ciw first

The flashcards below were created by user rkrouse on FreezingBlue Flashcards.

  1. QUESTION 1 You are creating a style sheet to format the pages on your company’s Web site. One section will have a black background with white text. What is the hexadecimal reference you would use to specify the text color for this portion of the Web page?
     A.      “white”
    B.      #000000
    C.      #FFFFFF
    D.      “255, 255, 255”
    Correct Answer: C
  2. Which of the following statements about virtualization is true?
     A. Virtualization enables multiple physical computers to run off of a single virtualized server.
    B. In virtualization, you run multiple virtual machines, provided they all use the same operating system.
    C. In virtualization, the operating systems of the virtual machines should match the host operating system.
    D. Virtualization enables you to run multiple operating systems and applications on a single computer.
    Correct Answer: D
  3. Which line of code instructs the browser to look for a directory named my site that begins one level higher than the page you are currently viewing?
     A. mysite/index.html
    B. /mysite/index.html
    C. . ./mysite/index.html
    Correct Answer: C
  4. A user is submitting data from a form on your Web page to a database using a CCI script. Which attribute of the form field elements organizes the user’s information into name=value pairs?  
    A.      Name
    B.      Form
    C.      Value
    D.      Method
    Correct Answer: A
  5. Which is the preferred approach to communicate important action items in an e-mail message to a co-worker?  
    A.        Write the action items using all capital letters.
    B.        List the action items in a numbered or bulleted list for clarity.
    C.        Include emoticons to ensure the recipient understands your humor.
    D.        Describe all action items at length in a detailed paragraph in the middle of the message.
    Correct Answer: B
  6. Digital signatures verify the integrity of the data, verify the identity of the sender, and:
    A.      Provide data confidentiality.
    B.      Enforce non-repudiation.
    C.      Sign digital certificate requests.
    D.      Create certificate requests.
    Correct Answer: B
  7. Gwen works for a small company where she has been asked to find a cost-effective option for providing comprehensive customer service. The finance, technical support, sales and customer service departments all need to share information about their customers. Gwen is considering adoption of a customer relationship management (CRM) application. Which of the following would be the most cost-effective solution?  
    A.      She can purchase a new server, then create and maintain the CRM in-house.
    B.      She can outsource all customer service so the company can focus on product development.
    C.      She can contract with a cloud service provider to host the CRM that her company’s employees can access.
    D.      She can hire a programmer to develop and maintain the CRM specific to her company’s needs, then have a service provider host the application.
    Correct Answer: C
  8. Which of the following is used to help non-technical users collectively classify and find information on a site?  
    A.      Tagging
    B.      A wiki
    C.      Web feed
    D.      Ajax
    Correct Answer: A
  9. Sally is a network technician at Acme Corporation. She has been directed to configure the network adapter for a company laptop so that it can be used to connect to the company network and the Internet. What is one of the required TCP/IP settings that she will need to configure?  
    A.      MAC address
    B.      Default gateway
    C.      Workstation name
    D.      Loopback address
    Correct Answer: B
  10. Web pages structured with which tag will fail W3C validation tests, no matter what standard is used?  
    A.      <div>
    B.      <table>
    C.      <header>
    D.      <aside>
    Correct Answer: B
  11. QUESTION 11 Consider the following address:  http://www.CIWcertified .com/Certifications/Web_Foundations/iba.php Which of the following is the best classification for the address?  
    A.      Fully qualified domain name
    B.      Virtual domain name
    C.      Relative URL
    D.      Deep URL
    Correct Answer: D
  12. Consider the following HTML5 code: The code does not validate as HTML5. Why?  
    A.      The <article> tag is missing.
    B.      The <meta> tag and its attributes are missing.
    C.      The <blockquote> tag should be used outside the <p> tags.
    D.      The DQCTYPE declaration is missing a reference to the Document Type Definition (DTD).
    Correct Answer: C
  13. You received a text and a threatening voicemail from an angry customer who wants to immediately discuss the shortcomings of a recently released product. You are about to walk into a mandatory meeting with your top-level leadership team. Which of the following is your best course of action?  
    A.        Continue to send text messages to the customer hoping to smooth things over until you can call him on the phone after your meeting.
    B.        Request that the customer send his complaints by e-mail, knowing that any inappropriate communication will be well documented.
    C.        Do not respond to the customer.
    D.        Skip the meeting and call the customer.
    Correct Answer: B
  14. Which of the following is a security threat commonly associated with cloud-based services?  
    A.      Malware
    B.      Phishing
    C.      Hypervisor vulnerabilities
    D.      Operating system vulnerabilities
    Correct Answer: C
  15. Configuring a wireless network involves several steps. Which of the following is a task that should be performed to configure and connect to a wireless network?  
    A.      Configure a certificate authority and configure the trust settings.
    B.      Configure the wireless AP’s SSID, encryption level and shared key.
    C.      Connect your computer to the same network hub as the wireless AP.
    D.      Connect your computer to the same network switch as the wireless AP.
    Correct Answer: B
  16. You are modifying an existing Web page that needs to validate as HTML5 code. To create a rectangular hot-spot in an image map that links to, which code would you nest inside the <map> </map> container tags?  
    A.      <area shape=“rectangle” coords=“7S. 0. 156. 75” href=“” alt=“xyz” />
    B.      <area shape=“rectangle” coords=“78, 0. 156, 75” href=“” alt=“xyz” />
    C.      <area shape=“rect” coords=“78, 0, 156. 75” href=“” alt=“xyz” />
    D.      <area shape=“rect” coords=“78. 0. 156, 75” href= />
    Correct Answer: C
  17. Which of the following strategies is recommended when conducting keyword searches?  
    A.      Use nouns instead of verbs for keywords.
    B.      Use verbs instead of nouns for keywords.
    C.      Use as few keywords as possible.
    D.      Include at least one preposition such as “the” or “an” in your list of keywords.
    Correct Answer: A
  18. Which of the following computer system maintenance tasks can help improve file access performance?  
    A.      Use a SCSI drive instead of a SATA drive
    B.      Use a SATA drive instead of an EIDE drive
    C.      Defragment the drive using the following command: fdisk -d -w c:/
    D.      Defragment the drive using the following command: defrag c: -w
    Correct Answer: D
  19. Acme Corp. is a small manufacturing company. To reduce IT infrastructure costs, it uses cloud-based services extensively and strives to have the least amount of IT equipment onsite. Last year, Acme suffered a failure that resulted in significant down time and data loss. Management has decided to implement a continuous data protection (CDP) solution. Which type of CDP solution best fits Acme’s situation?  
    A.      Cloud-only solution
    B.      Local systems solution
    C.      Distributed network services provider D.      Contracted network services provider
    Correct Answer: A
  20. To reduce the costs of maintaining servers with FTP access; your company is using P2P to facilitate sharing of information. Which strategy should your company use to protect the company’s sensitive information while capitalizing on the benefits of P2P power?  
    A.      Limit P2P use to sharing music files.
    B.      Restrict employees from using their computers in P2P communications.
    C.      Use technologies that will control access and password-protect files.
    D.      Restrict P2P use to sharing only with universities and research organizations
    Correct Answer: C
  21. Which type of attack involves the installation of malicious code on personal computers or servers that redirects Internet traffic from a legitimate Web site to an identical-looking but malicious imposter Web site?  
    A.      Pharming
    B.      Spoofing
    C.      Phishing
    D.      Replay
    Correct Answer: A
  22. Melanie works in the sales department at XYZ Company. She decides that her company’s marketing team has done a poor job representing the company’s brand. Without direction or permission, she starts her own social networking account to help. This account’s name is called XYZ Professional. To customize her page, she uses company logos and verbiage from the company Web site. She then begins communicating with customers and individuals interested in XYZ via this service. Which of the following would be the most appropriate response to Melanie’s actions by the company?  
    A.        Providing a link to Melanie’s page from the company’s official social networking account
    B.        Sending Melanie a request from the company’s Human Resources department to stop using company logos, yet allowing her to continue using this social networking account
    C.        Adding references to Melanie’s social networking page in the company’s internal newsletter
    D.        Terminating Melanie’s employment for copyright and trademark violation, with a cease-and-desist letter asking for control of the account
    Correct Answer: D
  23. When establishing a mobile presence, which of the following offers mobile-friendly content to the widest possible audience?  
    A.      Traditional Web sites
    B.      Mobile Web sites
    C.      Mobile apps
    D.      RSS feeds
    Correct Answer: B
  24. Which type of intellectual property includes business plans, proprietary code and sales contracts?  
    A.      Copy left
    B.      Copyright
    C.      Trademark
    D.      Trade secret
    Correct Answer: D
  25. To insert a graphic in a Web page and successfully validate the page as HTNL5, the <img> element must include:  
    A.      The id attribute
    B.      The alt attribute
    C.      The target attribute
    D.      The name attribute
    Correct Answer: B
  26. When developing a Web site, which of the following actions would be considered unethical?  
    A.      Borrowing music from another site with the owner’s written permission
    B.      Creating new code that provides a look and feel similar to another site
    C.      Linking your site to another site with permission
    D.      Copying some code from another Web site
    Correct Answer: D
  27. Which HTML element aligns content both horizontally and vertically to the center of the table cell by default?  
    A.      <tr>
    B.      <td>
    C.      <th>
    D.      <pre>
    Correct Answer: C
  28. QUESTION 28 Which of the following is a drawback to using Wired Equivalent Privacy (WEP)?  
    A.      Wireless network overhead is excessive.
    B.      Symmetric-key encryption is susceptible to cracking.
    C.      The number of devices that can communicate using WEP is limited.
    D.      Encryption and decryption speeds are slower compared to other protocols.
    Correct Answer: B
  29. You have volunteered to give a presentation to the parents at your child’s school about the dangers of the Internet. Which of the following would you include in your recommendations to parents?  
    A.      Warn children to never provide personal information over the Internet.
    B.      Direct parents to ask other users in the children’s chat rooms to provide identification.
    C.      Remind the parents that the anonymity of chat rooms provides security.
    D.      To reduce fear, claim that the threat of predators has been reduced in recent times.
    Correct Answer: A
  30. You have just been hired by a large company, and the IT manager is giving you an overview of the corporate network. He tells you that the corporation is spread out over several cities, and various departments are divided into sub networks that are connected using routers. What type of network are you being shown?  
    A.      Local area network (LAN)
    B.      Wide area network (WAN)
    C.      Virtual private network (VPN)
    D.      Internet Exchange Point (IPX)
    Correct Answer: B
  31. A friend has called you about a possible computer problem because her computer is acting strangely. Sounds play unexpectedly, the monitor turns off suddenly, the hard-drive light flashes constantly, the computer sometimes reboots itself without warning. When you inspect your friend’s system, you notice that several ports are open. Which of the following is most likely the cause of these symptoms?  
    A.      The computer has been infected with a polymorphic virus.
    B.      The computer is experiencing a denial-of-service attack.
    C.      The computer has been infected with an illicit server.
    D.      The computer has been infected by a worm.
    Correct Answer: C
  32. When a PC computer device wants to communicate with the processor, which system resource does it use?  
    A.      I/O
    B.      DMA
    C.      PIO
    D.      IRQ
    Correct Answer: D
  33. Marion is formatting a simple Web page. She has been asked to create headings before the first and third paragraphs. To accomplish this most efficiently, which type of HTML elements should Marion use?  
    A.      Text-level elements
    B.      Block quote elements
    C.      Fixed-width font elements
    D.      Paragraph-level elements
    Correct Answer: D
  34. You are developing a Web site in HTML5. You want the new HTML5 structural elements (such as <header> or <article>) to be styled consistently in all browsers. You must add a CSS rule that will change them to which element type, to ensure the site will render successfully?  
    A.      Inline
    B.      Script
    C.      Fixed
    D.      Block
    Correct Answer: D
  35. Server-based networks typically contain centralized network resources, which are usually not available on peer-to-peer (P2P) networks. Which of the following examples describes a server based network?  
    A.      Three network clients connecting to a file server
    B.      Downloading a file by using Bit Torrent technology
    C.      Sharing one or more files to another computer via the Internet
    D.      A client connecting to another computer over the Internet to share music
    Correct Answer: A
  36. Marion has been hired by a small business to determine why its Web site does not attract users. As Marion interviews different members of the company, she learns that when the site was first created, the external Web developer did not produce any documents specifying the basic requirements for the site. As a result, the site did not have a defined purpose and was not designed for the company’s audience. Additionally, the site navigation did not make sense from a user’s point of view. Marion considers this information, then she recommends that the company create which document?  
    A.      Wireframe
    B.      Storyboard
    C.      Marketing slideshow
    D.      Non-disclosure agreement
    Correct Answer: B
  37. Andrea works as an Administrative Assistant for a small business that uses an SaaS service for accounting, sales orders and customer service information about the business’s customers. This product is similar to and its competitors. Andrea makes sure she saves accurate records about current projects and performs regular backups of the business data stored on the cloud-based service. Which of the following is the primary reason for this practice?  
    A.        If there is an interruption in Internet access, the service and records would not be accessible.
    B.        There is a limit on the number of users who are allowed to access the cloud-based service at any one time.
    C.        Data stored online through the cloud-based service is more at risk to security breaches than if it were stored locally.
    D.        Andrea is overly cautious because it is well known that cloud-based services are highly secure, highly reliable and always available.
    Correct Answer: A
  38. You just started a small business and need to create a logo. Although you are technically savvy, your artistic creativity is limited. You decide to launch a contest to seek creative ideas for your logo. Using the Internet and social networking in this manner is known as: 
    A.      folksonomy
    B.      outsourcing
    C.      crowd sourcing
    D.      social engineering
    Correct Answer: C
  39. Which term describes a compact personal computer that relies on a touch screen for in put, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity?  
    A.      Tablet
    B.      Laptop
    C.      Netbook
    D.      Portable media player
    Correct Answer: A
  40. Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to the computer lab to give the final exam. As an alternative, he asked students to bring their own devices (BYOD) and connect to the college’s Wi-Fi for network access. What security risk is associated with this implementation?  
    A.      Inability for students to share files
    B.      Inability for students to back up user files
    C.      Student devices sending unsecured data
    D.      Student devices being more susceptible to malware
    Correct Answer: C
  41. You attend an online university that offers seminars on APA Style through its Writing Center. You registered for the seminar and learn that the training will be provided over the Web. Although there is no opportunity to ask questions, you find the live lecture to be engaging. Which Web based meeting format was used?  
    A.      Web conference
    B.      Video conference
    C.      Webinar
    D.      Blog
    Correct Answer: C
  42. You just received a joke that was c-mailed to you by a co-worker. You find the joke funny and consider forwarding it to another co-worker that you trust. Which human resources issue do you risk by forwarding the e-mail message?  
    A.      Forgetting to include others who might find the joke funny
    B.      Copyright infringement by not providing credit to the originator of the joke
    C.      Offending a recipient who receives the joke as a result from further forwarding
    D.      Reducing the effectiveness of spam filters
    Correct Answer: C
  43. You are expecting a very important file from a co-worker in a remote office to be sent to you through e-mail. You finally call the co-worker and tell him that you have not received the file. He informs you that he sent the file yesterday, but will send it again immediately. After some time, you still have not received his e-mail message. You contact the Technical Support department and ask them for help. After some investigation, Technical Support finds the e-mail from your coworker with an attachment named salesnumbers.exe in the spam folder of your e-mail client. What is the most likely reason that the e-mail message was filtered out?  
    A.      Messages from remote offices are blocked on internal e-mail.
    B.      The attachment’s file size exceeds the size limits of the e-mail filter policy.
    C.      File attachments with an .exe extension may contain malicious code.
    D.      The file name of the attached file exceeds the file name length of the filter policy.
    Correct Answer: C
  44. On your Windows laptop, you store all your vacation photos and your entire digital music library. Concerned about data loss, you perform frequent backups. Your laptop has recently been stolen and you need to restore your files to a desktop computer. Which Windows tool would you use to recover and set up the saved copies of your files onto your desktop computer?  
    A.      Backup and Restore
    B.      Backup Recovery
    C.      System Recovery
    D.      System Restore
    Correct Answer: A
  45. Selena has run out of memory on her phone’s SD card. She has decided to store the files she has accumulated on a third-party cloud service provider’s drives. Which of the following is a typical issue that she may encounter?  
    A.      The files become corrupted due to an attack from a hacker botnet.
    B.      The files become unavailable whenever Internet connectivity is lost.
    C.      The files become unavailable because they are being shared with other users.
    D.      The files become corrupted because the provider uses a proprietary compression algorithm during transit.
    Correct Answer: B
  46. Jose is experiencing performance problems with his notebook computer that he purchased a year ago. Upon discussing this issue with him, you learn that he has never deleted any temporary files since owning the device. What can Jose do to fix this problem most efficiently?  
    A.      Reformat his hard drive.
    B.      Use the Windows chkdsk utility.
    C.      Use the Windows Disk Cleanup utility.
    D.      Back up his computer and delete the active partition.
    Correct Answer: C
  47. An end user cannot log in to a page that provides an c-learning course. The authentication window will not launch. Which of the following is most likely the cause of this problem?
    A.      Pop-up blocking software has been enabled in the operating system.
    B.      The browser has recently had its cookie cache cleared.
    C.      The browser has recently had its browsing history cleared.
    D.      Pop-up blocking software has been enabled in the Web browser.
    Correct Answer: D
  48. During the initial meeting to plan a new Web site, whose input must be obtained?  
    A.      Shareholders
    B.      Stakeholders
    C.      Web developers
    D.      Graphic designers
    Correct Answer: B
  49. To ensure the maximum cross-browser compatibility and consistent functionality, Web developers should:  
    A.        test their pages in the most used release of each major Web browser.
    B.        test their pages in the most common browsers, including the most used and latest releases.
    C.        test their pages in only standards-compliant browsers, including the most used and latest releases.
    D.        test their pages in the Web browser most commonly used by the site audience, including the most used and latest release.
    Correct Answer: B
  50. Clyde is working on a Web page for his company’s intranet. He wants to insert an HTML comment within the page to let other developers know that the page validates as HTML5 and that he is the page author. Which line of code will insert the comment that Clyde requires?  
    A.      // Clyde Davis. 9/17/2012. This code validates to HTML5
    B.      <7 Clyde Davis. 9/17/2012. This code validates to HTMLS 7>
    C.      /* Clyde Davis, 9/17/2012. This code validates to HTML5 */
    D.      <!–Clyde Davis. 9/17/2012. This code validates to HTML5–>
    Correct Answer: D
  51. You have just finished designing a Web site to support a charity organization’s fund-raising efforts. You need to meet with the board members to get their feedback and address some questions before you implement the final design. The board members are dispersed throughout the country and want to avoid spending charity funds on traveling to this meeting. Which of the following solutions would best support the charity and provide you with an opportunity to discuss the design as a group?  
    A.        Plan a Web conference using a service such as WebEx or GoToMeeting that supports screensharing and phone conferencing.
    B.        Plan a Webinar that reviews the layout of the site and request that board members submit their feedback by e-mail after the Webinar.
    C.        Create a PowerPoint slideshow that contains pictures of your Web site design and create a survey to gather the board members’ feedback.
    D.        Create an audio Webcast and distribute it to the board members over the Internet.
    Correct Answer: A
  52. Patrick visits his teenage daughter’s social media page and discovers several offensive posts about one of her classmates. After speaking with his daughter, Patrick learns that several other girls in her class are upset with the classmate and have been posting, texting and e-mailing others about the girl. What is the best way for Patrick to help his daughter understand cyberbullying?  
    A.        He should advise his daughter to ignore the posts, texts and c-mails.
    B.        He should explain to his daughter that she is participating in the bullying by accepting others’ posts, texts and c-mails.
    C.        He should explain to his daughter that the Internet embraces freedom of speech, and anyone is allowed to write anything.
    D.        He should advise his daughter to delete all the posts, texts and c-mails she has received, as well as any new ones that appear.
    `Correct Answer: B
  53. When you are using stock images in your Web site, a royalty-free license allows you to:  
    A.      use the images without paying a fee for each use.
    B.      resell or transfer the images without paying a fee.
    C.      use the images without purchasing a license.
    D.      assume copyright of the images.
    Correct Answer: A
  54. Which type of application allows you to edit and validate your source code and preview your Web pages in multiple browsers?  
    A.      GUI HTML editor
    B.      HTML text editor
    C.      Word processor
    D.      Compiler
    Correct Answer: A
  55. Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a list of music preferences, including favorite songs. The music service then suggests additional songs she might enjoy. The music provider is an example of a cloud-computing application that uses a technology for collaborative filtering, which helps define the list of songs available to listeners. Which term describes this technology?  
    A.      Bit-torrent r
    B.      Crowdsourcing
    C.      Grid computing
    D.      Software as a Service
    Correct Answer: B
  56. The App-A-Day company offers software applications for various topics. When a customer purchases a desired application from the App-A-Day online store, he is directed to a page where he can download the application directly. When the customer is redirected and begins downloading the application, which specific standard protocol is most likely transferring the application?  
    A.      FTP
    B.      HTTPS
    C.      HTTP
    D.      SMTP
    Correct Answer: A
  57. Which of the following is a disadvantage of implementing a Bring Your Own Device (BYOD) policy in a company?  
    A.      Increased cost for licensing mobile applications
    B.      Configuring the corporate e-mail server to work with mobile devices
    C.      Inability to control access to company data if the device is stolen or lost
    D.      Providing training for employees on how to use mobile devices with company applications
    Correct Answer: C
  58. When using cloud-based services to host company data, a company’s disaster recovery plan should include strategies for:  
    A.      creating redundancy and ensuring there is an exclusive contract with the cloud service provider.
    B.      distributing data and software services across multiple cloud service providers.
    C.      creating redundancy and using multiple cloud service providers.
    D.      using a single well-established cloud service provider.
    Correct Answer: C
  59. Marsha’s boss directed her to create a mobile version of the company’s Web site. To ensure her mobile site is optimized, Marsha eliminates banners and advertisements. What other recommendations should Marsha follow?  
    A.      Use images instead of video on the Web site.
    B.      Use white space to give the site an uncluttered look.
    C.      Use Flash content to replace lengthy text descriptions.
    D.      Create several Web sites, each tailored to a specific mobile platform
    Correct Answer: B
  60. Which set of standards developed by the W3C Web Accessibility Initiative (WAI) project provides a universal set of standards promoting accessibility for all Web users, including those with disabilities?  
    A.      Web Content Accessibility Guidelines
    B.      User Agent Accessibility Guidelines
    C.      W3C Authoring Tool Accessibility Guidelines
    D.      Section 508 of the Rehabilitation Act
    Correct Answer: A
  61. You have just checked the balance in your bank account by logging into your bank’s Web site. Which protocol was most likely used for the transmission of your information?  
    A.      IMAPS
    B.      HTTPS
    C.      POP3
    D.      FTPS
    Correct Answer: B
  62. You can use the HTML <input>, <select> and <text area> tags to create form fields in a Web page by placing them between the <form> /form> container tags. Which attribute is used with the <input> element to designate the fields that will appear in the form?  
    A.      The type attribute
    B.      The name attribute
    C.      The value attribute
    D.      The action attribute
    Correct Answer: A
  63. Which term describes the practice of actively collecting wireless networking data from companies and individuals?  
    A.      War driving
    B.      Spear phishing
    C.      Dictionary attack
    D.      Social engineering
    Correct Answer: A
  64. Your Web browser is currently open and displaying a popular sports site. You decide that you want to browse to the CIW site without closing the browser. What is the most efficient way to accomplish this?  
    A.      By performing a search on your computer for the term “CIW”
    B.      By performing a search within the site currently displayed in your Web browser
    C.      By typing in the FTP address ( in the address bar of your Web browser
    D.      By typing the CIW site’s URL ( in the address bar of your Web browser
    Correct Answer: D
  65. What should be your first step when troubleshooting a network connection that uses a cable modem?  
    A.      Ping the proxy server.
    B.      Ping the default gateway.
    C.      Ping local devices using their DNS names.
    D.      Ping local devices using their IP addresses.
    Correct Answer: D
  66. The Windows Device Manager is a tool that enables you to perform a variety of tasks, including:  
    A.      Map to a printer.
    B.      Ping an IP address.
    C.      Defragment a hard drive.
    D.      Change a resource assignment.
    Correct Answer: D
  67. You have 20 remote employees flying in to attend a corporate meeting. The morning of travel day, the administrator tells you that the hotel reservations have changed. What is the best way to send each traveling employee a quick message with the new hotel information?  
    A.      Update the meeting agenda with the hotel information.
    B.      Post an announcement to the company’s Web site with the new hotel information.
    C.      Call each stakeholder and leave a message with the address of the hotel.
    D.      Send a text message with the hotel information to the mobile phone of each traveler.
    Correct Answer: D
  68. You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance drafting business. You have a personal Web site and would like to share samples of your work for potential new customers to review. To which file format should you convert your drawings so that they are viewable regardless of the local operating system used by the individual viewing your site?  
    A.      PDF
    B.      MP3
    C.      DOC
    D.      XML
    Correct Answer: A
  69. Aisha is coding a Web site using a GUI HTML editor. She wants to quickly check her code for errors and compliance with HTML standards as she works. How can she best accomplish this?  
    A.      Render and validate the code using
    B.      Render the code with a browser to see if it looks correct.
    C.      Validate the code using
    D.      Validate the code using the GUI Validator.
    Correct Answer: D
  70. The capabilities of cellular networks have improved greatly since their original development for analog voice phone calls. Most recently, fourth-generation (4G) wireless supports a variety of data-intensive needs. A benefit of 4G networks is that they:  
    A.      Use spread-spectrum technology to ensure high transmission rates.
    B.      Provide fast transmission rates equivalent to DSL or broadband-cable.
    C.      Provide fast transmission rates equivalent to high-speed dial-up connections.
    D.      Enable bandwidth throttling, allowing the user access to unrestricted download speeds.
    Correct Answer: B
  71. You are a software developer who wants to start developing mobile apps for smartphones. You have the option to develop apps for an open-source operating system. Which of the following could persuade you to focus your development efforts on the open-source operating system?  
    A.        An open-source license will never be in the public domain.
    B.        Source code for an open-source app is not viewable and cannot be modified.
    C.        Open-source operating systems and development tools are free from software bugs and viruses.
    D.        The operating system and associated development tools are free, provided you comply with the copy left license.
    Correct Answer: D
  72. Acme Company has been receiving complaints from its suppliers saying that its extra net site does not render correctly in all their employees’ browsers. The suppliers are asking that the extra net site be fixed so that everyone can access it, regardless of browser type. When examining this problem, the Acme Web Development team finds that many developers worked on the site and each used code that he or she was comfortable with. To resolve this problem, what can the Acme developers do?  
    A.      Edit the code so that it consistently uses uppercase letters.
    B.      Edit the code in several common browsers before publishing.
    C.      Edit the code so that it conforms to a single W3C HTML standard.
    D.      Edit the code so that it follows a single W3C scripting language standard.
    Correct Answer: C
  73. What does the following represent? 2E22: 4F00: 000E: 00D0:A267:97FF:FE6E:FE34  
    A.      A MAC address
    B.      AnlPv4address
    C.      An IPv6 address
    D.      An IP diagnostic loopback address
    Correct Answer: C
  74. You need to center and indent a quote on your Web page. Which is the best way to accomplish this using HTML5?  
    A.      Use the <pre> element.
    B.      Use the <blockquote> element.
    C.      Use the style attribute 1%Iith the <p> tag.
    D.      Use the text-align attribute with the <p> tag.
    Correct Answer: B
  75. Which of the following strategies will help protect your computer against virus attacks?  
    A.      Perform regular backups of your hard drive.
    B.      Open e-mail attachments only from unknown senders.
    C.      Update the definitions for your malware protection application frequently.
    D.      Configure security settings for your Web browser to the lowest possible level.
    Correct Answer: C
  76. The official CIW Web site has an IP address of Which technology allows Web users to enter the URL www.ClWcert/u/ecl,com in the browser address bar to access the site, instead of having to remember and enter the IP address?  
    A.      SSL
    B.      DNS
    C.      HTTP
    D.      NNTP
    Correct Answer: B
  77. Which of the following is generally a component of a BYOD policy?  
    A.      Scope of control
    B.      Insurance on devices
    C.      Maintenance provision
    D.      Device replacement or upgrade
    Correct Answer: A
  78. Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify?  
    A.      Direct Sequence Spread Spectrum (DSSS) signal
    B.      Media Access Control (MAC) address
    C.      Wi-Fi Protected Access 2 (WPA2)
    D.      Service Set Identifier (SSID)
    Correct Answer: D
  79. Raoul has received a file attachment from a known individual. He has no reason to expect files from this individual. Which of the following is an effective security strategy for Raoul to take?  
    A.        Open the file attachment and use anti-virus software to scan it.
    B.        Before opening the attachment, use anti-virus software to scan the system’s hard disk.
    C.        Make back-up copies of important files so that it is possible to recover them in case of an incident.
    D.        Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.
    Correct Answer: D
  80. Henry is the network manager at XYY Corporation, a large manufacturing company that competes in the global market. The company’s computing environment is extremely complex and includes several proprietary software systems, all of which require custom configuration of network devices to operate correctly. The company’s executive management team believes that they can benefit by switching the company over to any cloud-based service. Henry disagrees. What is a disadvantage of cloud-based services that Henry can cite to support his position?  
    A.      Cloud-based services provide no maintenance or support.
    B.      Cloud-based services are typically more costly than in-house solutions.
    C.      The company must typically purchase additional servers to support connections to these types of cloud-based service providers.
    D.      Cloud-based services are typically more limited in offerings and configurations than the company currently supports in-house.
    Correct Answer: D
  81. Which line of code uses the correct syntax to apply an external CSS style sheet to HTML documents?  
    A.      <link rel=stylesheet type=css href=syb/syb.css/>
    B.      <style ref =stylesheet type=text/css href=syb/syb.css/>
    C.      <style ref=“stylesheet” type=“css” href=“syb/syb.css”/>
    D.      <link rel=“stylesheet” type=“text/css” href=“syb/syb .css”/>
    Correct Answer: D
  82. You accidentally dropped your mobile phone, which was submerged in water and no longer works. Upon replacing the phone with an upgraded unit you must reconfigure many of the services. The instructions say that all you need to do is enter your e-mail address and the unit will configure the e-mail client for you. Even though you have tried this several times, it does not work. The mobile phone vendor says that because you are trying to sync your e-mail account with an enterprise mail server, you will need to configure the e-mail client manually. Which choice lists the information you will need to configure the e-mail client?  
    A.      Company name, e-mail address, SMTP, POP3, IMAP and DNS
    B.      E-mail address, SMTP, IMAP, DNS, user name and password
    C.      E-mail address, SMTP, POP3, user name and password
    D.      Company name, SMTP, POP3, user name and password
    Correct Answer: C
  83. Xue’s company has provided her with a desktop computer to use at work. She has configured her e-mail client on this work computer to include her personal e-mail account so that she can conveniently download messages and check her personal e-mail. Xue should be aware that:  
    A.      the company will block personal e-mail accounts.
    B.      the company must permit her to receive personal e-mail messages.
    C.      the company will ignore the e-mail messages to respect her privacy.
    D.      the company will have access to her personal e-mail messages.
    Correct Answer: D
  84. Which HTML validator is best for a final check before a new Web site is published?  
    A.      GUI HTML editor’s validator
    B.      Your browser’s add-on validator
    C.      W3C validator at
    D.      W3C validator at
    Correct Answer: C
  85. Consider the following HTML5 code: This I-ITML5 and CSS code directs the sidebar background image to:  
    A.      display at the top-right of the sidebar
    B.      display at a height of 129 pixels
    C.      display at the left of the sidebar
    D.      display horizontal
    Correct Answer: A
  86. Which choice describes a correct order of precedence for implementing CSS?  
    A.      Inline styles override all other styles.
    B.      External styles override all other styles.
    C.      Internal (embedded) styles override inline styles.
    D.      External styles override internal (embedded) styles.
    Correct Answer: A
  87. As a project manager, you have to balance three elements that compose the project triangle. Suppose your customer requests that you add some new requirements to the project when you are halfway through. If you agree to this request, how would it affect other aspects of the project?  
    A.      Project scope will decrease.
    B.      Cost of the project will increase.
    C.      Cost of the project will decrease.
    D.      Time to complete project will be reduced.
    Correct Answer: B
  88. Matthew has embedded a video in his Web page using the HTML5 video format. The video is not rendering properly. He asks Arlene to help determine the problem, so she reviews his code, which appears as follows: <video height=“ 210” class= “center” controls= “controls”><video src=“video.ogg” type=“video/ogg” />  Your browser does not support the HTML5 video element. </video> What is wrong with this code? 
    A.      The ogg video format is not supported by HTML5.
    B.      One of the video tag instances has not been properly closed.
    C.      The browser plug-in information required to view the video is missing.
    D.      The second instance of the <video> element should be replaced with the <source> element.
    Correct Answer: D
  89. What is the biggest security concern with wireless networks?  
    A.      Firewall software is not available for access points.
    B.      Wireless encryption algorithms must be implemented.
    C.      Wireless networks do not support intrusion detection.
    D.      Wireless networks do not support encryption via an access point.
    Correct Answer: B
  90. You opened an e-mail attachment and it launches a virus. The virus takes control of your system and you are unable to run your anti-virus software. Which of the following is the best step for you to take next?  
    A.      Let the virus run its course.
    B.      Call your local authorities to report an identity theft.
    C.      Turn off your computer and reboot from a known, clean system disk.
    D.      Plug in your backup drive to try to initiate an immediate backup of important files.
    Correct Answer: C
  91. Which Web-based validation tool is used to validate Cascading Style Sheets (CSS)?  
    Correct Answer: D
  92. Which choice lists the required elements for HTTP to function?  
    A.      Server, HTML and DNS
    B.      Client, server and TCP/IP
    C.      Browser, HTML and TCP/IP
    D.      Client, Web page and DNS
    Correct Answer: B
  93. When using secure authentication, which of the following are required?  
    A.      A user name only
    B.      A user name and a password
    C.      Neither user name nor a password
    D.      A user name, a password and encryption of transmitted data
    Correct Answer: D
  94. When comparing IPv4 to IPv6, which of the following is an advantage of the IPv6 network addressing scheme?  
    A.      Larger address space
    B.      Shorter address space
    C.      High dependence on network routers
    D.      Fast and unencrypted network transmissions
    Correct Answer: A
  95. You are a small-business owner and would like to encourage employees to bring their own devices (BYOD) to work. Which of the following can help reduce the security risks associated with a BYOD implementation?  
    A.      Expense accounts
    B.      Acceptable use policy
    C.      End user license agreement
    D.      In-house device maintenance
    Correct Answer: B
  96. Philip creates a Web form in HTNL5, but the data will not process. He has the method attribute included in the <form> element. What is missing?  
    A.      The type attribute of the <form> element
    B.      The type attribute of the <input> element
    C.      The action attribute of the <form> element
    D.      The action attribute of the <input> element
    Correct Answer: C
  97. Security attacks can vary greatly. Which type of attack is characterized as an attempt to trick an individual into revealing confidential or private information?  
    A.      Trojan
    B.      Spoofing
    C.      Man in the middle
    D.      Social engineering
    Correct Answer: D
  98. Marsha has been hired by XYZ, Inc., to update the company Web site. Marsha discovers that the existing Web pages were structured using tables. Marsha needs to explain to XYZ why the Web site needs to be recoded in HTML5 with CSS controlling the structure of the document. What is the most important reason for using HTML5 and CSS?  
    A.      The updates will increase user traffic to the site.
    B.      The updates will improve the overall look and feel of the Web site.
    C.      The Web site can be interpreted by any HTML5-compliant browser, including mobile devices.
    D.      The Web site will rank higher in many search engines results, as long as the search engine bot recognizes the code.
    Correct Answer: C
  99. You have been asked to design and develop a Web site for a retirement community. What can you do to help make the site accessible to the elderly?  
    A.      Comply with the latest scripting standards.
    B.      Comply with ICANN’s accessibility standards.
    C.      Comply with WAI’s Web Content Accessibility Guidelines.
    D.      Comply with IETF’s Web Content Accessibility Guidelines.
    Correct Answer: C
  100. To restore a backup file on a Windows-based computer, you:  
    A.      Use the Disk Management utility in the Microsoft Management Console (MMC)
    B.      Use the Backup and Restore utility in the Control Panel.
    C.      Use Device Manager in the Control Panel.
    D.      Extract the backed-up file.
    Correct Answer: B
  101. Violating a copyright or trademark is an example of what type of prosecutable crime?  
    A.      Infringement
    B.      Plagiarism
    C.      Trade secrets
    D.      Non-disclosure
    Correct Answer: A
  102. Which code is best for embedding video into an HTML5 page? A. B. C. D.  
    A.      Option A
    B.      Option B
    C.      Option C
    D.      Option D
    Correct Answer: A
  103. Which of the following HTML elements is a text-level element?  
    A.      <br>
    B.      <hi>
    C.      <list>
    D.      <blockquote>
    Correct Answer: A
  104. Which choice lists the CSS standard(s) that HTNL5 supports?  
    A.        CSS3 standard only
    B.        CSS2andCSS3standardsonly
    C.        CSSlandCSS2standardsonly
    D.        All CSS standards (CSS1, CSS2 and CSS3)
    Correct Answer: D
  105. You are creating a style sheet to format your Web pages. For the page background color, you enter the hexadecimal code FF0000. What color will the page background be when you apply this style?  
    A.      Red
    B.      Blue
    C.      Black
    D.      Green
    Correct Answer: A
  106. Mobile computing has become a common necessity for both personal and business transactions. Which device has features similar to a smartphone but usually does not have telephone capabilities?  
    A.      Portable media player
    B.      Netbook
    C.      Laptop
    D.      Tablet
    Correct Answer: D
  107. You want to restrict host access to a wireless access point. What is the best way to do this?  
    A.      Enable MAC address filtering at each host.
    B.      Log in to the access point and configure features, such as changing the SSID.
    C.      Change the Direct Sequence Spread Spectrum (DSSS) signal at both the access point and each hosts NIC.
    D.      Install software on the host you want to limit, then use a Web browser to log in to the host and configure it with the necessary settings to use the access point.
    Correct Answer: B
  108. To define a circle-shaped hot-spot for an image map, which of the following code fragments would you use?  A. B.  C. D.  
    A.      Option A
    B.      Option B
    C.      Option C
    D.      Option D
    Correct Answer: D
  109. When the user clicks the Submit Query button on a form, the browser sends the information entered in the form to the Web server as a raw text string. The basic element of a raw text string is a name=value pair. A CGI script parses and formats the raw text string into a human-readable format. Which attribute of the form field elements organizes information input by the user into name=value pairs?  
    A.      Type
    B.      Name
    C.      Value
    D.      Input
    Correct Answer: B
  110. A paradigm shift has occurred in the way that small businesses use software applications. Companies increasingly choose hosted solutions with a monthly subscription fee and outsourced system maintenance, instead of purchasing software and hardware that must be maintained by internal resources. This business model is commonly referred to as:  
    A.      Scalability.
    B.      Grid computing.
    C.      Crowd sourcing.
    D.      Software as a Service.
    Correct Answer: D
  111. SuperBank is considering a cloud service from Local Data Center, Inc., to support the bank’s expanding needs. SuperBank’s managers are concerned about security. What can SuperBank request to protect its data from security threats?  
    A.      For Local Data Center to run multiple hypervisors
    B.      For Local Data Center to install a DDoS mitigation system
    C.      For SuperBank staff to manage the servers at Local Data Center, Inc.
    D.      For SuperBank to perform background checks on the staff at Local Data Center, Inc.
    Correct Answer: D
  112. Which organization is responsible for managing domain names so that each one is unique, and (once registered) cannot be used by an unauthorized individual or organization?  
    A.      ICANN
    B.      W3C
    C.      IEFT
    D.      RFC
    Correct Answer: A
  113. A friend just sent you a link to a Facebook page with information that you find very useful. You want to be able to recall the site in the future from your desktop computer, or from your mobile device while away from your desk. Which is the best approach?  
    A.        Memorize the URL so you can pull up the site in any browser such as Chrome, Firefox or Internet Explorer.
    B.        Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.
    C.        Manually enter the Web address into any and all browsers on all of your devices.
    D.        Pull up the message with the link any time you want to view the site.
    Correct Answer: B
  114. Roberto’s company is releasing updates to a specific product. He needs to educate the company’s sales managers, who are located in various international locations, about the new product updates. Which of the following methods would be the most economical and efficient solution for Roberto to discuss the required information with the sales managers synchronously?  
    A.        Send the product update blueprints via e-mail to each of the sales managers and ask them to contact him with any questions.
    B.        Schedule an in-person sales meeting with them at the company headquarters so that the updates can be demonstrated and any questions Correct Answered with the entire group present.
    C.        Schedule a Webinar with the sales managers so that the updates can be demonstrated and any questions Correct Answered with the entire group.
    D.        Post the product update blueprints on the company’s Web site and call each sales manager personally to discuss their individual questions or concerns offline.
    Correct Answer: C
  115. Jenny recently switched from broadband cable Internet to ADSL service with her local phone company. To economize, she chose the self-installation option. It appears that her ADSL modem is not allowing her to connect to the Internet. Which setting should she check first?  
    A.      Loopback address
    B.      Software version
    C.      Default gateway
    D.      Device name
    Correct Answer: C
  116. When previewing a Web page using a GUI HTML editor, you will:  
    A.      be limited to the default browser on your computer or device.
    B.      be limited to the browsers installed on your computer or device.
    C.      receive an error because GUI editors cannot preview pages in a browser.
    D.      be limited to two browser choices that are installed on your computer or device.
    Correct Answer: B
  117. ABC Company develops its Own database applications. ABC is considering migrating to cloud services to accommodate the company’s growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?  
    A.      Cloud-only solution
    B.      Regional systems solution
    C.      Location systems solution
    D.      Multiple cloud-service providers
    Correct Answer: C
  118. Sampson has used HTML5 to create a Web page that contains image-based navigation buttons. He would like to add text-based navigation to help ensure accessibility. Which of the following HTML5 elements should he use?  
    A.      <aside>
    B.      <footer>
    C.      <header>
    D.      <article>
    Correct Answer: B
  119. Michelle wants to search for a scuba regulator. She plans to use a keyword search engine. She does not want to see any results from the manufacturer named Scubapro. Which of the following search strings should she use?  

    A.      Regulators !Scubapro
    B.      Regulators Scubapro
    C.      Regulators <Scubapro
    D.      Regulators >Scubapro
    Correct Answer: A
Card Set:
ciw first
2014-11-24 22:45:51

CIW 610
Show Answers: