Web Designer's Review Tests CIW Review Test 1 |
|||
Foundations (ID0-410)
1. Which of the following protocols is most commonly used to connect dial-up users to their ISPs?
A) PPP
B) PPTP
C) IPSec
D) IPX
E) LDAP
2. You are a web administrator and wish to transfer files to a remote NT server. Which utility should you use?
A) FTP
B) Telnet
C) Tracert
D) Nslookup
3. Which of the following options is used with the IMG SRC tag to cause text to appear when the cursor is over the image?
A) Text
B) ALT
C) TXT
D) Border
E) Mouseover
4. A hacker is capturing packets off of the internet with the hopes of obtaining sensitive data. What type of attack is this?
A) SYN flood
B) Trojan Horse
C) PING flood
D) Man-in-the-middle
E) Brute force
5. Which port does telnet use by default?
A) 20
B) 21
C) 23
D) 53
E) 110
6. What is the default subnet mask for the IP address 138.120.120.10?
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.192
D) 255.255.255.0
E) 255.255.255.252
7. What kind of image compression scheme compresses data only as far as the point in which errors will begin to occur?
A) Lossless
B) Lossy
C) Fractal
D) Vector
8. You have an HTML file that is stored on your local desktop that is currently open in your web browser. You view the source of the file, make changes to it and then save it back to the desktop with the same name. You go back to your web browser and the changes are not appearing. What is the most likely cause of this?
A) The web page needs to be refreshed
B) You cannot save the source file while the HTML file is open in the web browser
C) Your changes contained incorrect HTML syntax
D) You must close the browser and reopen it again
9. A _________ is a system that is positioned between a trusted network and a distrusted one and used to provide security for the internal (trusted) network.
A) Catalogue Server
B) Firewall
C) DHCP server
D) Transaction Server
E) Web Server
10. Which of the following supports transparent backgrounds?
A) GIF89
B) BMP
C) JPEG
D) All of the above
11. Your network utilizes the IPX/SPX protocols. What device is needed in order to connect to the internet?
A) Bridge
B) Hub
C) Gateway
D) Firewall
12. What does DHCP do?
A) Provides name resolution services
B) Protects a network from attackers
C) Assigns IP addresses to computers
D) Used to edit web pages
E) None of the above
13. What is the application used by chat rooms?
A) SMTP
B) SNMP
C) IRC
D) PPP
14. __________ are binary data that is used to identify a user on the internet in order to provide secure online transactions.
A) Digital IDs
B) ATM cells
C) Cookies
D) Certificates
15. What would you type in at a command prompt to view the IP settings on a Windows NT workstation?
A) CMD
B) winipcfg
C) ipconfig
D) ifconfig
16. Which of the following HTML tags preserves line breaks and spacing?
A) P
B) SUP
C) BODY
D) PRE
E) SPAN
17. Which of the following extensions is typically required in order to utilize server side includes (SSI)?
A) htm
B) html
C) shtml
D) CGI
E) PL
18. Which FTP command is used to download a file from a remote computer?
A) GET
B) PUT
C) MPUT
D) DIR
E) OPEN
19. How long would it take to download a 1 MB file on a 128KB ISDN connection?
A) 13.5 Seconds
B) 65.5 Seconds
C) 12.2 minutes
D) 24.7 minutes
20. In hexidecimal, #000000 represents which color?
A) Black
B) White
C) Blue
D) Green
E) Red
21. Which email protocol is used for receiving email?
A) SMTP
B) SNMP
C) POP3
D) FTP
E) PPP
22. The predecessor to the WWW, ___________ used menu systems to link text files allowing internet users to access documents.
A) FTP
B) Gopher
C) Telnet
D) Archie
E) Arpanet
23. You wish to associate more than one host name with a particular IP address in your DNS database. Which type of record should you add for the second host name?
A) CNAME
B) A
C) PTR
D) SOA
E) MX
24. Which of the following is true about heading tags?
A) Does not require a closing tag
B) H1 represents the largest heading
C) There are 5 sizes available
D) All of the above
25. What is the default subnet mask for the IP address 204.1.4.70?
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.192
D) 255.255.255.0
E) 255.255.255.252
26. Which element is used to create numbered lists?
A) OL
B) IL
C) UL
D) H1
27. What is the application that is used to view web pages?
A) Web browser
B) Web Server
C) FTP Client
D) SMTP Server
28. What is the speed of a T1 connection?
A) 512 Kbps
2.048 Mbps
34.368 Mbps
D) 1.544 Mbps
E) 44.736 Mbps
29. Which type of server is used to send email to a list of subscribers?
A) Transaction Server
B) List Server
C) News Server
D) Index Server
30. Which of the following allows applications to privately exchange data over public networks?
A) SSL
B) SSI
C) Java
D) Active X
31. What is the first DNS server known as?
A) First
B) Primary
C) Slave
D) Leader
32. Which graphics type utilizes small dots known as pixels?
A) Bitmap
B) Vector
C) Object
D) Interlaced
33. How do you represent the number 168 in binary?
A) 10101000
B) 11000101
C) 011101111
D) 10110100
E) 01100111
34. Which of the following IP address ranges is not reserved for private networks?
A) 192.168.0.0 - 192.168.255.255
B) 10.0.0.0 - 10.255.255.255
C) 172.16.0.0 - 172.31.255.255
D) 1.0.0.0 - 1.255.255.255
35. Which organization is responsible for controlling web communication and HTML standards?
A) IEEE
B) WC3
C) PICS
D) NCSA
36. Which of the following is true of Java?
A) Developed by IBM
B) Can be used on any platform
C) Is a server-side scripting language
D) Is a required component for all browsers
37. You need to troubleshoot DNS name resolution problems on your network. Which tool should be used to do this?
A) Netstat
B) Nbtstat
C) Nslookup
D) ARP
38. What is the LDAP protocol used for?
A) It is the protocol used for dial-up networking
B) Provides name resolution services
C) Provides a secure connection used with VPNs
D) Accessing a directory
E) None of the above
39. What is the recommended threshold for peer-to-peer networks?
A) 5 workstations
B) 10 workstations
C) 20 workstations
D) 50 workstations
40. Which protocol is responsible for obtaining hardware addresses during broadcasts?
A) RIP
B) ARP
C) UDP
D) TCP
41. Which HTML tag designates the beginning of a new row in a table?
A) TH
B) TD
C) BR
D) TR
42. Which layer of the OSI model defines the type of cable, frequency, terminations, etc?
A) Application
B) Presentation
C) Network
D) Data Link
E) Physical
F) Session
43. Which of the following are tools commonly used for editing HTML files?
A) Notepad
B) Netscape Composer
C) FrontPage
D) PowerPoint
44. Which is a difference between a Search Engine and a Directory?
A) Search engines are free while Directories charge money for their services
B) Most search engines use spiders while directories do not
C) Search engines have a search box while directories are not searchable
D) A webmaster can submit their resource to a search engine, but not to a directory
45. Which of the following cabling types requires terminators?
A) 10baseT
B) 10base2
C) 100baseT
D) 100baseFX
E) All of the above
46. What type of server is used to provide search capabilities for a web site?
A) DNS
B) Transaction
C) Index
D) Search
E) Finder
47. Which of the following files would you most likely need to upload in binary mode using FTP?
A) HTML
B) Executable
C) Text
D) PERL
E) PHP
F) SHTML
48. Which layer of the OSI model is responsible for dividing blocks of data into packets?
A) Application
B) Presentation
C) Session
D) Network
49. A _________ is a self-contained program that makes complete copies of itself.
A) Trojan
B) Virus
C) Worm
D) DoS attack
50. Which of the following is the most common method of getting information from a web surfer?
A) Mail survey
B) Email
C) HTML form
D) Forums