Web Designer's

Review Tests

CIW Review Test 1

 
 

 

Foundations (ID0-410)
1. Which of the following protocols is most commonly used to connect dial-up users to their ISPs?
A) PPP
B) PPTP
C) IPSec
D) IPX
E) LDAP

2. You are a web administrator and wish to transfer files to a remote NT server. Which utility should you use?
A) FTP
B) Telnet
C) Tracert
D) Nslookup

3. Which of the following options is used with the IMG SRC tag to cause text to appear when the cursor is over the image?
A) Text
B) ALT
C) TXT
D) Border
E) Mouseover

4. A hacker is capturing packets off of the internet with the hopes of obtaining sensitive data. What type of attack is this?
A) SYN flood
B) Trojan Horse
C) PING flood
D) Man-in-the-middle
E) Brute force

5. Which port does telnet use by default?
A) 20
B) 21
C) 23
D) 53
E) 110

6. What is the default subnet mask for the IP address 138.120.120.10?
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.192
D) 255.255.255.0
E) 255.255.255.252

7. What kind of image compression scheme compresses data only as far as the point in which errors will begin to occur?
A) Lossless
B) Lossy
C) Fractal
D) Vector

8. You have an HTML file that is stored on your local desktop that is currently open in your web browser. You view the source of the file, make changes to it and then save it back to the desktop with the same name. You go back to your web browser and the changes are not appearing. What is the most likely cause of this?
A) The web page needs to be refreshed
B) You cannot save the source file while the HTML file is open in the web browser
C) Your changes contained incorrect HTML syntax
D) You must close the browser and reopen it again

9. A _________ is a system that is positioned between a trusted network and a distrusted one and used to provide security for the internal (trusted) network.
A) Catalogue Server
B) Firewall
C) DHCP server
D) Transaction Server
E) Web Server

10. Which of the following supports transparent backgrounds?
A) GIF89
B) BMP
C) JPEG
D) All of the above

11. Your network utilizes the IPX/SPX protocols. What device is needed in order to connect to the internet?
A) Bridge
B) Hub
C) Gateway
D) Firewall

12. What does DHCP do?
A) Provides name resolution services
B) Protects a network from attackers
C) Assigns IP addresses to computers
D) Used to edit web pages
E) None of the above

13. What is the application used by chat rooms?
A) SMTP
B) SNMP
C) IRC
D) PPP

14. __________ are binary data that is used to identify a user on the internet in order to provide secure online transactions.
A) Digital IDs
B) ATM cells
C) Cookies
D) Certificates

15. What would you type in at a command prompt to view the IP settings on a Windows NT workstation?
A) CMD
B) winipcfg
C) ipconfig
D) ifconfig

16. Which of the following HTML tags preserves line breaks and spacing?
A) P
B) SUP
C) BODY
D) PRE
E) SPAN

17. Which of the following extensions is typically required in order to utilize server side includes (SSI)?
A) htm
B) html
C) shtml
D) CGI
E) PL

18. Which FTP command is used to download a file from a remote computer?
A) GET
B) PUT
C) MPUT
D) DIR
E) OPEN

19. How long would it take to download a 1 MB file on a 128KB ISDN connection?
A) 13.5 Seconds
B) 65.5 Seconds
C) 12.2 minutes
D) 24.7 minutes

20. In hexidecimal, #000000 represents which color?
A) Black
B) White
C) Blue
D) Green
E) Red

21. Which email protocol is used for receiving email?
A) SMTP
B) SNMP
C) POP3
D) FTP
E) PPP

22. The predecessor to the WWW, ___________ used menu systems to link text files allowing internet users to access documents.
A) FTP
B) Gopher
C) Telnet
D) Archie
E) Arpanet

23. You wish to associate more than one host name with a particular IP address in your DNS database. Which type of record should you add for the second host name?
A) CNAME
B) A
C) PTR
D) SOA
E) MX

24. Which of the following is true about heading tags?
A) Does not require a closing tag
B) H1 represents the largest heading
C) There are 5 sizes available
D) All of the above

25. What is the default subnet mask for the IP address 204.1.4.70?
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.192
D) 255.255.255.0
E) 255.255.255.252

26. Which element is used to create numbered lists?
A) OL
B) IL
C) UL
D) H1

27. What is the application that is used to view web pages?
A) Web browser
B) Web Server
C) FTP Client
D) SMTP Server

28. What is the speed of a T1 connection?
A) 512 Kbps
2.048 Mbps
34.368 Mbps
D) 1.544 Mbps
E) 44.736 Mbps

29. Which type of server is used to send email to a list of subscribers?
A) Transaction Server
B) List Server
C) News Server
D) Index Server

30. Which of the following allows applications to privately exchange data over public networks?
A) SSL
B) SSI
C) Java
D) Active X

31. What is the first DNS server known as?
A) First
B) Primary
C) Slave
D) Leader

32. Which graphics type utilizes small dots known as pixels?
A) Bitmap
B) Vector
C) Object
D) Interlaced

33. How do you represent the number 168 in binary?
A) 10101000
B) 11000101
C) 011101111
D) 10110100
E) 01100111

34. Which of the following IP address ranges is not reserved for private networks?
A) 192.168.0.0 - 192.168.255.255
B) 10.0.0.0 - 10.255.255.255
C) 172.16.0.0 - 172.31.255.255
D) 1.0.0.0 - 1.255.255.255

35. Which organization is responsible for controlling web communication and HTML standards?
A) IEEE
B) WC3
C) PICS
D) NCSA

36. Which of the following is true of Java?
A) Developed by IBM
B) Can be used on any platform
C) Is a server-side scripting language
D) Is a required component for all browsers

37. You need to troubleshoot DNS name resolution problems on your network. Which tool should be used to do this?
A) Netstat
B) Nbtstat
C) Nslookup
D) ARP

38. What is the LDAP protocol used for?
A) It is the protocol used for dial-up networking
B) Provides name resolution services
C) Provides a secure connection used with VPNs
D) Accessing a directory
E) None of the above

39. What is the recommended threshold for peer-to-peer networks?
A) 5 workstations
B) 10 workstations
C) 20 workstations
D) 50 workstations

40. Which protocol is responsible for obtaining hardware addresses during broadcasts?
A) RIP
B) ARP
C) UDP
D) TCP

41. Which HTML tag designates the beginning of a new row in a table?
A) TH
B) TD
C) BR
D) TR

42. Which layer of the OSI model defines the type of cable, frequency, terminations, etc?
A) Application
B) Presentation
C) Network
D) Data Link
E) Physical
F) Session

43. Which of the following are tools commonly used for editing HTML files?
A) Notepad
B) Netscape Composer
C) FrontPage
D) PowerPoint

44. Which is a difference between a Search Engine and a Directory?
A) Search engines are free while Directories charge money for their services
B) Most search engines use spiders while directories do not
C) Search engines have a search box while directories are not searchable
D) A webmaster can submit their resource to a search engine, but not to a directory

45. Which of the following cabling types requires terminators?
A) 10baseT
B) 10base2
C) 100baseT
D) 100baseFX
E) All of the above

46. What type of server is used to provide search capabilities for a web site?
A) DNS
B) Transaction
C) Index
D) Search
E) Finder

47. Which of the following files would you most likely need to upload in binary mode using FTP?
A) HTML
B) Executable
C) Text
D) PERL
E) PHP
F) SHTML

48. Which layer of the OSI model is responsible for dividing blocks of data into packets?
A) Application
B) Presentation
C) Session
D) Network

49. A _________ is a self-contained program that makes complete copies of itself.
A) Trojan
B) Virus
C) Worm
D) DoS attack

50. Which of the following is the most common method of getting information from a web surfer?
A) Mail survey
B) Email
C) HTML form
D) Forums

 

 

 

BreBru.Com Extra Information Techonology HTML