CIW Foundations Cert

Card Set Information

Author:
tedmonds
ID:
14411
Filename:
CIW Foundations Cert
Updated:
2010-04-28 13:01:34
Tags:
CIW Foundations Certification Web Development
Folders:

Description:
Study cards for CINS_157 exam
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user tedmonds on FreezingBlue Flashcards. What would you like to do?


  1. What is spyware?
    A. Software that opens an undocumented port on your server and allows attackers to control yoursystem
    B. Software that gathers information and relays it to outside parties
    C. Software that reports security holes to hackers
    D. Software that determines and reports improper software licensing
    B. Software that gathers information and relays it to outside parties
    (this multiple choice question has been scrambled)
  2. Each system in a TCP/IP network must be configured with an IP address and a subnet mask. Thesubnet mask identifies what parts of an IP address?

    A. Loopback and broadcast
    B. Network portion and host portion
    C. The number of bytes per field
    D. Source and destination
    Answer: B
  3. In XHTML, what is one of the functions of the <input> tag?

    A. To create a check box in a form
    B. To create a scrolling select list in a form
    C. To create a record in a database
    D. To create a data cell in a table
    Answer: A
  4. Three factors affect every project, and when one factor is adjusted, it affects the others. This relationship is known as the Project Triangle. What are the three factors in the Project Triangle?

    A. Gantt charts, tracking and documentation
    B. Testing, evaluating and controlling
    C. ROI, quality and stakeholders
    D. Time, money and scope
    D. Time, money and scope
    (this multiple choice question has been scrambled)
  5. Which of the following Web site maintenance functions helps ensure that users continue to visityour site?

    A. Changing page locations
    B. Clearing the cache
    C. Fixing dead links
    D. Moving links
    C. Fixing dead links
    (this multiple choice question has been scrambled)
  6. Which type of encryption uses a pair of keys, in which one key is used to encrypt information and the other key is used to decrypt that information?

    A. One-way encryption
    B. Asymmetric encryption
    C. Hash encryption
    D. Symmetric encryption
    B. Asymmetric encryption
    (this multiple choice question has been scrambled)
  7. Lo-An created her Web site using XHTML frames. She adds an inline frame into one of her existing frames. Which of the following will result?

    A. A floating frame that allows a separate document to be inserted in the page
    B. A page that will fail validation because it is not user-friendly
    C. A new borderless frame that appears in a separate pop-up browser window
    D. A page that will validate to XHTML 1.0 Strict standards
    • A. A floating frame that allows a separate document to be inserted in
    • the page
  8. In general, which choice lists the protocols that must be configured in order to send and receive email?

    A. POP3 and IMAP
    B. NNTP and IMAP
    C. SMTP and POP3
    D. HTTP and SMTP
    C. SMTP and POP3
    (this multiple choice question has been scrambled)
  9. Which of the following accurately describes a difference between a Java servlet and a PHP script?
    A. Servlets must be interpreted, whereas PHP scripts are only compiled.
    B. Servlets can be used only to communicate with databases, whereas PHP scripts can be used to provide additional features.
    C. Servlets must be compiled, whereas PHP scripts are only interpreted.
    D. PHP scripts can be used only to communicate with databases, whereas servlets can be used toprovide additional features.
    C. Servlets must be compiled, whereas PHP scripts are only interpreted.
    (this multiple choice question has been scrambled)
  10. Which layer of the Open Systems Interconnection reference model (OSI/RM) organizes transmitted information into datagrams or packets?
    A. Session layer
    B. Data link layer
    C. Network layer
    D. Application layer
    C. Network layer
    (this multiple choice question has been scrambled)
  11. What is an intranet?

    A. A searchable internal repository that stores an organization's proprietary documents
    B. A TCP/IP-based network accessible only by an organization's members and employees
    C. A TCP/IP-based network accessible only by an organization's internal employees and select external clients
    D. A worldwide network available to anyone who has a TCP/IP connection on a computer
    • B. A TCP/IP-based network accessible only by an organization's members
    • and employees
  12. The ICANN assigns your company the network address 206.57.26.0. What is the default subnetmask for this network?

    A. 255.255.255.255
    B. 255.255.0.0
    C. 255.255.255.0
    D. 255.0.0.0
    C. 255.255.255.0
    (this multiple choice question has been scrambled)
  13. You have two computers, each with a different operating system. One is a Linux system, which uses the GNU Public License (GPL). You can use this Linux software free of charge, and you can make changes to code that created the operating system. The other system is a Windows system. Which of the following describes a typical commercial software license?

    A. It allows you to make changes to the operating system code, but only if you agree not to redistribute the code.
    B. It allows you to use the software, but does not imply any penalties if you violate the license.
    C. It describes the steps you must first perform to install the system.
    D. It describes the right to use the software on a single computer.
    D. It describes the right to use the software on a single computer.
    (this multiple choice question has been scrambled)
  14. You are hosting a Web server in your office. Your ISP will provide connectivity. What do you need from your ISP in order to publish your site?

    A. Permissions to use CGI
    B. A DNS name or IP address
    C. Directory locations
    D. A user name and password
    B. A DNS name or IP address
    (this multiple choice question has been scrambled)
  15. You want to find information about Java. You visit a popular search engine and manually search through a directory tree of topics until you find a directory titled "Computers" and a subdirectory titled "Programming Languages." You select the topic "Java" and look through a list of indexed pages on that topic, then choose one page with which to begin your research. Which type ofsearch index did you use?

    A. Full-text index
    B. Keyword index
    C. Static index
    D. Boolean index
    C. Static index
    (this multiple choice question has been scrambled)
  16. What is a cookie?

    A. A file created by the browser each time its user accesses a Web site.
    B. A virus placed on a computer by spyware to delete directories.
    C. An image file that expands to fill a browser's cache.
    D. A text file placed on a client by a Web server to track user preferences
    • D. A text file placed on a client by a Web server to track user
    • preferences
  17. Which of the following eventually becomes a site map?
    A. A storyboard
    B. A stakeholder meeting
    C. A needs analysis
    D. A scope diagram
    A. A storyboard
    (this multiple choice question has been scrambled)
  18. Changes in project scope tend to occur:

    A. only in large corporate projects.
    B. only in software development projects.
    C. in large rather than small increments.
    D. in small rather than large increments.
    D. in small rather than large increments.
    (this multiple choice question has been scrambled)
  19. What is Dynamic Host Configuration Protocol (DHCP)?

    A. A protocol that allows a client and a server on the same host to communicate with each other
    B. A protocol that allows numerous subnetworks to exist within a network
    C. A protocol for assigning IP addresses to devices on a network
    D. The LAN access protocol used by Ethernet
    C. A protocol for assigning IP addresses to devices on a network
    (this multiple choice question has been scrambled)
  20. You need to register a domain name for the Web sites that will promote your company's new product in international markets. You decide to register several top-level domains, such as .ca, .au and .ae, in addition to the commonly used .com domain. Why would you do this?

    A. To make it easier for search engines to find your Web site
    B. To ensure that customers remember the spelling of your product name
    C. To appeal to the national identities of your customers
    D. To ensure that you can sell your product legally in various countries
    C. To appeal to the national identities of your customers
    (this multiple choice question has been scrambled)
  21. What is the primary purpose of the Domain Name System (DNS)?

    A. To determine the best route for data to travel between a client and a server
    B. To map easily recognizable names to specific Internet addresses
    C. To provide regular Internet access and e-mail service
    D. To allow users at one site to connect with a remote system at another site
    B. To map easily recognizable names to specific Internet addresses
    (this multiple choice question has been scrambled)
  22. Winston's computer has the IP address 192.168.23.115. Winston uses a direct connection to the Internet, but he cannot access any resources on the Internet. What is the most probable cause?
    A. 192.168.23.115 is a private IP address.
    B. 192.168.23.115 is a reserved address for Internet routers.
    C. 192.168.23.115 is a loopback address.
    D. 192.168.23.115 is a unique IP address.
    A. 192.168.23.115 is a private IP address.
    (this multiple choice question has been scrambled)
  23. In Cascading Style Sheets (CSS), which type of style sheet uses the @ ("at") symbol?

    A. Inline
    B. Imported
    C. Embedded
    D. Linked
    B. Imported
    (this multiple choice question has been scrambled)
  24. When creating its Web presence, a business should choose its domain name carefully so that users will be able to recall it easily. Every domain name is unique. With which of the following must each domain name be registered?

    A. W3C
    B. DNS
    C. ICANN
    D. FQDN
    C. ICANN
    (this multiple choice question has been scrambled)
  25. Your co-worker is not familiar with technical concepts. He asks you to explain Secure Shell (SSH) and the way it works. Which of the following is an appropriate and accurate explanation you can give to this non-technical person?

    A. SSH uses DSA and RSA to protect authentication information, and asymmetric-key encryption to provide data confidentiality.
    B. SSH uses a Telnet-like interface, public keys or standard authentication methods, and then symmetric keys.
    C. SSH uses RSA and public keys to authenticate and encrypt before you can defragment the hard drive.
    D. SSH allows you to gain secure access to a remote computer and then execute commands to control the system.
    D. SSH allows you to gain secure access to a remote computer and then execute commands to control the system.
    (this multiple choice question has been scrambled)
  26. Your manager has asked you about the essential difference between worms and viruses. Which of the following is true?

    A. A worm is self-replicating, whereas a virus requires some sort of user action.
    B. A virus can work only on Windows systems, whereas a worm can work on any commonplatform (e.g., Macintosh, UNIX, Windows).
    C. A worm can work only on Windows systems, whereas a virus can work on any commonplatform (e.g., Macintosh, UNIX, Windows).
    D. A virus is self-replicating, whereas a worm requires some sort of user action.
    A. A worm is self-replicating, whereas a virus requires some sort of user action.
    (this multiple choice question has been scrambled)
  27. What is the purpose of the <!DOCTYPE> statement in an XHTML document?

    A. To indicate that the XHTML code has been properly validated
    B. To specify the version of XHTML used in the document
    C. To enable pages to be automatically redirected
    D. To ensure strict compliance with CSS standards
    B. To specify the version of XHTML used in the document
    (this multiple choice question has been scrambled)
  28. Perl, .Net and PHP are all examples of:

    A. application programming interfaces.
    B. server-side scripting technologies.
    C. database technologies.
    D. client-side scripting technologies.
    B. server-side scripting technologies.
    (this multiple choice question has been scrambled)
  29. Which choice best defines Return On Investment (ROI)?

    A. Determining the profit of a Web project relative to cost
    B. Determining the benefits of a Web site to its intended users
    C. Determining the IT department's costs in developing a project
    D. Determining the cost of Web site development
    A. Determining the profit of a Web project relative to cost
    (this multiple choice question has been scrambled)
  30. Because the Internet has experienced tremendous growth, a new protocol has been developed to accommodate Internet address shortages. What is the name of this improved protocol?

    A. TCP/IPv2
    B. IPv6
    C. IPv2
    D. HTTPS
    B. IPv6
    (this multiple choice question has been scrambled)
  31. What is the purpose of the link attribute when used in the HTML <body> tag?

    A. It designates text that will act as a hyperlink on a Web page.
    B. It specifies the style sheet used to format a Web page.
    C. It determines the color of unvisited links on a Web page.
    D. It determines the color of visited links on a Web page.
    C. It determines the color of unvisited links on a Web page.
    (this multiple choice question has been scrambled)
  32. Which IP address class uses 8 bits for the network portion of the address and 24 bits for the hostportion of the address?

    A. Class C
    B. Class A
    C. Class B
    D. Class D
    B. Class A
    (this multiple choice question has been scrambled)
  33. Which e-commerce protocol is defined as the interorganization exchange of documents in standardized electronic form directly between participating computers?

    A. Electronic Data Interchange (EDI)
    B. Open Buying on the Internet (OBI)
    C. Secure Electronic Transactions (SET)
    D. Hypertext Transfer Protocol (HTTP)
    A. Electronic Data Interchange (EDI)
    (this multiple choice question has been scrambled)
  34. Sandi needs to format a Web site with 20 pages. She wants to use CSS to apply a style rule to the H3 selector on all pages in the site. What is the most efficient way for her to apply this formatting?

    A. With a heading-3 tag
    B. With an external style sheet
    C. With an embedded style
    D. With an inline style
    B. With an external style sheet
    (this multiple choice question has been scrambled)
  35. Which of the following is a way to limit access to a wireless Ethernet network?

    A. Configure the access point into ad-hoc mode
    B. Remove the access point's MAC address
    C. Enable MAC address filtering
    D. Enable Wireless Application Protocol
    C. Enable MAC address filtering
    (this multiple choice question has been scrambled)
  36. Which of the following allows multiple systems to communicate on a wireless network in infrastructure mode?

    A. A network access point (NAP)
    B. A wireless NIC
    C. A wireless access point (WAP)
    D. A switch
    C. A wireless access point (WAP)
    (this multiple choice question has been scrambled)
  37. Chris and his Web development team are beginning a Web site project. What is the first step in this project?

    A. Develop markup code and test functionality.
    B. Submit the site URL to search engines.
    C. Document the site's purpose and intended audience.
    D. Create a site map.
    C. Document the site's purpose and intended audience.
    (this multiple choice question has been scrambled)
  38. Rolf's Web site does not meet the W3C's Web Content Accessibility Guidelines (WCAG). To make his site more accessible according to WCAG, which change could he make?

    A. Create a text-only version of the site
    B. Add a disclaimer to the home page
    C. Remove all tables from site pages
    D. Add more images and decrease text
    A. Create a text-only version of the site
    (this multiple choice question has been scrambled)
  39. You have purchased some products from an online business. This business collected informationfrom you regarding your purchase, such as your name, e-mail address and product preferences.This online business then sold some information about you to a third party. This routine practice is an example of:

    A. a trademark issue.
    B. a copyright issue.
    C. a licensing concern.
    D. a privacy concern.
    D. a privacy concern.
    (this multiple choice question has been scrambled)
  40. Which choice lists the three basic elements that are required by all networks?

    A. Network services, clients, and servers
    B. Shared resources, hosts, and transmission protocols
    C. Clients, servers, and transmission media
    D. Protocols, transmission media, and network services
    D. Protocols, transmission media, and network services
    (this multiple choice question has been scrambled)
  41. Which tool is used to check a Windows system's hard drive after a crash?

    A. fsck
    B. chkdsk
    C. dump
    D. restore
    B. chkdsk
    (this multiple choice question has been scrambled)
  42. Which term is used to describe the amount of information, sometimes called traffic, that can be carried on a network at one time?

    A. Megabit
    B. Packet
    C. Kilobit
    D. Bandwidth
    D. Bandwidth
    (this multiple choice question has been scrambled)
  43. Lo-An creates a Web site that discusses Internet technologies. Her Web site pages use her own XHTML code and design template, and her original text, digital artwork and music. As you review Lo-An's site, you should assume that her copyright protection covers:

    A. all of the content presented on her Web site.
    B. the XHTML tags used in her page code.
    C. the color combinations used in her site design.
    D. the technology concepts that her site discusses.
    A. all of the content presented on her Web site.
    (this multiple choice question has been scrambled)
  44. You are using Cascading Style Sheets (CSS) to format your Web site. You created an external style sheet to apply the same look and feel to all your pages. Which tag will you use on each page to reference your external style sheet?

    A. <span>
    B. <body>
    C. <style>
    D. <link>
    D. <link>
    (this multiple choice question has been scrambled)
  45. Which basic network topology connects devices with multiple paths so that redundancies exist?

    A. Bus topology
    B. Mesh topology
    C. Star topology
    D. Ring topology
    B. Mesh topology
    (this multiple choice question has been scrambled)
  46. Mike has implemented an IP telephony system for his company. Employees now use this system for their telephone calls. Which of the following is true regarding Voice-over-IP (VoIP) telephone conversations?

    A. A dedicated, circuit-based network is used to convey the conversations.
    B. The conversations use wireless transmission media, not wired networks.
    C. The conversations use wired networks, not wireless transmission media.
    D. A packet-based network is used to convey the conversations.
    D. A packet-based network is used to convey the conversations.
    (this multiple choice question has been scrambled)
  47. Your wireless client cannot properly communicate with a wireless access point (WAP). Which of the following might need to be changed?

    A. The Service Set Identifier (SSID)
    B. The location of the router
    C. The Basic Service Set Identifier (BSSID)
    D. The wireless client's MAC address
    A. The Service Set Identifier (SSID)
    (this multiple choice question has been scrambled)
  48. Which IP address is called the loopback address, and can be used for testing and troubleshooting?

    A. 10.1.12.251
    B. 132.65.18.91
    C. 192.23.111.8
    D. 127.0.0.1
    D. 127.0.0.1
    (this multiple choice question has been scrambled)
  49. Which term describes a server at the highest level of the Domain Name System (DNS)?

    A. Master
    B. Top level
    C. Root level
    D. Primary
    C. Root level
    (this multiple choice question has been scrambled)
  50. Which choice lists the entities most often used to spread viruses?

    A. Removable disks and e-mail servers
    B. Computer files and DHCP servers
    C. End users and database servers
    D. Weak passwords and directory servers
    A. Removable disks and e-mail servers
    (this multiple choice question has been scrambled)
  51. Chris has decided to increase the cellspacing attribute value in his XHTML table. What is affectedby this change?

    A. The space between the table cells
    B. The size of the table
    C. The position of the table
    D. The space between cell text and cell border
    A.
    (this multiple choice question has been scrambled)
  52. In which process do two routers communicate to automatically calculate routes and to exchange information about routes of known networks?

    A. Dynamic routing
    B. Static routing
    C. Direct routing
    D. Interior routing
    A
  53. Which port does a Domain Name System (DNS) server use to listen for client queries?

    A. TCP port 25
    B. UDP port 53
    C. TCP port 80
    D. UDP port 21
    B.
    (this multiple choice question has been scrambled)
  54. Maria and her team are beginning to redesign a corporate Web site. The company owners want to keep the site's navigation icons at the top of each page, and enable linked pages to appear in another section of the same browser window. Which XHTML technique does Maria suggest?

    A. List elements <li> enclosed by <ol> container tags
    B. Pop-up JavaScript windows
    C. Frameset layout with upper and lower frames
    D. Navigation icons in the top row of a table page structure
    C.
    (this multiple choice question has been scrambled)
  55. Your supervisor directs you to make static IP address assignments on the workstations in your office. Your workstations are part of a company WAN that also connects directly to the Internet. What information must you have in order to complete this assignment?

    A. An IP address to be shared by all workstations, the default gateway address and the subnet mask
    B. An IP address for each workstation, the default gateway address and the subnet mask
    C. An IP address for each workstation and the subnet mask
    D. An IP address to be shared by all workstations and the subnet mask
    B.
    (this multiple choice question has been scrambled)
  56. Which markup language describes document content instead of adding structure or formatting to document content?

    A. HTML
    B. XHTML
    C. XML
    D. WML
    C.
    (this multiple choice question has been scrambled)
  57. You are the project manager in charge of a project to launch an e-commerce site. Over the course of the project, several unforeseen issues arose, and the team implemented additions that were not included in the original design specifications. The project was completed three months after the original deadline. Which of the following best describes this situation?

    A. The project experienced scope creep.
    B. The project quality control measures failed.
    C. The original project design specifications were wrong.
    D. The project was implemented according to plan.
    A.
    (this multiple choice question has been scrambled)
  58. Derek is creating an image map named "cityscape." In his XHTML code, what must he use as the usemap attribute value?

    A. "#cityscape"
    B. cityscape.gif
    C. cityscape
    D. "cityscape"
    A.
    (this multiple choice question has been scrambled)
  59. James created an XHTML table to show his schedule for each week of the month. He organized the table in a standard calendar format, so that each day from Sunday to Saturday is the header for a vertical column, and each week of days is displayed horizontally as a row. Each scheduled activity appears in the table cell appropriate for the day it occurs. James wants to merge two table cells into one cell to show the IT Business Conference that he will attend from Tuesday toWednesday in the third week. Which tag should James use for this merged cell?

    A. <td colspan=?? IT Business Conference </td>
    B. <th rowspan=?? IT Business Conference </th>
    C. <td rowspan=?? IT Business Conference </td>
    D. <table colspan=?? IT Business Conference </table>
    A.
    (this multiple choice question has been scrambled)
  60. In the client/server model, a client can access information from any server if:

    A. both the server and the LAN understand the protocol.
    B. both the client and server understand the protocol.
    C. both the client and the LAN understand the protocol.
    D. both the LAN and the WAN understand the protocol.
    B.
    (this multiple choice question has been scrambled)
  61. Which term describes the permission agreement that determines the way a vendor's software maybe used?

    A. License
    B. Protocol
    C. Trademark
    D. Copyright
    A.
    (this multiple choice question has been scrambled)
  62. Which practice will help ensure that you are using company systems and resources appropriately?

    A. Assume that only intended recipients will read your e-mail messages.
    B. Use your work computer to store personal data.
    C. Use your home computer to send personal e-mail messages.
    D. Install personal gaming software on corporate servers for after-hours use.
    C.
    (this multiple choice question has been scrambled)
  63. Maria wants to use Cascading Style Sheets (CSS) to apply formatting styles to her Web pages. In her style sheet, she sets the page's background color to blue and the font to Arial. Which style rule is correct in an external style sheet?

    A. style=body {background: blue; font: arial}
    B. body {background: blue; font-family: arial}
    C. body {bgcolor: blue; font-type: arial}
    D. <style=body {bgcolor: blue; font-family: arial}>
    B.
    (this multiple choice question has been scrambled)
  64. Which of the following is a contract used in project management that outlines the requirements for each project task to ensure that the project objectives are met?

    A. Statement of work (SOW)
    B. Return on Investment (ROI)
    C. Project triangle
    D. Organizational chart
    A.
    (this multiple choice question has been scrambled)
  65. Which choice lists computer peripheral port standards that require only one IRQ and are used to connect multiple high-speed devices?

    A. USB and PS/2
    B. USB and UART
    C. IEEE 1394 and IEEE 1284
    D. IEEE 1394 and USB
    D.
    (this multiple choice question has been scrambled)
  66. Which protocol is used to transmit files across the Web to be rendered by a Web browser?

    A. Transmission Control Protocol (TCP)
    B. Internet Protocol (IP)
    C. Hypertext Transfer Protocol (HTTP)
    D. Point-to-Point Tunneling Protocol (PPTP)
    C.
    (this multiple choice question has been scrambled)
  67. Which connection medium operates at a maximum speed of 44.736 Mbps?

    A. DSL
    B. T1
    C. T3
    D. ISDN
    C.
    (this multiple choice question has been scrambled)
  68. You are a help desk technician. An end user is experiencing a technical problem and does not know enough about the problem to describe it clearly. What should you do?

    A. Request additional specific information from the user so you can troubleshoot the problem and provide an appropriate solution.
    B. Explain to the user that until he can accurately describe the problem, you are unable to troubleshoot the system.
    C. Review the user's product manual with him to help him understand the technical issues.
    D. Inform the user that he needs to bring the system to you so you can assess the technical situation yourself.
    A.
    (this multiple choice question has been scrambled)
  69. Susan is a freelance Web developer and needs to set up a home office. She currently has 10 customers and transfers approximately 20 megabytes (MB) of data per day. Which is the most efficient Internet connection for Susan's needs?

    A. Cable modem
    B. T3 line
    C. Dial-up modem
    D. Ethernet cable
    A.
    (this multiple choice question has been scrambled)
  70. You are using a GUI HTML editor. You have decided to use this editor to publish the pages you create. Which choice lists the elements required to upload your files?

    A. A user name and password, a host name, and a destination directory
    B. A user name, a host name, a private key, and a destination directory
    C. A destination directory, a host name, and a private key
    D. A private key, a page name, and a user name
    A.
    (this multiple choice question has been scrambled)
  71. When you use an analog phone line and modem to initially connect to the Internet, which protocol are you using?

    A. Network News Transfer Protocol (NNTP)
    B. Hypertext Transfer Protocol (HTTP)
    C. Point-to-Point Protocol (PPP)
    D. Integrated Services Digital Network (ISDN)
    C.
    (this multiple choice question has been scrambled)
  72. You have been asked to determine the download time for pages on your site. One page consists of the XHTML document, several image files, and a Flash presentation. These elements equal 84 kilobytes (KB) total. How long will it take for this page to be downloaded by a user with an Internet connection speed of 33.6 kilobits per second (Kbps)?

    A. Approximately 5 seconds
    B. Approximately 15 seconds
    C. Approximately 20 seconds
    D. Approximately 55 seconds
    C.
    (this multiple choice question has been scrambled)
  73. As an IT professional, you must always consider the Return on Investment (ROI) impact that IT projects have on your organization. You may be required to justify a project's benefits relative to its cost. What must you do to relate such information about IT projects to upper managers?

    A. Make decisions without input from management so as not to confuse the managers or stakeholders.
    B. Consult only managers who have technical experience so that the project benefits will be fullyunderstood.
    C. Put the information in terms that your managers can understand so that they can make informed decisions.
    D. Explain decisions in purely technical terms to ensure that the issues are properly understood.
    C.
    (this multiple choice question has been scrambled)
  74. Which type of cable supports data transmission speeds of 10 gigabits per second (Gbps)?

    A. Category 3
    B. Category 6
    C. Category 5
    D. Category 5e
    B.
    (this multiple choice question has been scrambled)
  75. Which of the following is an example of a dial-up Internet connection?

    A. Cable modem
    B. ISDN
    C. DSL
    D. Fractional T1
    B.
    (this multiple choice question has been scrambled)
  76. James is traveling to several countries that use various electrical voltage and phone connections. He needs to use his computer to connect to the telephone network. Which choice lists the minimum components he requires?

    A. A new power supply and a jack adapter
    B. A power converter and a jack adapter
    C. A UPS and a jack adapter
    D. A UPS and a new power supply
    B.
    (this multiple choice question has been scrambled)
  77. Which common peripheral connection port can support up to 127 peripherals, and support speedsof up to 480 Kbps?

    A. Game Port
    B. USB 1.0
    C. FireWire
    D. USB 2.0
    D.
    (this multiple choice question has been scrambled)
  78. In addition to providing centralized wireless client access, a wireless access point (WAP) also has a type of connector that enables it to connect to a standard wired Ethernet network. Which type of connector does a WAP have?

    A. RJ-45
    B. BNC
    C. RJ-11
    D. RJ-48
    A.
    (this multiple choice question has been scrambled)
  79. Because the Internet has experienced tremendous growth, a new protocol has been developed to accommodate Internet address shortages. What is the name of this improved protocol?
    A. HTTPS
    B. IPv6
    C. TCP/IPv2
    D. IPv2
    B.
    (this multiple choice question has been scrambled)
  80. The TCP/IP suite of protocols is the current universal standard for both local area networks and wide area networks. Which choice lists protocols that are included in the TCP/IP suite?
    A. TCP, IP and SPX
    B. TCP, IP and IPX
    C. TCP, IP and NWLINK
    D. TCP, IP and UDP
    D.
    (this multiple choice question has been scrambled)
  81. Lisa has programmed her company's router to recognize several internal networks. Which job title best describes her responsibilities?

    A. Network engineer
    B. Server administrator
    C. Security manager
    D. Help desk technician
    A.
    (this multiple choice question has been scrambled)
  82. Your company is outsourcing some content development tasks. The contractors who work on these projects will see some of your company's proprietary content before it is available to customers. Your company needs to ensure that this trade-secret content is kept confidential by the contractors who see it. Which of the following protects your intellectual property in this situation?

    A. Copyright
    B. Non-disclosure agreement
    C. License agreement
    D. Trademark
    B.
    (this multiple choice question has been scrambled)
  83. Which of the following is absolutely necessary in order to connect to the Internet?

    A. TCP/IP
    B. A static IP address
    C. A network cable
    D. A VPN
    A.
    (this multiple choice question has been scrambled)
  84. Which protocol is most likely to be used when sending e-mail using the Microsoft Outlook Expressclient?

    A. SMTP
    B. IMAP
    C. HTTP
    D. POP3
    A.
    (this multiple choice question has been scrambled)
  85. Which TCP/IP configuration determines whether a destination address is local or remote?

    A. DNS
    B. IP address
    C. Subnet mask
    D. Default gateway
    C.
    (this multiple choice question has been scrambled)
  86. The Human Resources department needs to provide a variety of policy information to the company employees. Members of HR will configure and manage their own Web server in-house. This server will use Linux and Apache Server, and it will be part of the company intranet. Which of the following costs must be considered?

    A. The cost of a person to configure server hardware and software
    B. The cost of implementing a firewall
    C. The cost of licensing Apache Server
    D. The cost of customer support from an Application Service Provider (ASP)
    A.
    (this multiple choice question has been scrambled)
  87. Which technology could you use to add a pop-up dialog box to your Web site's home page?

    A. Extensible Markup Language (XML)
    B. Document Object Model (DOM)
    C. Image map
    D. JavaScript
    D.
    (this multiple choice question has been scrambled)
  88. The XHTML 1.0 Recommendation describes three variations or "flavors." Which of the following best describes the XHTML 1.0 Transitional flavor and its requirements?

    A. Developers must use Cascading Style Sheets (CSS) for all formatting.
    B. Developers can use either Cascading Style Sheets (CSS) or HTML 4.0-compliant markup tags for all formatting.
    C. Developers must use Cascading Style Sheets (CSS) for all formatting and use frames withXHTML 1.0-compliant markup tags.
    D. Developers can use any markup tags that were supported in HTML Recommendations 1.0 or later.
    B.
    (this multiple choice question has been scrambled)
  89. While troubleshooting her system's network access, Lisa can ping local and remote systems only by IP address. She has verified the IP configuration information on her system. She has determined that she has valid IP address, subnet mask, default gateway and DNS information. Which of the following is the source of this problem?

    A. DHCP server
    B. LDAP server
    C. Default gateway
    D. DNS server
    D.
    (this multiple choice question has been scrambled)
  90. Luis uses JavaScript code in his Web site's home page. The script notifies Microsoft Internet Explorer 5.0 users of a possible usability problem. What does this script do?

    A. Creates a variable and redirects users to another page
    B. Creates a cookie and redirects users to another page
    C. Performs client-side browser detection and creates a pop-up window alert
    D. Performs server-side browser detection and creates a pop-up window alert
    C.
    (this multiple choice question has been scrambled)
  91. Which choice lists the three image file formats that are universally supported by modern Web browsers?

    A. PNG, GIF and BMP
    B. BMP, TIFF and GIF
    C. GIF, JPEG and BMP
    D. GIF, JPEG and PNG
    D.
    (this multiple choice question has been scrambled)
  92. You and others have read an informal message written by your company's president. The message is not addressed to any particular group in the company, and it was not delivered to any specific person or group. However, the message is on a persistent medium, and cannot be changed by anyone but the company president. Which of the following have you most likely read?

    A. A blog
    B. A newsgroup
    C. An e-mail message
    D. An instant message
    A.
    (this multiple choice question has been scrambled)
  93. The Web-safe palette contains how many colors available for use in HTML documents?

    A. 216 Colors
    B. 16 Million Colors
    C. 32 Million Colors
    D. 256 Colors
    A.
    (this multiple choice question has been scrambled)
  94. Which of the following would you expect to occur during a Web site planning meeting?

    A. Training the marketing team to obtain demographic information
    B. Explaining the purpose of XHTML DTD to the Web development team
    C. Explaining branding issues to the Web development team
    D. Determining sales projections with the sales team
    C.
    (this multiple choice question has been scrambled)
  95. Which type of malware resides in active memory, consumes system resources and can selfreplicate?

    A. Trojan horse
    B. Illicit server
    C. Virus
    D. Worm
    D.
    (this multiple choice question has been scrambled)
  96. Which of the following is a protocol and command interface that can be used to gain secure access to a remote computer and then execute commands to administer the system?

    A. SSH
    B. FTPS
    C. HTTPS
    D. SSL
    A.
    (this multiple choice question has been scrambled)
  97. Which of the following accurately describes a difference between GIF images and JPEG images?

    A. GIF images support millions of colors, whereas JPEG images support only 256 colors.
    B. JPEG images use vector graphics, whereas GIF images use bitmap or raster graphics.
    C. JPEG images support interlacing and animation techniques, whereas GIF images do not.
    D. GIF images support the transparency technique, whereas JPEG images do not.
    D.
    (this multiple choice question has been scrambled)
  98. Which scenario describes a back-end issue that you must consider when developing a Web site?

    A. Your Web site contains a lot of images so it is visually exciting but it takes a long time todownload each page, even with high-speed
    B. Your site uses the most current design trends available, to present exciting content considered fashionable by your target audience.
    C. Your Web site is easy for users to navigate because it uses familiar conventions and contains no dead ends.
    D. Your home page presents a lot of small text explaining your company in detail, but no images and no colors other than black and white.
    A.
    (this multiple choice question has been scrambled)
  99. Which diagnostic tool would you use to determine the physical (MAC) address to systems that you have recently connected with?

    A. tracert
    B. arp
    C. netstat
    D. nbtstat
    B.
    (this multiple choice question has been scrambled)
  100. Which of the following is designed to help Personal Digital Assistant (PDA) devices communicate with each other, and also provides its own dedicated markup language?

    A. Infrared
    B. WAP
    C. Bluetooth
    D. WEP
    B.
    (this multiple choice question has been scrambled)
  101. Which protocol is used to receive e-mail on an incoming server, and allows you to browse and manage e-mail messages while they reside on the server, rather than downloading messages before reading them?

    A. Transmission Control Protocol/Internet Protocol (TCP/IP)
    B. Post Office Protocol (POP3)
    C. Simple Mail Transfer Protocol (SMTP)
    D. Internet Message Access Protocol (IMAP4)
    D.
    (this multiple choice question has been scrambled)
  102. Lo-An works as a Web designer for Restaurants Unlimited Inc., a distributor that supplies food to restaurants. Restaurants Unlimited's customers can now place orders through an online inventory system, which Lo-An and her team designed. Which type of network does this system use?

    A. Local area network
    B. Web conferencing network
    C. Extranet
    D. Intranet
    C.
    (this multiple choice question has been scrambled)
  103. Which of the following is the most efficient method for documenting and communicating a Web site plan?

    A. Posting a large diagram on the wall in a busy office hallway
    B. Describing the plan orally on stakeholders' voicemail
    C. Photocopying and faxing sketches
    D. Sending a presentation slideshow via e-mail
    D.
    (this multiple choice question has been scrambled)
  104. Chris works on the Web team for his company. He updates the company Web site at the IP address 12.42.192.73. On Chris's business cards, he uses the URL www.CIWcertified.com instead of the IP address for the company site. Which technology allows both the URL and the IPaddress to refer to the same Web site?

    A. Internet Service Provider (ISP)
    B. Network Access Point (NAP)
    C. Uniform Resource Identifier (URI)
    D. Domain Name System (DNS)
    D.
    (this multiple choice question has been scrambled)
  105. You are managing an IT project, and you need information about customer preferences. Which of the following stakeholders is best to provide this information?

    A. Marketing team
    B. Upper management
    C. Web development team
    D. Server administrators
    A.
    (this multiple choice question has been scrambled)
  106. Maria has filled all the memory space on her hard drive. She plans to obtain a larger hard drive in a month, but she needs some hard drive space now to finish a project. What can she do to free up some hard drive space?

    A. Run chkdsk.
    B. Compress the kernel.
    C. Delete temporary files.
    D. Remove the secondary partition.
    C,
  107. Which choice lists the elements that are necessary for a CGI session?

    A. Web browser, CGI script, Web form and Web server
    B. SSJS, CGI script, Web browser and database
    C. Web browser, Web form, SSJS and database
    D. Web form, database, Web browser and Web server
    A.
    (this multiple choice question has been scrambled)
  108. You received an e-mail message from a co-worker. It includes a .zip file as an attachment. The email message explains that the attachment updates a critical flaw in the operating system and provides detailed instructions for installing the program. Which step should you perform first?

    A. Download the same program from the Internet, then install it.
    B. Save the file to your desktop before opening it.
    C. Call the IT department and verify the nature of the attached file.
    D. Open the attached file, which is safe because the e-mail server would have deleted it if it were dangerous.
    C.
    (this multiple choice question has been scrambled)
  109. Which of the following is the most popular protocol that provides authentication and encryption for secure exchanges over the Internet?

    A. Secure Electronic Transactions (SET)
    B. Electronic Data Interchange (EDI)
    C. Public Key Infrastructure (PKI)
    D. Secure Sockets Layer (SSL)
    D.
    (this multiple choice question has been scrambled)
  110. As the marketing director for Hot Chocolates Inc., you want to distribute timely information to customers about your company's products. You want to send product announcements via e-mail to customers who are interested in receiving this information. Which is the best way to distribute this information?

    A. Post messages to a spam service
    B. Post messages to a newsgroup
    C. Post messages to a dedicated Web site
    D. Post messages to a mailing list server
    D.
    (this multiple choice question has been scrambled)
  111. Which of the following best describes the functionality of Extensible Markup Language (XML)?

    A. XML creates a language to define context in Web documents.
    B. XML creates dynamic Web documents with database connectivity.
    C. XML creates content validation in Web documents.
    D. XML creates static Web documents and describes visual layout.
    A.
    (this multiple choice question has been scrambled)
  112. You received the following file attachments in e-mail messages from unknown sources. Which is the most likely to contain a computer virus?

    A. file.exe
    B. file.pdf
    C. file.avi
    D. file.wav
    A.
    (this multiple choice question has been scrambled)
  113. When does a copyright become effective?

    A. When the original content is the focus of legal contention
    B. When the original content is created
    C. When the original content is registered in a UNESCO country
    D. When the original content is registered with the U.N. Copyright Office
    B.
    (this multiple choice question has been scrambled)
  114. A member of your Web team is gone on vacation. She made some changes to a Web page before leaving. You need information about the changes she made, but you cannot determine the changes without asking her. How can you resolve this problem in the future?

    A. Require team members to validate new code when making changes
    B. Require team members to provide evidence of efforts to ensure accessibility
    C. Require team members to update the Web site map before vacations
    D. Require team members to document changes with comment tags in code
    D.
    (this multiple choice question has been scrambled)
  115. Which device contains a transceiver, is responsible for transmitting and receiving only digital network signals, and can be attached to a workstation via various methods, including Universal Serial Bus (USB) and Peripheral Component Interconnect (PCI)?

    A. A modem
    B. A wireless access point (WAP)
    C. A network interface card (NIC)
    D. A hub
    C.
    (this multiple choice question has been scrambled)
  116. Which technology is used to create a table in a relational database?

    A. SQL
    B. PHP
    C. CGI
    D. ODBC
    A.
    (this multiple choice question has been scrambled)
  117. What is an intranet?

    A. A TCP/IP-based network accessible only by an organization's members and employees
    B. A worldwide network available to anyone who has a TCP/IP connection on a computer
    C. A searchable internal repository that stores an organization's proprietary documents
    D. A TCP/IP-based network accessible only by an organization's internal employees and select external clients
    A.
    (this multiple choice question has been scrambled)
  118. Mike wants to download the Macromedia Flash MX 2004 viewer software to his desktop. Which Internet protocol will he use?

    A. SSH
    B. SMTP
    C. FTP
    D. TCP
    C.
    (this multiple choice question has been scrambled)
  119. Angel is a member of the Web development team. She is responsible for developing the overall plan of the Web site. What is Angel's job role?

    A. Web designer
    B. Web manager
    C. Web architect
    D. Web analyst
    C.
    (this multiple choice question has been scrambled)
  120. Which of the following is the most popular protocol that provides authentication and encryption for secure exchanges over the Internet?

    A. Secure Sockets Layer (SSL)
    B. Public Key Infrastructure (PKI)
    C. Electronic Data Interchange (EDI)
    D. Secure Electronic Transactions (SET)
    A.
    (this multiple choice question has been scrambled)
  121. Which protocol is most likely to be used when sending e-mail using the Microsoft Outlook Express client?

    A. SMTP
    B. HTTP
    C. IMAP
    D. POP3
    A.
    (this multiple choice question has been scrambled)
  122. Mike is able to check his Web-based e-mail using his cell phone. Which protocol allows his cell phone to connect to the Internet?

    A. Multipurpose Internet Mail Extensions (MIME)
    B. Post Office Protocol (POP3)
    C. Wireless Access Point (WAP)
    D. Wireless Application Protocol (WAP)
    D.
    (this multiple choice question has been scrambled)
  123. You are using a GUI HTML editor to create Web pages for your site. What should you do to ensure that the pages render in the browser as expected?

    A. Insert images only when necessary.
    B. Use a code validator.
    C. Use tables.
    D. View the source code.
    B.
    (this multiple choice question has been scrambled)
  124. Which term describes the activity of a hacker who travels through a neighborhood or business district trying to discover unsecured wireless networks?

    A. System snooping
    B. Man in the middle
    C. War driving
    D. Connection hijacking
    C.
    (this multiple choice question has been scrambled)
  125. A company with a business-to-consumer Web site uses a service to securely transmit its customers' credit card information to the company's merchant bank. Which technology performs this function?

    A. Merchant authentication
    B. Secure Sockets Layer (SSL)
    C. Payment gateway
    D. Open Trading Protocol (OTP)
    C.
    (this multiple choice question has been scrambled)
  126. Which of the following is a junction between one high-speed network and another?

    A. Switch
    B. Network Access Point (NAP)
    C. Router
    D. Wide area network (WAN)
    B.
    (this multiple choice question has been scrambled)
  127. Which hardware device operates at the network layer of the OSI reference model?

    A. Router
    B. Hub
    C. Repeater
    D. Bridge
    A.
    (this multiple choice question has been scrambled)
  128. Lars has difficulty when he tries to access some Web pages. He suspects that his browser has a problem or a bug. Which of the following should he consider downloading?

    A. An anti-virus program
    B. A patch
    C. A firewall
    D. A pop-up blocker
    B.
    (this multiple choice question has been scrambled)
  129. Which choice lists connection types in the correct sequence by speed of transmission, from the slowest connection type to the fastest?

    A. Dial-up, DSL, E1, T1
    B. ISDN, dial-up, T1, fiber-optic
    C. Dial-up, ISDN, T1, E1
    D. Dial-up, ISDN, T1, DSL
    C.
    (this multiple choice question has been scrambled)
  130. Which type of server binds TCP to port 80 by default and listens for incoming requests from clients?

    A. Proxy server
    B. HTTP server
    C. Database server
    D. Mail server
    B.
    (this multiple choice question has been scrambled)
  131. Brian is a systems administrator for his company. He performs many maintenance and troubleshooting tasks in a room that has multiple, redundant connections. This room is used to control the company's network resources. What is the term for this location?

    A. Local area network (LAN)
    B. Peer to-peer (P2P) network
    C. Network operations center (NOC)
    D. Network access point (NAP)
    C.
    (this multiple choice question has been scrambled)
  132. Which XHTML container tag allows you to define regions in your browser window and assign separate files to each region?

    A. <frameset>
    B. <frame>
    C. <colspan>
    D. <noframes>
    A.
    (this multiple choice question has been scrambled)
  133. Which of the following is produced as the critical first step in the initiating phase of a project?

    A. Statement of work
    B. Project schedule
    C. Project triangle
    D. Needs analysis
    D.
    (this multiple choice question has been scrambled)
  134. You want to find information about Java. You visit a popular search engine and manually search through a directory tree of topics until you find a directory titled "Computers" and a subdirectory titled "Programming Languages." You select the topic "Java" and look through a list of indexed pages on that topic, then choose one page with which to begin your research. Which type of search index did you use?

    A. Static index
    B. Full-text index
    C. Keyword index
    D. Boolean index
    A.
    (this multiple choice question has been scrambled)
  135. What is the purpose of the traceroute command?

    A. It determines the path between a source system and a destination system.
    B. It displays and manually configures the routes in a routing table.
    C. It displays the IP address information for a NIC.
    D. It displays the ports that are active on a system.
    A.
    (this multiple choice question has been scrambled)
  136. Lisa is evaluating the design of a new site that her Web team is developing. Which of the following is a Web design concept that she should recommend as she evaluates this site?

    A. A page's text content needs to be relevant to the topic, but the images do not.
    B. The site's visual design is more important than validation of the site's code.
    C. The site should include a large variety of images and color combinations to enhance its
    D. Each page should have a coherent message and use common, easy-to-read fonts.
    D.
    (this multiple choice question has been scrambled)
  137. Which of the following is the best example of a client?

    A. A Web browser querying a database
    B. A workstation sharing a directory
    C. An FTP site receiving a file
    D. A database fulfilling a query
    A.
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview