? A. XSS (Cross-Site Scripting) B. RCE (Remote Code Execution) C. CSRF (Cross-Site Request Forgery) D. SSRF (Server-Side Request Forgery) E. DoS (Denial of Service)
E. DoS (Denial of Service)
182
Scenario: Attacker modifies a legitimate cookie to indicate authorized access to paid content they haven't paid for. Which vulnerability is present in the scenario given? A. XSS (Cross-Site Scripting) B. RCE (Remote Code Execution) C. CSRF (Cross-Site Request Forgery) D. SSRF (Server-Side Request Forgery) E. DoS (Denial of Service)
C. CSRF (Cross-Site Request Forgery)
183
Changing program arguments (exec, system, subprocess, ...) with variables can lead to... A. Server-side CSRF B. Client-side CSRF C. Path traversal D. SQL Injection E. RCE by Shell Injection F. DoS (Denial of Service)
E. RCE by Shell Injection
184
Allowing very large uploads can lead to... A. Server-side CSRF B. Client-side CSRF C. Path traversal D. SQL Injection E. RCE by Shell Injection F. DoS (Denial of Service)
F. DoS (Denial of Service)
185
Poorly written in-browser JS code can lead to... A. Server-side CSRF B. Client-side CSRF C. Path traversal D. SQL Injection E. RCE by Shell Injection F. DoS (Denial of Service)
B. Client-side CSRF
186
Not filtering and validating the path component of a URL can lead to... A. Server-side CSRF B. Client-side CSRF C. Path traversal D. SQL Injection E. RCE by Shell Injection F. DoS (Denial of Service)
C. Path traversal
187
Using templates to form database queries can lead to... A. Server-side CSRF B. Client-side CSRF C. Path traversal D. SQL Injection E. RCE by Shell Injection F. DoS (Denial of Service)
D. SQL Injection
188
Stolen cookies may lead to... A. Server-side CSRF B. Client-side CSRF C. Path traversal D. SQL Injection E. RCE by Shell Injection F. DoS (Denial of Service)
A. Server-side CSRF
189
When dealing with a human that needs to log in we should respond with a... A. 100 Continue B. 200 OK C. 303 See Other D. 401 Unauthorized E. 514 Login Required
C. 303 See Other
190
When dealing with a machine that needs to log in, we should respond with a... A. 100 Continue B. 200 OK C. 303 See Other D. 401 Unauthorized E. 514 Login Required
D. 401 Unauthorized
191
When responding to a POST request from a browser (not AJAX), we should respond with a... A. 100 Continue B. 200 OK C. 303 See Other D. 401 Unauthorized E. 514 Login Required
C. 303 See Other
192
When responding to a POST request from a script (not AJAX), we should respond with a... A. 100 Continue B. 200 OK C. 303 See Other D. 401 Unauthorized E. 514 Login Required
B. 200 OK
193
What protocol does TLS work inside of (on top of)? A. Ethernet B. IP C. TCP/UDP D. HTTP(S) E. HTML
C. TCP/UDP
194
What protocol goes inside of (on top of) TLS? A. Ethernet B. IP C. TCP/UDP D. HTTP(S) E. HTML
D. HTTP(S)
195
What is the current version of TLS? A. SSL B. TLS 1.0 C. TLS 1.1 D. TLS 1.2 E. TLS 1.3 F. TLS 1.4
E. TLS 1.3
196
When someone says "encryption", they are usually referring to providing... A. Identity B. Privacy C. Authenticity
B. Privacy
197
Which core principle of TLS does ensuring messages aren't repeated correspond with? A. Identity B. Privacy C. Authenticity
C. Authenticity
198
Which core principle of TLS does ensuring you're actually talking to who you think you're taking to correspond with? A. Identity B. Privacy C. Authenticity
A. Identity
199
A certificate is checked by the... A. Government B. Certificate Authority C. User Agent D. HTTP Server E. DNS Server F. Router
C. User Agent
200
A certificate is signed by the... A. Government B. Certificate Authority C. User Agent D. HTTP Server E. DNS Server F. Router
B. Certificate Authority
201
A signature is verified by combining it with the ___________ and _____________? (select two answers) A. Private Key B. Public Key C. Contents of the thing that was signed D. TLS protocol E. IP Address F. Certificate Authority
B. Public Key C. Contents of the thing that was signed
202
What is the most crucial part of the text of a signed certificate, apart from the signature? A. IP Address B. Ethernet Address C. Server version D. HTTP vs HTTPS E. Domain Name
E. Domain Name
203
How do you get the Certificate Authority's public key? A. DNS B. Browser/OS C. TCP/UDP D. HTTP E. Ethernet F. IP
B. Browser/OS
204
When should you optimize? A. never B. continuously C. early development D. late development E. between iterations F. when you have a performance problem
F. when you have a performance problem
205
When does ETag change? A. when content changes B. when there is a new request to the original server C. when there is a new request to a reverse proxy D. never
A. when content changes
206
When does Expires change? A. when content changes B. when there is a new request to the original server C. when there is a new request to a reverse proxy D. never
B. when there is a new request to the original server
207
When does Last-Modified change? A. when content changes B. when there is a new request to the original server C. when there is a new request to a reverse proxy D. never
A. when content changes
208
When does Age change? A. when content changes B. when there is a new request to the original server C. when there is a new request to a reverse proxy D. never
C. when there is a new request to a reverse proxy
209
ETag works with which request header for caching? A. If-None-Match B. If-Match C. If-Modified-Since
A. If-None-Match
210
Caching increases... A. Locality B. Round trips C. Latency D. Download size
A. Locality
211
Static content (content that never changes) should use what header? A. Expires: 60 B. Authorization: Basic ... C. Cache-Control: max-age=60 D. Cache-Control: public
D. Cache-Control: public
212
What is cache-busting? A. using ETag headers B. using http HEAD method C. putting a version # in the file name D. using Authorization header
C. putting a version # in the file name
213
DNS CNAME is similar to... A. HTTP 1xx B. HTTP 2xx C. HTTP 3xx D. HTTP 4xx E. HTTP 5xx
C. HTTP 3xx
214
Asynchronous loading helps reduce... A. Download size B. Bandwidth C. # of Requests D. Concurrency E. Round Trips F. Locality
E. Round Trips
215
Asynchronous loading loads things... A. one after the other B. slowly C. in parallel
C. in parallel
216
Which one has the best compression? A. GIF B. WebP C. AVIF D. JPEG
C. AVIF
217
What does the element do? A. same thing as B. groups multiple sources for the same image C. allows the user to draw a picture D. allows JS to draw a picture E. enables AVIF
B. groups multiple sources for the same image
218
What is the worst HTTP method for performance? A. GET B. HEAD C. POST D. PUT E. DELETE F. PATCH
C. POST
219
What is the best HTTP method for performance? A. GET B. HEAD C. POST D. PUT E. DELETE F. PATCH
B. HEAD
220
Which came first? A. Multiple script tags B. CommonJS C. ES Modules
A. Multiple script tags
221
Which came second? A. Multiple script tags B. CommonJS C. ES Modules
B. CommonJS
222
Which of the following is used in the browser? A. Multiple script tags B. CommonJS C. ES Modules
A. Multiple script tags C. ES Modules
223
Which is used mostly for Node servers? A. Multiple script tags B. CommonJS C. ES Modules
B. CommonJS
224
Which has the best async support? A. Multiple script tags B. CommonJS C. ES Modules
C. ES Modules
225
Websockets communications come in big units called... A. messages B. packets C. frames
A. messages
226
Messages are broken into smaller units called... A. messages B. packets C. frames
C. frames
227
Websocket frames can send... A. binary B. text C. binary or text
C. binary or text
228
Text frames are encoded with... A. UTF-8 B. ISO 8859-1 C. CP 457
A. UTF-8
229
Why do websockets scramble the data sent over? A. to slow down the connection B. to make sure the data stays correct C. authentication D. avoid confusing old proxies and servers
D. avoid confusing old proxies and servers
230
True/False: Multiple websocket messages can be transferred at once
True
231
Which side must initially connect the websocket? A. Client B. Server C. Proxy
A. Client
232
Full duplex means... A. there's two ends in a communication B. each connection is split into priority and normal traffic C. both sides can talk at the same time
C. both sides can talk at the same time
233
Which of these is NOT full duplex? A. TCP B. UDP C. QUIC D. HTTP 1 E. HTTP 2 & 3 F. Websockets
D. HTTP 1