Practice Questions
Practice Questions
Q8) Protocols are the rules that describe how clients & servers communicate across a
network. Which of the following is used to transfer Web pages from a Web Server to a
Web client (browser)
1. HTTP
2. FTP
3. SMTP
4. POP
5. IMAP
6. TELNET
7. NNTP
8. Gopher
Q9) What does PPP stand for?
1. Power Point Protocol
2. Previous Point Protocol
3. Point-to-Point Protocol
4. Page-to-Point Protocol
Q10) What does DSL stand for?
1. Digital Selection Line
2. Direct Selection Line
3. Digital Subscriber Line
4. Direct Subscriber Line
Q11) What does SLIP stand for?
1. Serial Line Intertwined Protocol
2. Serial Line Internet Protocol
3. Subscriber Line Intertwined Protocol
4. Subscriber Line Internet Protocol
Q12) What does NNTP stand for?
1. Network News Transfer Protocol
2. News Network Transfer Protocol
3. New News Transfer Protocol
4. National News Transfer Protocol
Q13) What does SMTP stand for?
1. Small Mail Transfer Protocol
2. Suitable Mail Transfer Protocol
3. Sample Mail Transfer Protocol
4. Simple Mail Transfer Protocol
Q14) What does IMAP stand for?
1. Instant Messaging Access Protocol
2. Internet Messaging Access Protocol
3. Internet Message Advanced Protocol
1.
2.
3.
4.
Server
Client
Interactive
Application
Q22) Johan is connecting a single computer to a network. The computer is located farther
from the server than the defined network standards allow. Which of the following devices
should Johan use to solve this problem at the OSI/RM physical layer?
1. Repeater
2. Network Interface Card
3. Bridge
4. Hub
Q23) Describe a container tag.
1. Stand-alone
2. Uses opening and closing tags
3. Opening tags contain /
4. Empty tags closing tag uses /
Q24) <PRE>. What does this tag do?
1. Line breaks and spacing will display in the browser exactly as they appear in the
original text and in the font determined by the rest of the page.
2. This tag places text into courier.
3. Signifies the end of a HTML document.
4. Allows spacing to be seen exactly as the text document portraits.
Q25) What is the accepted HTML comment sequence?
1. //*comment text here*//
2. /*comment text here*/
3. <!--comment text here-->
4. //comment text here//
Q26) If you want to give the user the maximum amount of choices in as little space as
possible?
1. Multiple Text Boxes
2. Multiple Option Select List
3. Single Option Select List
4. Multiple Radio Buttons
Q27) How would you add seven more rows to a table you have designed in HTML?
1. Change <COLSPAN> tag to accommodate the new rows
2. Create a new table with the desired number of rows
3. Use <TR> and <TD> to extend the table
4. Use <TR> seven times
1.
2.
3.
4.
<IMG SRC=ciw.gif>
<IMG SRC="..ciw.gif">
<IMG SRC=.."ciw.gif">
<IMG SRC="images/ciw.gif">
Q36) Olga wants to use HTML forms to gain information from viewers. How should
Olga do this?
1. ISAP
2. CDBC
3. CGI
4. Proprietary script solution
Q37) Rupert wants to test his computers network connectivity with a ping command. He
enters "ping 127.0.0.1". What special address is he using?
1. Loopback address
2. Multicast address
3. Invalid address
4. Experimental address.
Which language allows you to phrase queries on the front end so that they will be
understood by back end databases?
1. SQL
2. Cobol
3. JavaScript
4. Java
Q39) A network uses the X.25 protocol, frame relay connection to exchange information
between router and switching nodes. What is it?
1. LAN
2. WAN
3. MAN
4. VPN
Q40) What type of encryption uses a single key for both encryption and decryption?
1. Asymmetric
2. Hash
3. Public key
4. Symmetric
Q41) What type of encryption uses a pair of keys, one public and one private?
1. Symmetric
2. SSL
3. Asymmetric
4. SLE
Q42) What is the difference between broadband and baseband?
Client/Server
Centralised computer
Diskless mainframe
Peer to Peer
Q52) Ling wants to upload a document to a company FTP server. She will download the
file in two days time. Which program makes it easiest for her to upload?
1. News client
2. Web browser
3. Mail client
4. FTP client
Q53) Jemima wants to create an address book that all company employees can access.
She must be able to update it on the fly and wants all employees to have immediate
access to such changes without having to download and import a new file into their emailo programs. Which type of server must Jemima install and configure?
1. Directory server
2. Certificate server
3. Proxy server
4. HTTP server
Q54) Engelbert wants to send a 1MB document over the internet to a client in Australia.
Which method is best for transmitting the document to his client?
1. FTP
2. Newsgroup
3. Mailing List
4. Telnet
Q55) New names appear on a database. You remove them, but they reappear. How far has
the dirty hacker got?
1. Discovery
2. Control
3. Penetration
4. Brute Force
Q56)A small program which allows one server to access information on another, then
pass it on to a client for browsing Internet is :
1. Java applet
2. Java servlet
3. Hash script
4. Asymmetric keys
Q57) http://www.company.com/pub/links.html The http specification divides this URL
into:
1. Server name, directory path, file name and extension
2. Transfer protocol, server name, directory path and file name
3. Domain name, directory path, file name, file type
4. Directory, directory path, file name, file extension
Q58) Suki wants to conduct an Archie search to quickly locate compression utilities on
the Internet. Which command will she use to log on to other systems to conduct her
Archie search?
1. Gopher
2. Ping
3. Telnet
4. Veronica
Q59)What type of addresses are unique to the network protocol TCP/IP?
1. DNS
2. IP
3. LAN
4. TCP
Q60) What is the best way to find honest opinions about products on the Internet?
1. Standard Web search
2. Joining a news group
3. With Veronica
4. With Archie
Q63) TCP/IP divides addresses into:
1.
2.
3.
4.
Fragments
Segments
Dotted quads
Packets
Q64) A search about corporate law returns too many results when corporate law is typed
into the search engine. How can this be fixed?
1. (corporate law)
2. "corporate law"
3. corporate NEAR law
4. corporate +law
Q65) What does SQL stand for?
1. Sequel
2. Structured Query Language
3. Standard Query Language
4. Simple Query Language
Q66) Geraldo posted a web page on his ISPs web server. He didnt register either any
search engines, but when he performed an Internet search on "Geraldo". His web page
appears. How is this so?
1. His ISP registered his web page
2. A robot or spider indexed his site
3. The search engine was lucky
4. A Free Service Search Engine Registered His Site For Free
Q67) To increase the chances of your companys web page appearing in search results,
which of the following should be instigated?
1. HTML <META> tag
2. HTML <CONTENT> tag
3. HTML <KEYWORDS> tag
4. HTML SEARCH attribute
Q68)What is used for 3D walk throughs?
1. HTML
2. VRML
3. JavaScript
4. RealPlayer
Q69) Your network slows down. Whatever can the problem be?
1. Incorrect logons
2. Lack of bandwidth
3. Incorrect DNS for file server
4. Processor speeds
Q70) Which of the following are networking protocols according to OSI?
1.
2.
3.
4.
Q71) You are unable to view some of the contents of a web page. You can only see text.
The download image setting is on. What gives?
1. Must purchase correct application and install it
2. Browser is malfunctioning
3. Incorrect plug-in
4. Browser must be upgraded
Q72)What class is the IP address 215.125.45.5 ?
1. Class A
2. Class B
3. Class C
4. Class D
Q73) Bob has set up a new workstation with the IP address of 129.25.36.5 What is the
appropriate subnet mask for this IP
1. 255.0.0.0
2. 255.255.0.0
3. 255.255.255.0
4. 255.255.255.255
Q74) Jane has programmed the Following HTML code, however when she runs it, she
sees nothing on the browser. Look at the code below determine the error. <HTML>
<HEAD> <TITLE>Jane's Link Page<TITLE> </HEAD> <BODY> <H1>This is my
Web Page</H1> <UL> <LI>My Home Page</LI> <LI>My Links</LI> <LI>My
Pets</LI></UL> </BODY> </HTML>
1. <UL> is not a proper tag
2. </H1> missing
3. / missing from <title> tag
4. The <Head> tag should goes before the <html> tag
Q75) Elise prepares to send a 1-MB e-mail attachment via the Internet to a colleague in
Berlin. When she tries to send it, however, she receives notification that the e-mail server
is temporarily not in service. Elise must transmit the data immediately. With which
method could she transmit the document to her colleague instead?
1. Telnet
2. FTP
3. SMTP
4. Gopher
Q76) Julio wants to include hypertext links in his Web page. He codes references into his
HTML so that when users click a link, they will ( choose all that apply)
1.
2.
3.
4.
2. HTTP
3. TCP
4. BOOTP
Q84) Data flow that travels in two directions, but only in one direction at a time is
referred to as:
1. Full duplex
2. Half duplex
3. Simplex
4. Full simplex
Q85) Which port number is reserved for HTTP?
1. 21
2. 25
3. 53
4. 80
Q86) Which of the following does not represent a direct internet connection?
1. DSL
2. Cable modem
3. ISDN
4. LAN connection
Q87) In the following URL, which segment denotes the name of the server:
http://www.CIW4ever.com
1. http://
2. CIW4ever
3. com
4. www
Q88) SMTP, POP, and IMAP are all protocols used with which type of server?
1. News
2. Web
3. Mail
4. Gopher
Q89) Which of the following is not a characteristic of cookies
1. Small text files placed on a Web site visitor's computer
2. Connected to a database entry on the server site
3. Very simple, yet effective form of internet security
4. Can provide important marketing information about users
Q90) Which of the following file formats is a step above simple DOS text formatting?
1. TIFF
2. EPS
3. RTF
4. PDF
Q91) According to HTML 4.0 standards, which of the following tags must an HTML
document contain?
1. <FONT>
2. <P>
3. <STYLE>
4. <HEAD>
Q92) Which of the following is a more suitable alternative to the <B> tag?
1. <EM>
2. <STRONG>
3. <H1>
4. <TT>
Q93) Which of the following file formats supports transparency, interlacing, and
animation?
1. JPG
2. GIF87a
3. BMP
4. GIF89a
Q94) Which of the following is not an atribute of the <AREA> tag used for client-side
image maps?
1. Shape
2. Usemap
3. Coords
4. Href
Q95) How would you define a circular region in a client-side image map?
1. <AREA shape="circle" coords="x1,y1,x2,y2" href="URL">
2. <AREA shape="round" coords="x1,y1,radius" href="URL">
3. <AREA shape="circle" coords="x1,y1,radius" href="URL">
4. <AREA shape="circle" coords="x1,y1" href="URL">
Q96) All of the following tags may be used to incorporate CSS into an HTML page
except:
1. <STYLE>
2. <SPAN>
3. <LINK>
4. <BASE>
Q97) I am a server often used to connect a LAN to the internet. I provide caching of web
documents, coporate firewall access, transaction logging, and I can secure the host. What
server am I?
1. Caching Server
2. Transaction Server
3. Proxy Server
4. DNS Server
Q98) I am a standard SMTP server that can automatically forward an e-mail message to
members on a distribution list. What am I?
1. Mail Server
2. Media Server
3. News Server
4. Mailing List Server
Q99) I use NNTP, have written text output, and allow for multiperson input that is posted
on electronic bulletin boards. What am I?
1. Certificate Server
2. News Server
3. Mail Server
4. Directory Server
Q100) I am a dedicated server and my services are often utilized by proxy servers. I
speed up data access by storing data retrieved by users then presenting it directly to users
who later request the same data. What am I?
1. Directory Server
2. Caching Server
3. DNS Server
4. Certificate Server
Q101) If you receive encrypted info you must validate yourself to me. I generate and
manage digital certificates by using cryptography. What am I?
1.
2.
3.
4.
Proxy Server
DNS Server
Certificate Server
Directory Server
Q102) I am a dedicated server that identifies all resources on a network. I allow remote
access of information from a central location in a quick and efficient manner. You may
use me to search for an entry, modify personal information, or query a database
containing e-mail addresses. I use X.500 and LDAP. What am I?
1. Transaction Server
2. Directory Server
3. Certificate Server
4. DNS Server
Q103) I am a server used by search engines and I run little programs called robots. What
am I?
1. Catalog Server
2. Directory Server
3. DNS Server
4. Mail Server
Q104) Suppose the host or system cannot perform properly because another program or
node is using all of its resources. Or perhaps a user is instantly flooded with thousands of
e-mail messages that crash the system (mail bombing). These are both examples of which
type of hacker attack?
1. Spoofing.
2. Denial-of-service
3. Insider attacks
4. Man-in-the-middle
Q105) A hacker attempting to gain access as a legitimate user is using which type of
attack?
1. Trojan horse
2. Trapdoor
3. Brute-force
4. Replay
Q106) I am a security measure comprised of one computer (called a bastion) that acts as
both a firewall component and the network interface. I screen all packets coming to and
from the internal hosts at the application level. A router forwards all incoming traffic to
the bastion and allows traffic only from the bastion. What am I?
1. Packet-filtering router
2. Screened-host firewall (single-homed bastion)
3. Screened-subnet firewall (demilitarized zone)
4. Screened-host firewall (dual-homed bastion)
Q107) A computer without an IP address can broadcast which address to obtain one?
1. 0.0.0.0
2. 255.0.0.0
3. 0.0.0.255
4. 255.255.255.255
Q108) What is the birthplace of the Web?
1. W3C
2. ICANN
3. CERN
4. ARPANET
Q109) Which is defined as "the inter-organizational exchange of documents in
standardized electronic form directly between participating computers"?
1. Business-to-business model
2. SET
3. EDI
4. UN/EDIFACT
Q110) HTML 4.0 has three flavours, what are they?
1. Extreme, simple, effective
2. Transitional, effective, simple
3. Frameset, effective, simple
4. Transitional, frameset, strict
Q111) Which network topology consists of a central device (hub) through which all
network nodes are connected?
1. Bus
2. Ring
3. Mesh
4. Star
Q112) Which of the following pairings concerning the OSI/RM model is incorrect?
1. Session Layer: Establishes, manages, and terminates connections between
cooperating applications
2. Network Layer: Organizes data into packets and routes them to their destinations
3. Presentation Layer: The interface to the end user
4. Data Link Layer: Provides reliable data transfer across the physical link
Q113) Which of the following operates on several layers of the OSI/RM and can redirect
information flow from one node to another while giving each sender/receiver pair the
line's entire bandwidth?
1. Routers
2. Brouters
3. Switches
4. Gateways
Q114) Which protocol that occupies the internet layer of the Internet archictecture model
is responsible for resolving physical addresses from IP addresses?
1. UDP
2. RARP
3. ARP
4. ICMP
Q115) Which of these is a connectionless, broadcast-oriented protocol that occupies the
transport layer of the Internet architecture model?
1. TCP
2. UDP
3. IP
4. IGMP
Q116) Which of these is a fast packet switching technology that uses fiber optic and
digital cabling and makes use of variable length packets?
1.
2.
3.
4.
ATM
Frame relay
X.25
PPP
Q117) Which of the following is the first point of contact for T1 wires that are connecting
to a LAN?
1. DSU
2. Multiplexor
3. CSU
4. Router
Q118) Which routing protocol allows load balancing, partitioning of a network into areas,
and various types of service routing?
1. OSPF
2. EGP
3. BGP
4. RIP
Q119) Which diagnostic tool tests connectivity between source and destination systems?
1. Ipconfig
2. Netstat
3. Ping
4. Tracert
Q120) Which of the following network components is incorrectly paired with its OSI/RM
layer of operation?
1. Repeaters: Physical layer (Layer 1)
2. Gateways: Any layer
3. Routers: Physical layer (Layer 1)
4. Brouters: Data Link and Network layers (Layers 2 and 3)
Q121) Which is the most commonly used type of cable?
1. Solid STP
2. Solid UTP
3. Stranded STP
4. Stranded UTP
Q122) The following is a list of cable types and their possible uses. Which is incorrect?
1. Multimode fiber optic: LANs and WANs
2. Thicknet: ethernet standard for smaller networks
3. Coaxial: baseband, broadband, and television networks
4. Twisted pair: ethernet and token ring networks
Q123) If a hacker assumes the identity of a legitimate network device to gain access to
important information, this is known as a(n):
1.
2.
3.
4.
Insider attack
Trapdoor attack
Spoofing attack
Man-in-the-middle attack
4. Router: directs flow of information from one node to another and allows for full
bandwidth use
Q130) A WAN technology implemented at the network layer of OSI/RM, this older
protocol is used for many point-of-sale transactions, operates at 56Kbps or slower, and
ensures error-free data delivery by checking errors at many points along the data's path:
1. ATM (aysnchronous transfer mode)
2. Frame relay
3. X.25
4. PPP
Q131) Which of the following describes the elements, or objects, within a document
rendered by a Web browser?
1. DHTML
2. DOM
3. CSS
4. <META>
Q132) Which of the following allows you to describe the function and context of the
actual information in a document?
1. HTML
2. DOM
3. XML
4. DTD
Q133) Which of the following does not specify a "flavor" of HTML 4.0?
1. Frameset
2. Public
3. Strict
4. Transitional
Q134) Which of the following is an object-based scripting language that can manipulate
HTML objects as well as ActiveX controls?
1. VBScript
2. JavaScript
3. Jscript
4. Java
Q135) Which of the following is an open set of technologies for integrating components
on the web?
1. Java applets
2. JavaScript
3. Plug-in
4. ActiveX
Q136) Recently developed to enhance the security and capabilities of e-commerce, this
protocol features enhanced identification, the passing of encrypted credit card
information that only the merchant's bank can access, and encryption of all sensitive
information among all parties involved:
1. EDI
2. SSL
3. SET
4. Business-to-business model
Q137) Which of the following has been shown NOT to be an effective manner of internet
advertising?
1. Referrer bonus
2. Contest promotions
3. Banner ads
4. Partnerships
Q138) Which of the following e-commerce payment methods enhances authentication
and is capable of storing and updating passwords and other security information?
1. Cash model
2. Smart cards
3. Credit model
4. Check model
Q139) Which layer of the OSI/RM provides useful transformations on data to support a
standardized application interface?
1. Data Link Layer
2. Session Layer
3. Application Layer
4. Presentation Layer
Q140) Which of the following is a token-based LAN standard composed of two counterrotating rings and is often used to cover a city or specific geographic area?
1. Apple LocalTalk
2. FDDI
3. Gigabit Ethernet
4. Ethernet/IEEE 802.3
Q141) Which of the following WAN standards is implemented at the MAC sublayer of
the data link layer and uses fixed-sized cells to support data as well as real-time video and
voice?
1. Frame relay
2. ATM (asynchronous transer mode)
3. PVCs (permanent virtual circuits)
4. IEEE 802.12-100VG-AnyLAN
Q142) This solution is based on the X-Open call-level interface and is one of the industry
standard APIs for using SQL to access relational databases:
1. JDBC
2. ODBC
3. ColdFusion
4. ADO
Q143) You are the administrator of a small company that requires extensive security.
Although security is a concern, you must also consider the costs associated with
obtaining certificates. Which server do you recommend most?
1. Certificate server
2. Directory server
3. Transaction server
4. Proxy server
Q144) Which is the most commonly used web server?
1. Microsoft IIS
2. Apache Server
3. Lotus Domino
4. Lotus Go Webserver
Q145) Which of the following is an advantage of JavaServer Pages (JSP)?
1. JSP is free
2. JSP utilizes memory well
3. JSP communicates with databases
4. All of the Above
Q146) Which is not true of java servlets?
1. They use objects
2. They are platform independent
3. They cannot be chained
4. They are created using java
Q147) Which of the following is true of Relational Database Management System
(RDBMS)?
1. Can allow a user to password protect a database file
2. Allows a user to work with hierarchical database types
3. Allows a user to work with network database types
4. Uses queries to organize tables
Q148) Which one is the correct way to display an H1 heading in HTML?
1. <h1> Welcome to my website </h1>
2. <h1> Welcome to my website
3. <h1> Welcome to my website </h2>
4. <h1> Welcome to my website <\h1>
Q149) Which transportation layer protocol provides reliable delivery and manages
sessions?
1. Transmission Control Protocol (TCP)
2. Sequenced Packet Exchange Protocol (SPX)
3. AppleTalk Transaction Protocol (ATP)
4. NetBEUI
Q150) Which network layer protocol is the Microsoft implementation of IPX/SPX?
1. Internet Protocol (IP)
2. NWLink
3. NetBEUI
4. Internetwork Packet Exchange (IPX)
Q151) Which of the following protocols, is not in the TCP/IP suite?
1.
2.
3.
4.
Q152) Which network component filters frames to determine whether a specific frame
belongs on a local segment or another LAN segment?
1. Repeater
2. Hub
3. Bridge
4. Router
Q153) Which network component acts like a bridge at the network level?
1. Router
2. Network Interface Card
3. Repeater
4. Hub
Q154) Which type of database does the client server model contain?
1. Single Database Server
2. Distributed Databases
3. Both Single Database Servers and Distributed Databases
4. Neither Single Database Servers and Distributed Databases
Q155) The best way to enable transactions between databases and users is:
1. ODBC
2. SQL
3. TCP/IP
4. RDBMS
Q156) To determine what client server model should be implemented, which of the
following should be considered?
1. Cost, User Requirements, Network Type
2. Cost, Network Type, Types of Applications Run
3. Network Type, Types of Applications Run, User Requirements
4. Cost, Network Type, Types of Applications Run
Q157) A disadvantage of peer-to-peer networking is:
1. The networks are difficult to configure
2. The networks are expensive
3. The network is less secure than a server based network
4. None of the Above
Q158) A disadvantage of star network topology is:
1. If a cable breaks, the entire network is affected.
2. If the hub fails, the entire network can fail.
3. Network expansion is difficult.
4. Isolating problems is difficult.
Q159) Which network component directs the flow of information from one node to
another?
1. Brouter
2. Router
3. Switch
4. Hub
Q160) Which of the following is not optimal for handling increased network traffic on a
LAN?
1. Using a bridge.
2. Implementing a LAN switch.
3. Installing more workstations.
4. Increasing bandwidth.
Q161) What network device terminates physical connections?
1. Brouter
2. Switch
3. Channel Service Unit/Data Service Unit (CSU/DSU)
4. Gateway
Q162) What network device manually switches data between inbound and outbound
transmissions?
1. Gateway
2. Patch Panel
3. Modem
4. Brouter
Q163) Which transmission media is used for video and communication networks?
1. Coaxial cable
2. Twisted pair cable
3. RJ45
4. None of the above
Q164) Which of the following is a common digital leased line service providing 1.544
Mbps data transfer speed?
1. T1
2. T2
3. T3
4. E-Carrier System
Q165) Which layer of internet architecture consists of the OS device drivers, the
corresponding interface card, and the physical connection?
1. Transport Layer
2. Internet Layer
3. Network Access Layer
4. Application Layer
Q166) Which layer of internet architecture utilizes Transmission Control Protocol (TCP)
and User Datagram Protocol (UDP)?
1. Application Layer
2. Transport Layer
3. Network Access Layer
4. Internet Layer
Q167) Which protocol state should only be used in a lab?
1. Draft
2. Proposed
3. Standard
4. Experimental
Q168) Which protocol is not used in the application layer of internet architecture?
1. Hypertext Transfer Protocol (HTTP)
2. File Transfer Protocol (FTP)
3. Telnet
4. User Datagram Protocol (UDP)
Q169) An advantage of ring topology networks is:
1. They are inexpensive.
2. Network expansion does not affect network operation.
3. Performance with heave network traffic is good.
4. Performance differs based on user needs.
Q170) Which is not a function of the Open Systems Interconnection reference model
(OSI/RM)?
1. Provides universal development concepts.
2. Describes packet creation.
3. Explains framework used to connect systems.
4. Releases newly revises applications and protocols.
Q171) Which of the OSI/RM layers organizes data into datagrams?
1. Application
2. Session
3. Physical
4. Network
Q172) To determine if a packet is valid, which of the following is utilized?
1. Anti-virus Software
2. Cyclical Redundancy Check
3. Packet Header
4. None of the Above
Q173) Which application layer protocol is used to send TCP/IP address configuration
information to hosts?
1. Bootstrap (BOOTP)
2. Simple Network Management Protocol (SNMP)
3. Server Message Block Protocol (SMB)
4. X.500
Q174) In the discovery stage of hacking, which of the following options can be revealed?
1. Network Topology
2. System Defaults
3. How to create new user accounts
4. Destruction of evidence a hacker was present
Q175) Which National Computer Security Center (NCSC) security level can be described
as minimal protections like an MS DOS system?
1. D
2. C1
3. B1
4. A1
Q176) Which of the following is not an adequate measure for securing a server?
1. Changing system defaults
2. Manual logging
3. Establishing a baseline of activity
4. Establishing a written policy
Q177) A device that inspects each packet for predefined content is a:
1.
2.
3.
4.
Packet Server
Proxy Server
Packet Filter
None of the Above
Q178) A commonly used implementation of a firewall that creates a fairly secure space
between the internet and another network is the:
1. Screened-host Firewall (dual homes bastion)
2. Screened-host Firewall (single homes bastion)
3. Screened-subnet Firewall
4. Circuit Level Gateway
Q179) The process of choosing a path over which to send packets is known as:
1. Demultiplexing
2. Routing
3. Addressing
4. IP Forwarding
Q180) Which of the following is a feature of Open Shortest Path First (OSPF) routing?
1. Routing Table Updates
2. Load Balancing
3. Authenticated Exchanges
4. All of the Above
Q181) Which of the following is a feature of a subnet mask?
1. Distinguishing the network and host portions of an IP address
2. Specifying whether a destination address is local or remote
3. Both A and B
4. Neither A nor B
Q182) A network analyzer provides which of the following services?
1. Monitors network traffic to identify network trends
2. Deploys repair patches to network problems
3. A and B
4. Neither A nor B
Q183) Which is the most commonly used web server?
1. Microsoft IIS
2. Apache Server
3. Lotus Domino
4. Lotus Go Webserver
Q184) Which of the following is an advantage of JavaServer Pages (JSP)?
1. JSP is free.
2. JSP utilizes memory well.
3. JSP communicates with databases.
1.
2.
3.
4.
Q193) Which of the following is not a drawback to Common Gateway Interface (CGI)?
1. CGI creates out-of process events.
2. CGI programs cannot account for unexpected user entries.
3. CGI scripts cannot tell the difference between sessions.
4. CGI scripts must be compiled.
Q194) A proxy server typically does all the following except:
1. Caching Web Document
2. Corporate Firewall Access
3. Routing Mail
4. Filtering Client Transactions
Q195) Which of these options is not a true statement about FTP servers?
1. Sending files via FTP is faster than via HTTP
2. Sending files is more secure than other protocols
3. STP is more optimized for larger file downloads than a traditional email client
4. FTP servers generally allow anonymous logons
Q196) Which statement is not true of newsgroups?
1. They are all moderated.
2. They are all unmoderated.
3. They are private.
4. None of the Above
Q197) Which is not a common server encryption method?
1. Asymmetric key encryption
2. Message digest algorithms
3. Private keys
4. Digital Signatures
Q198) A user cannot perform which function on a directory server:
1. Search for an entry or entries
2. Use database email addresses
3. Search for a user or group of users
4. Modify personal information
Q199) What is an IP address?
1. An address used by TCP/IP to send packets of information
2. Also referred to as dotted quads
3. There are roughly 4 billion IP addresses.
4. All of the above
Q217) Which of these statements is not true regarding Internet search engines?
1. Some engines assign rank differently than others
2. Some engines have a more extensive web catalogue than others based on their
original design philosophy
3. Some engines use sophisticated programs to auto-validate sites to ensure content
accuracy for searches
4. Some engines offer different levels of granular searching refinement that permits
users to narrow search results
5. 1 and 4 are false
6. 1, 2, 3, and 4 are true
7. 1, 2, and 3 are true
Q218) Of the following list, which statement does not match its value proposition. Ex.
McDonalds = food served quickly
1. Deja.com = find newsgroups on the subject you choose
2. Archie = ideal when you do not know the name of the file for which you are
looking
3. people.yahoo.com = service to find people without a web page directly related to
them
4. WebCrawler = small search engine good for searching specific subject matter
5. 2 and 3 do not match
6. 1, 2, 3, and 4 do not match
Q219) Which of the following are synonyms for market intelligence?
1. Secondary market research
2. company/competitor intelligence
3. primary market intelligence
4. 1 and 2
5. 2 and 3
6. 1 and 3
Q220 Which of the following sites offer information for free?
1. Hoovers
2. Thomas Register
3. AltaVista
4. OSHA.gov
5. all of the above
6. none of the above
7. 3 and 4
Q221) Which of the following are not examples of pull technology?
1. A request to AltaVista
2. An FTP download
3. A PointCast session
4. A Web site member automatic email notice
5. 1 and 2
6. 3 and 4
7. none of the above
8. all of the above
Q222) Which of the following was considered the first practical networking solution?
1. Mainframes
2. Client Server Models
3. The Internet
4. Peer to Peer Networking
Q223) All networks consist of which elements?
1. Servers, Transmission Media, and Network Services
2. Protocols, Servers, and Clients
3. Protocols, Transmission Media, and Network Services
4. Clients, Transmission Media, and Protocols
Q224) Which of the following topologies require that all nodes tap into the same cable?
1. Star Topology
2. Bus Topology
3. Ring Topology
4. All of the Above
Q225) In UNIX, what purpose does X Windows serve?
1. A command based interface for operating a machine.
2. Maintains the file system.
3. Functions as the essential part of the operating system.
4. Provides a graphical user interface.
Q226) Which of the following is an element of a packet?
1. Header
2. Data
3. Trailer
4. All of the above
Q227) SMTP, HTTP, and AFP are examples of:
1. Major Networking Protocols
2. Transport Layer Protocols
3. Application Layer Protocols
4. Network Layer Protocols
Q228) NAPs (Network Access Points) are:
1. Groups of computers connected within a confined geographic area.
2. Groups of computers connected over an expansive geographic area.
3. Junctions between on high-speed network and another.
4. None of the above
Q229) A piece of networking equipment that amplifies the electronic signal traveling on a
cable segment is a:
1. Repeater
2. Network Interface Card (NIC)
3. Transceiver
4. Hub
Q230 What transmission is characterized by the absence of a clock in the transmission
media?
1. Synchronous Transmission
2. Asynchronous Transmission
3. Data Transmission Flow
4. Broadband Transmission
Q231) X.25 and Fast Packet switching are examples of what standards?
1. WAN Standards
2. LAN Standards
3. Both 1 and 2
4. Neither 1 nor 2
Q232) Which layer of Internet architecture corresponds to the physical and data link
layers of the OSI reference model?
1. Transport Layer
2. Internet Layer
3. Network Access Layer
4. Application Layer
Q233) Which type of broadcast address is used for configuring hosts when they boot up?
1. Limited Broadcast
2. Net Directed Broadcast
3. Subnet Directed Broadcast
4. All Subnets Directed Broadcast
Q234) Which of the following TCP/IP troubleshooting commands displays the contents
of various network related data structures like sockets?
1. Ping
2. Tracert
3. Netstat
4. IPConfig
Q235) Which DNS record identifies DNS servers for the DNS domain?
1. Name Server (NS)
2. Start of Authority (SOA)
3. Address (A)
4. Canonical Name (CNAME)
Q236) What type of server is a dedicated server that identifies all resources on a network?
1. Catalog Server
2. Directory Server
3. Transaction Server
4. None of the Above
Q237) Com and Edu are examples of what kind of domains?
1. Root Level Domains
2. Top Level Domains
3. Second Level Domains
4. Second Level Sub Domains
Q238) Which of the following groups of factors should be considered when determining
product advantages and disadvantages?
1. Product Support, Cost, Simplicity of Use, Scalability
2. Cost, Product Testing, Simplicity of Use, Scalability
3. Product Support, Product Testing, Simplicity of Use, Scalability
4. Product Support, Product Testing, Cost, Simplicity of Use
Q239) Whenever a database is accessed on a network, which of the following is NOT a
major element involved?
1. User Interface
2. ODBC
3. Process Logic
4. Data Storage
Q240) Which network asset has carries the potential threat of IP spoofing?
1. Local Resources
2. Network Resources
3. Server Resources
4. Database and Information Resources
Q241) What is the most common type of network attack?
1. Spoofing Attacks
2. Man-in-the-Middle Attacks
3. Denial of Service Attacks
4. Insider Attacks
Q242) What type of attack occurs after a hacker has captured and altered a key part of a
message, such as a network data packet?
1. Trapdoor Attack
2. Replay Attack
3. Social Engineering Attack
4. Brute Force Attack
Q250) Of the following tags, which is not recommended for use for formatting text in an
HTML document?
1. <B>
2. <STRONG>
3. <U>
4. <EM>
5. <I>
Q251) Find all the correctable items with the following HTML document.<!DOCTYPE
HTML PUBLIC "-//W3C//DTD HTML 4.0
Transitional//EN!"><html><HEAD><Title>Sun & Sand Tours<Title><!--<B>All your
important text here</B>--><Body></HTML>
1. Remove the "!" from the end of Line 1, Line 2 should be in all caps, Line 3 end
tag should appear </title>, and line 5 should read </BODY>
2. HTML in line 2 should be caps, Line 4 has all critical text in a hidden comment,
and Line 5 should read </Body>
3. Remove lthe "!" from the end of line 1, Line 2 should be on two lines after
<html>, after line 3 should be <body/>, and line 5 should appear as </body>
4. Remove the "!" from the end of line 1, line 2 should be on 2 lines with <html> in
caps, line 3 end title should appear </title> and both should be in caps, line 4 has
all relevant text in a hidden comment and is missing a preceding <BODY> tag,
and line 5 should read </BODY>
Q252) Which of the following is the proper order of elements in an HTML document
with respect to precedence?
1. HTML, HEAD, TITLE, BODY
2. HEAD, TITLE, BODY, HTML
3. HTML, BODY, HEAD, TITLE
4. TITLE, HTML, HEAD, BODY
Q253) If you have to include a horizontal line on your page that extends exactly half way
across the screen, is left justified, is size 10, and is not 3D, what is the appropriate HTML
document?
1. <HR WIDTH="50%" ALIGN="left" SIZE=10 NOSHADE >
2. <SIZE=10 NOSHADE HR WIDTH="50" SIZE=10>
3. <HR WIDTH="50%" ALIGN="default" SHADE>
4. <HR WIDTH=50% ALIGN="left" SIZE=10 NO3D>
Q254) What is the best option for displaying an animated 4 color image on the highest
number of browsers?
1. PNG
2. JPEG
3. BMP
4. GIF 89a
3. The proper HTML format for creating a row that spans 3 columns is: <TR><TD
ROWSPAN=3></TD>
4. You cannot have a table without a <TD> tag, unless you are using a <TH> tag.
Q260) What happens to a cell in a table marked column A if you increase the height of
cell in the same table marked column B?
1. A cell in column A cannot be affected by a change in column B
2. A cell in column A experiences a height change in the same way as any cell in
column B
3. A cell in column A is only affected if you alter a cell in row B as well
4. The cells in column A and column B, if on the same row, would share a height
change
Q261) In an HTML Web form, a CGI script can perform which of the following tasks?
1. Download a script to a client and execute on a host computer through such
languages as JavaScript or VBScript via a client side action
2. Residing on the server, a CGI script can remove extraneous information and
format data
3. Execute script within a server process and send the results to the the user
dynamically
4. 1 and 2
Q262) What happens when a form lacks appropriate tags?
1. Internet Explorer and Navigator will not display the form
2. Internet Explorer will display the form but will not submit and Navigator will not
show the form
3. Internet Explorer will display the form and allow you to submit and Navigator
will show the form, but will not let you submit
4. Internet Explorer and Navigator will not display the form
Q263) When building a form, what is the best choice to send two or more mutually
exclusive options?
1. Radio Buttons
2. Multiple Select List
3. Select List
4. Check Box
Q264) A GIF file has an image map associated with it. Here are the following coordinates
taken directly from the HTML string describing its location: 57,79,160,225. Using the
HTML format convention for defining a rectangular image, what dimension does 57
describe?
1. The number of pixels from the left of the image to the left of the rectangular image
map, or upper-left x coordinate
2. The number of pixels from the top of the image to the top of the rectangular image
map, or upper-left y coordinate
3. The number of pixels from the bottom right of the image from the bottom-right of
the rectangle, or bottom-right x coordinate
4. The number of pixels from the bottom of the image to the bottom of the
rectangular image map, or bottom-right y coordinate
Q265) Which of the following statements is not true.
1. To define a circle area image map you need the x and y coordinates, as well as the
radius of the circle you wish to define.
2. To define a polygonal image map, you need to define each individual set of x and
y coordinates for each point that defines the polygon.
3. A polygon image map can only support up to 100 pairs of coordinates per image.
4. To define a square image map you only need to supply an x coordinate and HTML
will auto assign a y coordinate, thus completing an image map for a square.
Q266) What web ready image formats support transparency?
1. GIF 89a
2. PNG
3. JPEG
4. GIF 87a (some graphics programs allow you to save a GIF 89a as a GIF87a,
choosing an option that retains transparency)
5. 1, 2, 3
6. 1, 2, 4
Q267) What are the possible side effects of using interlaced images in a Web page?
1. Interlacing can sometimes make an image larger
2. Interlacing will cause an image to download at a rate of 10% per pass and this
can frustrate users
3. Interlacing is only useful on browsers set up to accept JavaScripts
4. Interlacing an image will make it invisible to the user until it is done downloading
Q268) What is the primary goal of a corporate Web developer?
1. Always impress the user with fancy graphics and many tables
2. Establish a site with huge lists of links so that users can find what they want
3. Help a company reinforce its branding strategy
4. Only use the latest technology for your pages
Q269) What do Cascading Style Sheets not do?
1. Link a CSS sheet to multiple Web pages, allowing a user to make one change in
the CSS in order to affect the change to all associated pages.
2. Allows multiple declarations within a rule using semicolons
3. Uses inheritance to affect style throughout the document, unless otherwise
dictated by a property of superior precedence
4. Choosing a selector allows the user to define a property and its associated value,
thus creating a rule
5. 3 and 4
6. CSS rules obey answers 1, 2, 3, and 4
Q270) Given a 56 Kilobit per second download speed, theoretically how quickly will a
84Kilobyte Web page take to download?
1. 30 seconds
2. 11 seconds
3. 12 seconds
4. 9 seconds
Q271) Where exactly would you place content in a Web page to increase the likelihood a
search engine spider program will find it?
1. <META>
2. <BODY>
3. In the DTD
4. URL
Q272) How do XML and DTD relate to each other?
1. XML is a programming language and DTD is the browser you use to view XML
2. XML describes the function and context of a Web page's content. DTD assigns the
meaning to the custom tags you developed in XML for the corresponding
document, assigning validity to the XML
3. XML is SGML with JavaScript and DTD is the means of ensuring it is "well
formed"
4. XML the means of assigning function to Web content and DTD is the tag
necessary to allow the use of XML
Q273) What is the correct hierarchy for the following Java objects?
1. Window, frame, anchor, button
2. Window, anchor, frame, button
3. Anchor, window, button, frame
4. Frame, window, anchor, button
Q274) How many elements make up the client/server model?
1. 3
2. 2
3. 4
4. 1
Q275) What does the history folder on your Internet browser contain?
1. GIF and JPEG files
2. Recently downloaded applets
3. A list of URLs for previously viewed Web sites
4. All of the above
Q276) What action would you take if you needed to configure a browser for an individual
who does a lot of internet research using Web sites where content changes frequently, like
stock prices
1. Configure disk cache to a lower level and set the cache comparison to every time
you start the program
2. Configure disk cache to a higher level and set the cache comparison to every time
you view the page
3. Configure disk cache to a lower level and set the cache comparison to
automatically
4. Configure disk cache to a higher level and set the cache comparison to every time
you view the page
Q277) What are the primary reasons that a company would ask employees to disable
active content on their browsers?
1. Limits bandwidth consumption over networks
2. Protects servers from possible security compromises
3. Stops the use of email for personal purposes
4. Forces the employees to use the Internet for business purposes only
5. 1 and 2
6. 1, 3, and 4
7. 1, 2, and 3
Q278) What is a cookie?
1. A small Java executable delivered by a web server to a client
2. An HTML snippet that contains your customer data uploaded to the host web
server
3. A small text file created by a web server that resides on a client's computer
4. An active X applet that exists on each HTML page and registers each time you
visit
Q279) A firewall is comprised of what components?
1. Hardware, software, and corporate policies
2. Hardware and software
3. Corporate policies and software
4. Only software
5. Corporate policies and hardware
6. None of the above
Q280) Which standard browser security level grouping is correct?
1. Explorer 4, Navigator 2
2. Explorer 2, Navigator 1
3. Explorer 2, Navigator 3
4. Explorer 3, Navigator 1
Q281) How many general types of authentication exist for Web pages?
1. 2
2. 4
3. 1
4. 5
5. 3
Q282) Of the following, which is the least efficient way to search Web content?
1. Boolean strings
2. Keyword index
3. Full-text index
4. Static index/site map
Q283) Which of the following is not a Boolean operator?
1. IF
2. AND NOT
3. ()
4. ""
5. THEN
6. all of the above
7. A and E
8. C and D
Q284) Which of the following engines are case sensitive when using Boolean operators?
1. Excite
2. Lycos
3. AltaVista
4. None of the above
Q285) If you want to conduct a search on Hats and exclude references to Cat in the Hat,
what would your search string need to look like if you are using standard AltaVista?
1. Cat NOT (Cat in the Hat)
2. (Cat) -hat
3. Cat +NOT "in the hat"
4. Cat -"in the hat"
Q286) Choose the list that displays the most appropriate order of relevance if you were to
go to the web searching for late breaking news on how a U.S. corporate merger will
affect exchange rates in Denmark.
1. Currency exchange site >> Newspaper site >> SEC site
2. Newspaper site >> Currency exchange site >> SEC site
3. Newspaper site >> SEC site >> Currency exchange site
4. Currency exchange site >> SEC site >> Newspaper site
Q287) What is the method for accessing the U.S. copyright database?
1. Telnet
2. Boolean operator
3. T1
4. only available in print
5. none of the above
6. 1 and 3
1. Plug-ins contain files for viewing over the Internet and viewers are scaled down
applications used to access certain file types
2. Plug-ins are specific platform and browser applications that provide integration
of multimedia formats and viewers are the same as plug-ins, but only work in
desktop applications
3. Plug-ins are for viewing files were a normal application would be too large and
viewers are for viewing documents optimized for the web where you have the full
application available for Active X support
4. Plug-ins are applications that are browser and platform specific permitting
integration of multimedia contents for the PC and browser and viewers are scaled
down versions of applications that are needed, often only for viewing and
printing, of files where the full application is not available for use on that
computer
Q294) How many primary elements comprise electronic commerce?
1. 2
2. 3
3. none currently defined
4. 4
Q295) Which is a description of the primary benefits of SET?
1. Enables easy and inexpensive communication, reduces the amount of data
capture, and ensures fast handling of cash flow
2. Protects expression and originality
3. Provides enhanced identification, protects credit card information from the
vendor, encrypts all sensitive information between parties, and facilitates
financial transactions
4. Enables large volume of repetitive standard transactions, help operators on tight
margins, and allows users to function in time-sensitive environments
Q296) What is the relationship between IITF and WIPO?
1. Both are organizations concerned with protecting intellectual property
2. Both are authentication standards for e-commerce transactions between nations
3. IITF is for the music industry and WIPO is for weapons systems and
cryptography
4. There is no relationship between the two products
Q297) How many types of smart cards are there?
1. 1
2. 2
3. 3
4. 4
Q298) What is scope creep?
1. A type of on-line purchasing security violation where the digital thread containing
the secured information is transparently bifurcated to a shell account
3. IP
4. IGMP
Q333) Which of these is a fast packet switching technology that uses fiber optic and
digital cabling and makes use of variable length packets?
1. ATM
2. frame relay
3. X.25
4. PPP
Q334) Which of the following is the first point of contact for T1 wires that are connecting
to a LAN?
1. DSU
2. multiplexor
3. CSU
4. router
Q335) Which routing protocol allows load balancing, partitioning of a network into areas,
and various types of service routing?
1. OSPF
2. EGP
3. BGP
4. RIP
Q336) Which diagnostic tool tests connectivity between source and destination systems?
1. ipconfig
2. netstat
3. ping
4. tracert
Q337) Which of the following network components is incorrectly paired with its OSI/RM
layer of operation?
1. repeaters: Physical layer (Layer 1)
2. gateways: Any layer
3. routers: Physical layer (Layer 1)
4. brouters: Data Link and Network layers (Layers 2 and 3)
Q338) Which is the most commonly used type of cable?
1. solid STP
2. solid UTP
3. stranded STP
4. stranded UTP
Q339) The following is a list of cable types and their possible uses. Which is incorrect?
1. multimode fiber optic: LANs and WANs
2. thicknet: ethernet standard for smaller networks
VBScript
JavaScript
Jscript
Java
Q352) Which of the following is an open set of technologies for integrating components
on the web?
1.
2.
3.
4.
Java applets
JavaScript
Plug-in
ActiveX
Q353) Recently developed to enhance the security and capabilities of e-commerce, this
protcol features enhanced identification, the passing of encrypted credit card information
that only the merchant's bank can access, and encryption of all sensitive information
among all parties involved:
1. EDI
2. SSL
3. SET
4. business-to-business model
Q354) Which of the following has been shown NOT to be an effective manner of internet
advertising?
1. referrer bonus
2. contest promotions
3. banner ads
4. partnerships
Q355) Which of the following e-commerce payment methods enhances authentication
and is capable of storing and updating passwords and other security information?
1. cash model
2. smart cards
3. credit model
4. check model
Q356) Which layer of the OSI/RM provides useful transformations on data to support a
standardized application interface?
1. Data Link Layer
2. Session Layer
3. Application Layer
4. Presentation Layer
Q357) Which of the following is a token-based LAN standard composed of two counterrotating rings and is often used to cover a city or specific geographic area?
1. Apple LocalTalk
2. FDDI
3. Gigabit Ethernet
4. Ethernet/IEEE 802.3
Q358) Which of the following WAN standards is implemented at the MAC sublayer of
the data link layer and uses fixed-sized cells to support data as well as real-time video and
voice?
1. frame relay
3. .Ca
4. .Net
Q380) Which class of IP addresses uses 8 bits for the Network portion and 24 bits for the
host?
1. Class A
2. Class B
3. Class C
4. Class D
5. Class E
Q381) Which class of IP addresses uses 24 bits for the Network portion and 8 bits for the
host?
1. Class A
2. Class B
3. Class C
4. Class D
5. Class E
Q382) Which class of IP addresses uses 16 bits for the Network portion and 16 bits for
the host?
1. Class A
2. Class B
3. Class C
4. Class D
5. Class E
Q383) Which class of IP addresses is reserved for future use?
1. Class A
2. Class B
3. Class C
4. Class D
5. Class E
Q384) Which class of IP addresses supports Multicasting?
1. Class A
2. Class B
3. Class C
4. Class D
5. Class E
Q385) Block-Level tags are: (choose 2)
1. Elements that affect an entire paragraph or multiple paragraphs.
2. Elements that can affect something as small as a character or a word.
3. Elements that are automatically preceded and followed by paragraph breaks
4. Elements that are not followed by breaks unless the breaks are manually included.
2. Frame Relay
3. SSL
4. SET
Q400) jerome compiles a, an ASP script to work along with his web site, he decides to
test it before implementing it. The script goes through the phases although when it tries to
query the database, it receives an error. What is the problem?
1. The script was not compiled properly
2. The script does not have the necessary permissions to query the database
3. The script has not been chained properly
4. Wrong OS, needs Unix OS to function properly
Q401) An HTML tag can consist of an element, an attribute and a value, enclosed within
a pair of angle brackets or "wickets." Which of the following items constitutes the
minimum requirement for the most basic tag?
1.
2.
3.
4.
Q402) Franco wants to implement a backup solution for his Web server. If the Web
server's hard drive fails, an exact duplicate of the failed drive must exist on another drive
or server. Which data redundancy server should Franco implement?
1. Caching server
2. List server
3. Catalog server
4. Mirrored server
Q403) Eva wants to send an e-mail message to a co-worker named Gregor. Gregor has an
e-mail account on a mail server named colossustravel.com. His e-mail account name on
this server is gregor. Which e-mail address format should Eva use to ensure that Gregor
receives her Internet e-mail message?
1. gregor@colossustravel.com
2. gregor%colossustravel.com
3. gregor#colossustravel.com
4. gregor!colossustravel.com
Q404) Althea needs information about ballpoint pens. She wants to find Web pages based
only on the words "ballpoint" and "pen" when they appear together. On most Web search
engines, which of the following searches would best meet Altheas needs?
1. Search first on "ballpoint" then on "pen"
2. "ballpoint pen"
3. Search first on "pen" then on "ballpoint"
4. ballpoint+pen
Q405) Maja is building a Web site for a client. The client wants a text message to appear
while the image myimage.gif is downloading to the visitor's browser. Which HTML
syntax will produce this result?
1. <IMG SRC="myimage.gif" ALT="Company Logo">
2. <IMG SRC="myimage.gif" INPUT TYPE="Company Logo">
3. <IMG SRC="myimage.gif" NAME="Company Logo">
4. <IMG SRC="myimage.gif" TEXTAREA="Company Logo">
Q406) The HTML <META> tag can be used to describe the contents of your Web page.
This description appears in a search engine when your site is returned as a search result.
Which of the following choices uses the correct <META> tag syntax to specify a
description for a pet-sitting site?
1. <META SEARCH="contents" DESCRIPTION="We provide complete pet-sitting
services.">
2. <META NAME="description" CONTENT="We provide complete pet-sitting
services.">
3. <META DESCRIPTION="We provide complete pet-sitting services.">
4. <META CONTENT="description"> We provide complete pet-sitting services.
</META>
Q407) The current version of HTML ratified by the W3C is HTML 4.0, which includes
three variants or "flavors" of the specification. Which of the following choices lists the
three flavors of the HTML 4.0 standard?
1. Recommended, Dynamic, and Cascading
2. Transitional, Strict, and Frameset
3. Linked, Embedded, and Inline
4. DHTML, CSS, and XML
Q408) Internet domain names sometimes use a country-level domain, or country code, to
identify the geographical region in which an Internet organization or address is based.
Which of the following choices demonstrates the proper syntax for a country-level
domain?
1. mx.salsa.com
2. londontimes.co.uk
3. britishlore.eng
4. bonjour.fra.com
Q409) Why would it be necessary to disable active content from downloading into your
browser? (Select the two best answers.)
1. Your browser only supports 56 Kbps
2. You want to view Java applets and ActiveX components
3. Origin of active content may be questionable
4. You have limited bandwidth
Q410) Cicero wants to implement an e-mail system that will operate on TCP/IP networks.
Which of the following protocols supports e-mail on TCP/IP networks?
1.
2.
3.
4.
NetBEUI/NetBIOS
SMTP/POP3
IPX/IMAP
LPR/LPD
Q411) A popular Windows file compression software file extension used for making
downloads available on the Internet:
1. ASP
2. Tar
3. Zip
4. Doc
5. All of the above
Q412) The acronym ISP is an abbreviation for the folowing terms:
1. Internet Service Provider
2. Independent Systems Programmer
3. Integrated Service Provider
4. None of the above
Q413) The client computer software package that allows the transfer of files between two
computers:
1. File Transfer Protocol
2. File Transfer Process
3. Transfer Software Protocol
4. Software Transfer Protocol
Q414) The communications protocol commonly used on the Internet:
1. Netbios
2. Netbeui
3. IPX/SPX
4. TCP/IP
5. All of the above
Q415) The communications protocol used to allow a user at one site to connect with a
remote system at another site as if the user's terminal were directly connected:
1. Gopher
2. TFTP
3. HTTP
4. Telnet
5. None of the above
Q416) An example of a Internet search engine that is highly automated and initiates a
"robot" or "spider" program that automatically searches the Web and indexes Web sites:
1. Gopher
2. Lycos
3. AltaVista
4. Yahoo
5. None of the above
Q417) A means of transferring files between computers:
1. telnet
2. FTP
3. TCP/IP
4. Gopher
5. BGP
Q418) Client software that allows the end user to communicate and request information
from a server:
1. Real Audio Player
2. Microsoft Internet Explorer
3. Winfax
4. both a and b
5. all of the above
Q419) Small text files placed on a Web site visitor's computer:
1. Javascript
2. GIF's
3. JPEG's
4. none of the above
Q420) Applications used for scrambling information using mathematical algorithms.
1. encryption
2. virus detection and removal
3. firewall
4. none of the above
Q421) The authentication type that encrypts a user name and password being sent:
1. anonymous access
2. basic authentication
3. secure authentication
4. digital certificates
5. none of the above
Q422) Installable multimedia applications that integrate with the Web browser and
operating system on a computer:
1. plug-ins
2. Microsoft Office
3. Adobe Photoshop
4. none of the above
Q423) The file format that maintains the document formatting originally created that can
be rendered on other platforms:
1.
2.
3.
4.
VRML
Shockwave
QuickTime
PDF
5. a and d
6. none of the above
Q430) The equipment interface between a computer workstation or server and the
network:
1. switch
2. hub
3. bridge
4. router
5. none of the above
Q431) Examples of routing protocols used outside an organization's network:
1. ATM and frame relay
2. netbios and netbeui
3. EGP and BGP
4. RIP and OSPF
5. none of the above
Q432) A fixed piece of formatted information sent across a network:
1. packet
2. protocol
3. byte
4. bit
Q433) A junction between one high-speed network backbone and another high-speed
network:
1. NIC
2. NAP
3. PAP
4. none of the above
Q434) An example of broadband packing switching technology:
1. T1/T3
2. token ring
3. ethernet
4. frame relay
5. none of the above
Q435) An IP address range reserved for use on private Intranets:
1. 121.1.1.1 thru 121.131.1.1
2. 168.100.1.32 thru 168.200.1.1
3. 172.16.16.0.0 thru 172.31.255.255
4. both b and c above
Q436) A packet filter can be defined as:
1. a type of firewall that inspects only network header fields after analyzing Internet
addresses and port numbers
2. an access control firewall
3. a type of gateway that screens e-mail message packets
4. a type of firewall that inspects only Internet addresses and port numbers after
analyzing network header fields
5. a type of gateway that screens application packets
Q437) Asymmetric encryption uses:
1. three-way algorithm
2. Secure State Level (SSL) keys
3. a pair of private keys
4. a symmetric RC-series algorithm
5. a pair of keys, one public and one private
Q438) The IP number 186.3.56.78 uses which default subnet mask?
1. 255.0.0.0
2. 255.255.0.0
3. 255.255.255.0
4. 255.255.255.255
Q439) Which version of HTML 4.0 can use CSS?
1. Transitional
2. Structured
3. Strict
4. Formal
Q440) Which of the following are true about 10base2 cable?
1. Maximum length of 185 feet
2. It is also referred to as thinnet
3. It requires an RJ-45 connector
4. It is coaxial cable
Q441) Which of the following is the correct syntax for an HTML comment tag?
1. <-- Comment -->
2. // Comment --//
3. //-- Comment -->
4. </neglectcomment ....../>
Q442) Which of the following uses a pair of private keys?
1. Asymmetric encryption
2. Symmetric encryption
3. One way hash
4. Public encryption
Q443) Which of the following sends information in 53 byte cells?
1.
2.
3.
4.
Token ring
ATM
ISDN
SONET
6. SMTP
7. Archie
8. Veronica
Q450) Which of the following protocols are used with Usenet?
1. SMTP
2. SNMP
3. FTP
4. HTTP
5. NNTP
6. PPP
7. ISAPI
Q451) John needs to send a file to Rudy in another state. Unfortunately, the large file size
is prohibited by the ISP. How can John transfer the file?
1. IMAP
2. FTP
3. SMTP
4. Archie
Q452) Which of the following are needed to connect a T1 line to a company network?
1. CSU/DSU/Multiplexor
2. Nic card
3. Hub
4. Proxy server
Q453) The major difference between the <br> and <p> tag is that <br> forces a break
with a white space, whereas <p> is essentially just a line return.
1. True
2. False
Q454) In the tag <img src="myciw.gif" alt="myciw">, the alt attribute does which of the
following?
1. Gives an alternate file in case the first file is corrupted
2. Gives an alternate file in case .gif files can't be downloaded by the browser
3. Links to a picture of myciw
4. Displays text while the image is loading
Q455) The IP number 152.9.56.28 belongs to which class?
1. A
2. B
3. C
4. D
Q456) Which of the following servers is generally used to cache information?
1. Database
2. Firewall
3. Proxy
4. Catalog
Q457) Mary is looking for a book on miniature poodles to buy for her niece as a birthday
present. Which of the following will yield the best list?
1. miniature + poodles
2. "miniature poodles"
3. miniature or poodles
4. miniature poodles
5. <miniature and poodles>
Q458) If you want to create a company directory that can be accessed by all the
employees across a LAN, you would use a?
1. RAS
2. Router port
3. Proxy server
4. LDAP server
Q459) Which of the following are empty tags?
1. Li
2. Meta
3. Br
4. Colspan
Q460) The OSI model consists of a series of layers. Which of the following are the
correct sequence?
1. Application, Presentation, Network, Session, Transport, Data Link, Physical
2. Application, Presentation, Session, Transport, Network, Data Link, Physical
3. Application, Presentation, Transport, Network, Session, Data Link, Physical
4. Application, Presentation, Session, Network, Transport, Data Link, Physical
Q461) Which of the following tags are used to create lists? (pick three)
1. <dl>
2. <ol>
3. <li>
4. <dd>
5. <ul>
Q462) James needs to create a web page that will either say, "Good Morning", "Good
Afternoon", or "Good Evening", based on the time of day. What kind of scripting would
be best for james to use?
1. Client Side Scripting
2. Server Side Scripting
3. DHTML Scripting
4. Any of the above would be equally appropriate
he decrypts Bob's digital signature with his copy of Bob's public key. What will
authenticate the message?
1. If the signature's hash value matches the recieved signatures hash value, the
message, it has not been altered.
2. If the lawyer is able to open and view the message by using his copy of the public
key, the message has not been altered.
3. If the lawyer is able to open the message by using his password, the message has
not been altered.
4. If the lawyer is about to open the message using his private key, the message has
not been altered.
Q470) You can measure a router's capability by it's __?__ rate.
1. Transfer
2. MBPS
3. BPS
4. PPS
Q471) A __?__ is a group of computers connected within a confined geographic area, that
allows users to share files and services.
1. WAN
2. LAN
3. Wide Area Network
4. NAP
Q472) Choose the decimal equivalent for this binary value: 01111000 00000001
00000011 11110000.
1. 126.2.3.240
2. 255.216.120.64
3. 120.1.3.240
4. 216.122.12.64
Q473) __?__ is a high capacity cable used for video and communication networks. It
contains a signal wire at the center, which is either stranded or solid, surrounded by a
metallic shield that serves as a ground
1. Twisted Pair
2. Coaxial Cable
3. RJ 45
4. Fiber Optic Cable
Q474) Which statement is correct regarding cookies?
1. Cookies never contain information about you and your preferences.
2. Cookies can be used to view private information about you or your computer
system.
3. It is possible in some browsers to specify that you be alerted when a server
attempts to give your browser a cookie.
4. When a Web site creates a cookie about you it will be able to access your e-mail
address, even if you didn't provide it.
Q475) Melanie is creating a new HTML document for her Web Site. What should
Melanie do to make sure Web bbrowsers will correctly interpret her new document?
1. Use browser specific HTML tags
2. Use the latest version of HTML
3. Use an HTML GUI editor like Dreamweaver
4. Test the document in various Web browsers.
Q476) Mary is e-mailing all employees the new mailing address to the new corporate
office. Mary is including pictures in her e-mail of the office for those employees who
work remotely. What is the inclusion of this file in an e-mail known as?
1. Attachment
2. JPEG
3. BMP
4. TIFF
5. GIF
Q477) John has been given the responsibility of making certain that his company is
secure in its use of the Internet. One of the areas of concern is keeping the network from
being attacked through its Internet connections. What should John use for the purpose of
isolating information from intruders?
1. Firewalls
2. Passwords
3. Certificates
4. Authentication
Q478) Which is considered a public switched network WAN connection?
1. ISDN
2. X.25
3. T1/E1
4. T3/E3
Q479) What do HTML elements that are categorized as block-level elements affect?
1. word
2. line
3. character
4. paragraph
Q480) Which strategy should a Web designer use to have a Web site placed high on a
search engine's results list?
1. Employ frames in the web site
2. Use more graphics than text
3. Focus on keywords one to two words in length
4. Use keywords in strategic places like the page title
Q481) Web browsers are used to access documents on a World Wide Web server. Which
protocol is used between the client and the web server for this purpose?
1. UDP
2. DNS
3. NNTP
4. FTP
5. HTTP
Q482) Mandy has placed the following HTML code in her Web document: <BODY
VLINK="#000000">. What is she trying to achieve with this code?
1. Set the visited hyperlink color to black.
2. Set the unvisited hyperlink color to black.
3. Set the color of the hyperlink upon clicking to black.
4. Set the color of the hyperlink upon mouse over to black
Q483) Pierre wants to add a cell to the top row of his table that spans three rows. He also
wants the text in this cell to be aligned at the center of the cell. Which tag will he add to
his table?
1. <TR ROWSPAN="3" VALIN="center">text</TR>
2. <TD ROWSPAN="3" VALIN="center">text</TD>
3. <TR COLSPAN="3" VALIN="center">text</TR>
4. <TD COLSPAN="3" VALIN="center">text</TD>
Q484) Which statement about HTML tags is true?
1. Tags must be written using uppercase letters
2. Tag attributes are included in the closing tag
3. Tags are surrounded by left and right angle brackets.
4. Tags unsupported by a browser will cause an error message
Q485) George is modifying a Web document that is defined in its Document Type
Declaration as HTML 4.0 Transitional. What will this Web document most likely
exclude?
1. Empty tags
2. Formatting tags
3. Depreciated tags
4. Cascading Style Sheets
Q486) Sophie thinks two computers may have assigned the same IP address. Sophie
would like to see the IP addresses that are assigned to each computer in order to
determine which two computers have been assigned the same IP address. Which is a
protocol used for this purpose?
1. ARP
2. MAC
3. DCHP
4. Gateway
Q487) Nick is a Web developer at RUWithMe.Co.Uk. He has been charged with placing
a META tag on the RUWithMe home page to list keywords for search engine indexing.
Which two attributes will Nick use to list keywords in the META tag?
1. NAME and CONTENT
2. KEYWORDS and HREF
3. TYPE and DATA
4. ACTION and TEXT
Q488) Which is a method of encryption that makes use of one key for encryption and
decryption of mail messages?
1. Private-Key
2. Public-Key
3. Encryption Algorithm
4. Hashing Algorithm
Q489)Which three tags will display text in a fixed-width font?
1. <SAMP><CODE><KBD>
2. <LABEL><DIV><CITE>
3. <CAPTION><TITLE><MAP>
4. <SELECT><META><TEXTAREA>
Q490)You are responsible for assigning IP addresses to 100 machines. Which would be
the most efficient method of assigning the IP addresses and the most efficient way to
maintain them in the future?
1. HOSTS file
2. Proxy configuration
3. Static assignment of IP addresses
4. Dynamic Host Configuration Protocol
Q491)Which is a query language used to extract information from relational databases?
1. API
2. DLL
3. SQL
4. CGI
Q492)Which technology allows Web designers to create Web pages that are responsive to
users, which is based on HTML 4.0, the DOM (Document Object Model), scripting
languages, and Cascading Style Sheets?
1. XML
2. DHTML
3. XHTML
4. Javascript
5. SGML
Q493) Vinod has just installed TCP/IP and he isn't certain that it has initialized. Which
utility will provide this information?
1.
2.
3.
4.
Ping
Route
Netstat
Ipconfig
Q500) The Internet was formed in 1968 by the united States Department of Defense.
Which was the network formed by the United States Department of Defense that became
the basis for the Internet?
1. Advanced Research Projects Agency Network (ARPANET)
2. IS (Internet Society)
3. InterNIC (Internet Network information Center)
4. Internet Engineering Task Force (IETF)
Q501) What must a client computer's operating system support in order to connect to the
Internet?
1. TCP/IP
2. Router
3. Host Files
4. UDP Protocol
Q502) What symbol is used to relate a persons name to a domain name when sending email?
1. %
2. &
3. @
4. #
5. !
6. "
Q503) Which network protocol is a non-routable protocol that allows different
applications on different computers using NetBIOS to communicate with one another?
1. TCP/IP
2. NetBEUI
3. DDP
4. UDP
5. IP
Q504) Which is a file type that allows for email messages that contain sound file
attachments to be transmitted and recieved?
1. BMP
2. GIF
3. RA
4. WAV
5. MIME
6. S/MIME
7. JPEG
8. MP3
Q505) When bandwidth is an issue, upgrading to compensate is cost prohibitive, you
could segment your network. Place the users who generate the most traffic on the
network into a seperate segment, and place the users who generate the least traffic on the
network in another segment. Which is used for this purpose?
1. Hub
2. Bridge
3. Adapter
4. Gateway
Q506) Consider the following HTMl code; <HR SIZE="7" WIDTH="75" NOSHADE>.
What will this code render in a browser?
1. A center-aligned, heavy weight, solid, horizontal line that is 75 pixels long.
2. A left-aligned, heavy weight, solid, horizontal line that is 75 pixels long.
3. A left-aligned, thin, shaded, horizontal line that is 75% of the browser window in
length.
4. A center-aligned, thin, shaded, horizontal line that is 75% of the browser window
in length.
Q507) Dave has 10 computers connected to one main computer. The main computer
stores much of the software and files that employees in Daves company need to access.
What is the main computer known as?
1. Client
2. Terminal
3. Server
4. Database
Q508) Which statement is true regarding HTML headings?
1. Headings are a type of empty tag.
2. <H1> is the smallest heading style.
3. HTML 4.0 offers seven heading levels.
4. Headings include a preceding and following paragraph break.
Q509) Sophie has become aware of a new virus that is disabling e-mail systems, but she
is sure that it has not infected her computer. What should ophie do as a first step to
combating this virus outbreak?
1. Run her antivirus emergency boot disk
2. Run an on-access scan of all computer files
3. Run a full on-demand scan of the entire computer system
4. Get the latest update of the definition files for the virus program
Q510) Jeremy does a tremendous amount of research on the Web. During this research
Web pages are downloaded and stored on Jeremys computer. To keep from running out of
hard disk space, which could be caused from the many downloaded pages, what should
Jeremy do?
1. Clear the browser history
2. Place a size limit on the browser cache
3. Disable cookies
4. Disable active content
4. Directory server
Q518) Ibrar is looking at the following HTML code; <FORM><INPUT
TYPE="text"><INPUT TYPE="radio" VALUE="no">No</FORM>. What does this
code represent?
1. Three form fields - a text box, a radio button, and a checkbox
2. Three form fields - two text boxes and a radio button
3. Two form fields - a text box and a radio button
4. Two form fields - a text box and a checkbox
Q519) Sophie does not want to have cookies enabled in her Internet browser. Where
should she go to disable cookies in Internet Explorer?
1. Tools Menu
2. Accessories
3. Programs from the Start Menu
4. Control panel in Windows 95 or 98
Q520) What are the two types of HTML tags?
1. Container/empty
2. Opening/closing
3. Begining/ending
4. Elements/attributes
Q521) What is the term used in project management to refer to gradual change in a
project such as schedule changes and/or cost that can be detrimental to a project if
overlooked?
1. Scope Creep
2. Performance risks
3. Scope matrix
4. Pilot/parrellel
Q522) CIWcertified.com has an Internet Address associated with the site name. However,
it is much easier to remember a name than a number. Which is used to resolve a name to
an IP address?
1. DHCP
2. IMAP
3. Telnet
4. DNS
Q523) James has computers that are connected to the server via modems. James would
like these computers to become an actual node on the Internet. In doing so James wants
to have error checking and encryption capabilities as well. Which is a communications
protocol that will accomplish this for James?
1. RSA
2. SSL
3. PPP
4. SLIP
Q524) Which statement is false about emptying a Web browsers cache?
1. Hard drive space will be freed.
2. Old Web pages will be deleted from the client-side.
3. The modem will gain additional bandwidth.
4. The browser must download pages that were viewed earlier.
Q525) What will be needed in the configuration process of TCP/IP in order for computers
on a Local Area Network to be able to communicate?
1. IP address
2. Dial-up connection
3. Subnet mask address
4. IP address and Subnet mask
Q526) Which is the international domain name used to refer to Switzerland?
1. .ca
2. .ch
3. .cm
4. .cv
Q527) Which octet(s) is used for the host ID in a Class A address?
1. First
2. Third
3. Second
4. Last three octets
Q528) Which tag is an example of a text-level element?
1. <B>
2. <PRE>
3. <H1>
4. <BR>
Q529) Brunos company Web site makes use of asymmetric cryptology to protect their
customers who use their credit cards online. Which statement best describes how
asymmetric cryptology protects credit card information traveling to Brunos web site?
1. Credit card data is being encrypted using a public key and when sent to Brunos
company, a private key will be used to decrypt the credit card data.
2. Credit card data on Brunos site will be encrypted using a public key and will be
decypted when recieved with the same public key held by Brunos company.
3. Credit card data is being encrypted using a digital certificate of authority and
will be decrypted when recieved with Brunos company digital certificate.
4. Credit card data submitted is protected through the use of a private key, used to
decrypt what is being submitted and the same key will be used to decrypt the
information when recieved by Brunos company for processing.
Q530) Ibrar is creating a Web document. He has typed a line of text that he now wants to
end. In addition, he wants two lines of blank space between this line and the new one he
is about to type. What HTML code will create the desired effect?
1. <P><P>
2. <P><BR>
3. <BR><BR>
4. Press 'Enter' three times
Q531)Where do you go to configure the sending and recieving of mail within Netscape
Messenger?
1. Control Panel
2. Edit menu within Netscape Messenger
3. File menu within Netscape Messenger
4. Message menu within Netscape Messenger
Q532)Which markup language allows designers to create custom markups?
1. HTML
2. XML
3. SGML
4. DHTML
Q533)Which is used to translate between different protocols?
1. ISP
2. ARP
3. Bridge
4. Gateway
Q534) Bandwidth is an important part of the functionality of an Internet site. Which best
describes bandwidth?
1. Bandwidth is the number of hits a Web site recieves
2. Bandwidth is the amount of times it takes the Web server to send a signal
3. Bandwidth is the amount of time the computer waits for a response from another
computer
4. Bandwidth is the maximum amount of data that can be transmitted over a certain
amount of time
Q535) Nick often send confidential information over the Internet. Nick is aware that this
information could be intercepted as it travels over the Internet so he wants to employ a
method that would keep all but the intended recipient from viewing the contents of the email. What should he use to secure the contents of his e-mails?
1. Encryption
2. Certificate
3. Authentication
4. Digital Signatures
Q536) HTML files can be managed among many different platforms including Windows,
Macintosh, and UNIX. To avoid problems with HTML files rendering in browsers, what
should Web designers know when naming HTML files?
1. Spaces are acceptable
2. Filenames are not case sensitive
3. Extensions should be either .htm or .html
4. Characters like pound signs are acceptable
Q537) Marvin has discovered that the computer host he has been sending credit card
information to is not a trusted host. Which type of attack is Marvin experiencing?
1. Syn
2. Spam
3. Spoofing
4. Ping flood
Q538) Which is a point-to-point connection used for LANs and WANs that uses cellswitching technology?
1. ISDN
2. DDS
3. ATM
4. SONET
Q539) Sophie uses Windows NT 4.0 and she will be using multiple protocols. Sophie
must bind any protocols she plans to use to her NIC. Which option from the Control
Panel should Sophie start with to begin the needed steps to complete this?
1. Network
2. Add/Remove Programs
3. System
4. Regional Settings
Q540) Kims company has a server in place used to store unique electronic credentials of
their Internet customers. When customers submit their credit card information this server
will look at the stored electronic credential and verify the identity of the one submitting
the credit card information. Which type of server is Kim using for this purpose?
1. FTP
2. Cache
3. E-commerce
4. Certificate
Q541) Dave uses Windows 98 on his computer and he has been unable to establish a
connection to the Internet. He feels like the problem may be a TCP/IP problem. Which
can Dave use to see if there is a TCP/IP configuration problem?
1. Ipconfig
2. ARP
3. Tracert
4. Winipcfg
Q542) Which is a TCP/IP protocol that would allow Jeff, who is sitting at his computer in
Brixton, to logon to the RUWithMe.Co.Uk server in London, given that he has the
appropriate permissions to do so?
1. LPR
2. NNTP
3. LDAP
4. Telnet
Q543) Which is a system used on the Internet to ensure the security of credit card
transactions?
1. SSL
2. PGP
3. SET
4. S/MIME
Q544) Which language can be used for programming Internet applications and is
platform-independent?
1. C
2. C++
3. Java
4. COBOL
Q545) Which is a true statement relative to networking protocols?
1. Never combine multiple protocols such as TCP/IP and IPX/SPX
2. Routable and non-routable protocols can be combined in a routed network for
network efficiency
3. Using multiple protocols can decrease the time it takes to maintain and
troubleshoot a network
4. Do not combine NetBEUI and TCP/IP an the same network
Q546) Which network component will provide a central connection point for all your
network devices and provide more bandwidth for those devices?
1. Switch
2. Router
3. Bridge
4. Gateway
Q547) Sophie has gone to the Lotus Web site by keying in www.lotus.com/newsviews.
The URL that appears afterwards is www.lotus.com/home.nsf/welcome/newsviews.
Which portion of this address represents the fully qualified domain name?
1. www.lotus.com
2. www.lotus.com/home.nsf/
3. www.lotus.com/home.nsf/welcome
4. www.lotus.com/home.nsf/welcome/newsviews
Q548) Which is an agency that assigns and regulates IP addesses on the Intenet?
1.
2.
3.
4.
IS (Internet Society)
Internet Engineering Task Force (IETF)
World Wide Web Consortium (W3C)
InterNIC (Intenet Network Information Center)
Q549) Faraz always wants his name, title, company, and phone number to be
automatically placed at the close of all his e-mails. What does Faraz need to create?
1. HTML File
2. Java applet
3. CGI script
4. Signature file
Q550) Ibrar is conneced to his ISP via a 56 Kbps dial-up connection. He is requesting
pages that have been frequently requested by others using the same ISP. These pages are
being delivered from the ISPs cache, which is invisible to Ibrar. What kind of cache is the
ISP most likely using?
1. Web cache
2. File cache
3. Proxy cache
4. Server cache
Q551) The term World Wide Web relates to?
1.
2.
3.
4.
Q552) To accomplish an Internet task as a client, such as sending an e-mail message you
need not have one of the following?
1. A computer connected to the Internet using TCP/IP
2. A client program
3. A web server
4. An IP address or the domain name of a server you are authorised to use
Q553) Which of the following is the correct in descending order of speed?
1. T1
2. T3
3. 56K Modem
4. T2
Q554) Simple Mail Transfer Protocol is used to?
1. send and receive e-mails
2. upload and download files from a web server
3. receive mails
4. send mails
Q555) Which protocol is used in the application, which allows a user to connect with a
remote system and access the applications and files on the system?
1. FTP
2. HTTP
3. TELNET
4. NNTP
Q556) Which part of the URL HTTP://WWW.EXECUTRAIN.COM tells about the type
of organisation having
this URL?
1. http://
2. executrain
3. ae
4. none of the above
Q557) Which of the following denotes a non-profit organisation?
1. .com
2. .org
3. .ca
4. .edu
Q558) The organisation which manages the domain names is:
1. CERN
2. Network Solutions Incorporation
3. World Wide Web Consortium
4. IITF
Q559) Which of the following URLs is incorrect?
1. HTTP://ABCD.COM
2. HTTP://WWW.ABCD.COM/ABCD
3. MAILTO://WWW.ABCD.COM
4. NEWS:ABCD.ABCD.COM
Q560) Which of the following is not a valid e-mail address?
1. ABCD@ABCD.COM.OM
2. ABCD.ABCD.COM
3. ABCD@ABCD.COM
4. ABCD.ABCD@ABCD.CO.AE
Q561) If you want to get a neutral view about a particular product through the web, you
will visit:
1. The web site of the product or its related firm
2. The newsgroup which holds articles about the product
3. The products competitors web site
Q562) Which of the statements about FTP is false?Using FTP, user can:
1.
2.
3.
4.
3. Web servers
4. Search engines
Q570) HTML is controlled by:
1. IICI
2. W3C
3. IITF
4. MIT
Q571) Which one of the following is a reason for avoiding HTML editors
1. They do not keep in pace with the evolution of HTML
2. Easy to use
3. Features are less
4. They dont allow the user to edit HTML code
Q572) Which of the following is a container tag
1. <TITLE>
2. <BR>
3. <LI>
4. <B>
Q573) HTML elements that can affect something as small as a character or a word are
referred to as:
1. block-level elements
2. container tags
3. text-level elements
4. document structure tags
Q574) Which of the following statement is false?
1. H1 is bigger than H3
2. H2 is bigger than H6
3. H5 is smaller than H6
4. H5 is smaller than H4
Q575) The tag that is used to display plain text files in their original format is:
1. <FORMAT>
2. <FONT>
3. <PRE>
4. <TEXT>
Q576) Which of the following rule applies to HTML files?
1. All the tags should be in uppercase only
2. The tags should be written in a structured way
3. The files should be plain text files saved as .HTM or .HTML
4. .The empty tags should have a closing tag also
Q584) What is the attribute of the <TABLE> tag is used to color a table border?
1. <TABLE BGCOLOR=COLOR NAME>
2. <TABLE BORDER.COLOR(COLOR NAME)>
3. <TABLE BORDERCOLOR=COLOR NAME>
4. <TABLE BORDER=COLOR NAME>
Q585) The VALIGN attribute is not used with one of the following:
1. <TR>
2. <TABLE>
3. <TH>
4. <TD>
Q586) <ALIGN=TOP> can be used with one of the following table element:
1. <TABLE>
2. <CAPTION>
3. <TR>
4. <TD>
Q587) <ROWSPAN> and <COLSPAN> are used to:
1. merge cells
2. widen the table
3. increase spacing between text
4. add more rows or columns
Q588) The basic purpose of a CGI script is:
1. to enable links on a web page
2. to process form data
3. to send mails
4. to create animations
Q589) Joe is creating a web site for his organisation. He wants to place a form on his site
to collect data from the visitor as input to his server side gateway program. What method
should he use?
1. INPUT
2. GET
3. SEND
4. POST
Q590) RESETting a form will:
1. clear all the contents input by the user
2. send all the contents input by the user to the server
3. set all the components to their default values
4. all the above
Q591) Which of the following components is not an <INPUT> element?
1. Textbox
2. Submit Button
3. Text area
4. Checkbox
Q592) Which of the following statements about RadioButtons is false?
1. RadioButtons should always be individual elements
2. RadioButtons should always be group elements
3. RadioButtons group should always share the same name
4. One of the RadioButtons can be selected by default
Q593) Jane wants to give an option on her form for the visitors to select the month, year
and date of birth. Which form component should she use?
1. Textbox
2. Multiple option select list
3. Single option select list
4. Textarea
Q594) Which of the following is not a valid Image Map shape?
1. Polygon
2. Square
3. Rectangle
4. Circle
Q595) Which network model has a dumb terminal at the client side?
1. Client-Server
2. LAN
3. Mainframe
4. None of the above
Q596) The web-based networking is a:
1. Single-Tier model
2. Two-Tier model
3. Three-Tier model
4. N-Tier model
Q597) An organisation having nine employees in a small building wants to connect the
computers of all their employees and make a network without much expenditure. They
want the data to be shared between all the computers without any restrictions. What type
of network would you prefer if were the network designer?
1. Server-based
2. Peer-to-peer
3. Mainframe
4. Web-based
Q598) For the network mentioned in Q. 57, which will be the suitable network topology?
1. Star
2. Star-Bus
3. Bus
4. Star-Ring
Q599) Which of the following statement is false about the Star Topology?
1. Network nodes are connected through a central device
2. Network expansion is simple
3. If one computer fails, the entire network fails
4. Network management can be centralized
Q600) Which of the following statement is false about the Ring Topology?
1. All computers have equal access to the data
2. Performs well even with heavy traffic
3. Network expansion will not affect the operation
4. They do not have a central connection point
601) Connection-oriented protocols reside in the:
1.
2.
3.
4.
Transport Layer
Network Layer
Data Link Layer
Physical Layer
Header
Data
Frame
Trailer
Header
Trailer
Data
None of the above
604) All the protocols related to networking belong to one of these group of layers:
1.
2.
3.
4.
1.
2.
3.
4.
SMTP
BOOTP
SPX
HTTP
A client in a LAN
A server in a LAN
A junction between one high-speed network and another
A junction between two clients on Internet
607) Which of the following network device cant be placed inside a computer?
1.
2.
3.
4.
Modem
NIC card
Hub
None of the above
608) The device used to divide a network into two segments is:
1.
2.
3.
4.
Repeater
Router
Bridge
Hub
610) Which of the following LAN standard doesnt use CSMA/CD or CSMA/CA?
1.
2.
3.
4.
Ethernet
Fast Ethernet
100VG-AnyLAN
LocalTalk
X.25
Fast Packet Switching
Fibre Distributed Data Interface
All the above
615) Which is the state of the protocols that may be considered for future
standardisation?
1.
2.
3.
4.
Experimental
Standards
Proposed
Historic
16
32
48
64
617) Which of the following is not a valid IP address to be assigned to computer on any
network?
1.
2.
3.
4.
192.23.111.8
192.23.111.256
0.0.0.0
127.0.0.3
620) Jean is the web developer for his organisation. He wants to put the contact details
about all the employees in the company on his Intranet site. What server would he prefer
to accomplish this task successfully?
1.
2.
3.
4.
HTTP Server
Certificate Server
Directory Server
Catalog Server
621) X is the web administrator of his company. His organisation plans to host an Intranet
site, which involves a lot of dynamic features. Xs team of developers are all experts in
Visual Basic and Vbscripts. What server solution should X opt for?
1.
2.
3.
4.
Apache
Microsoft Internet Information Server
Netscape Suite Spot
Lotus Domino Server
622) X is developing a web site for one of his clients who is a Multinational IT Company.
The web site has to perform on-line transactions with various IT companies like
Microsoft, Netscape, Sun etc., which run on different servers. Which programming
solution should X use to perform all the server side transactions?
1.
2.
3.
4.
Visual Basic
Active-X
JAVA
Javascript
3. shares load
4. reduces server overhead
624) Which of the following do Netscape Browsers not directly support?
1.
2.
3.
4.
JAVA
Javascript
Active-X
Multimedia
CERT
W3C
EuroCERT
FIRST
Symmetric algorithm
Asymmetric algorithm
Hash algorithm
Hot Potato Algorithm
630) The protocol used to perform encryption at the network level is:
1.
2.
3.
4.
Network Protocol
Encryption Protocol
Point-to-point Tunneling Protocol
VPN
Filter Packets
Detect Intrusions
Take evasive actions
None of the above
632) Your company requires the best connection speed available in the local area to
support its intranet. Currently, a T1 service provider is available in the area. What is the
maximum speed that can be achieved using all the bandwidth of a T1 line?
1.
2.
3.
4.
1.544Mbps
500Kbps
56Kbps
1.544Gbps
634) Which of the following is the utility that allows the verifying of connectivity
between two host machines?
1.
2.
3.
4.
Telnet
Ping
Route
IPCONFIG
635) You are currently running a Java-based Web page. From this page you require the
ability to access a database and retrieve information. Which of the following application
programming interfaces is your best choice to accomplish the task required?
1. DSN
2. JDBC
3. JavaScript
4. ODBC
636) The company you are currently working with is entering the e-commerce
marketplace by creating and publishing a complete Web site with product and ordering
information. The site will include numerous forms and require high-end hardware and
applications to run. Currently, the preferred operating system for this server is Linux
because no costs for licensing are required. With this knowledge, which of the following
Web server applications would you suggest?
1.
2.
3.
4.
Apache
Microsoft IIS
Lotus Domino Server
Microsoft PWS
637) Your supervisor has asked you to research information about the InterNIC and its
subcommittees. Which of the following search criteria best suits your needs?
1.
2.
3.
4.
InterNIC OR subcommittees
InterNIC NOT subcommittees
InterNIC AND subcommittees
InterNIC NEAR subcommittees
638) Which of the following organizations oversees and sanctions the use of HTML
coding and tags?
1.
2.
3.
4.
IANA
NSFNET
W3C
InterNIC
639) Which layer of the OSI is responsible for the placing of signals onto the media?
1.
2.
3.
4.
Transport
Network
Data Link
Physical
640) What is the best description of a network using or running the X.25 protocol?
1.
2.
3.
4.
LAN
WAN
MAN
Peer-to-peer
641) Your in-house development team is planning to create a simple, generic Web page
using HTML code that will collect user information and send it into a database. Which of
the following should the development team employ to accomplish this collection of user
data?
1.
2.
3.
4.
C++
VRML
CGI
JavaScript
642) Review the following URL and from the list provided select the correct description
for the line:
http://www.coriolis.com/training.htm
1.
2.
3.
4.
643) You are currently running a DHCP server to dynamically assign IP addresses to your
client machines. You understand that clients requiring an IP address will broadcast on the
network to reach a DHCP with available addresses. To which address are these broadcasts
addressed?
1.
2.
3.
4.
0.0.0.0
224.0.0.0
255.255.255.255
127.0.0.1
644) Jean is the web developer for his organisation. He wants to put the contact details
about all the employees in the company on his Intranet site. What server would he prefer
to accomplish this task successfully?
1.
2.
3.
4.
HTTP Server
Certificate Server
Directory Server
Catalog Server
645) Your company has a departmentalized business structure. As the structure requires
all staff within a department to be informed about departmental issues, a common shared
email mailbox has been created. The ability to share mailboxes is performed using which
of the following protocols?
1.
2.
3.
4.
SMTP
IMAP
X.400
POP
646) TCP/IP functions by using physical and logical addresses as well as hostnames.
Which of the following servers resolves hostnames to their logical IP addresses?
1.
2.
3.
4.
DNS
WINS
ARP
Host file
647) Your company has numerous traveling salespeople who require dial-in access form
their homes and hotel rooms. You require a method to create secure channels between the
salespeoples point and the network access point. What is the protocol used to create
VPNs? [Check all correct answers]
1.
2.
3.
4.
PPP
IPSec
L2TP
PPTP
648) Which of the following governing bodies is responsible for the assignment or
management of domain names?
1.
2.
3.
4.
IETF
InterNIC
ICANN
IAB
649) Your new Web site has taken several months to develop and now you are ready to
publish it to your Web server. If you want the largest possible number of search engines
to locate your new site, which of the following should you include in your Web pages?
1.
2.
3.
4.
ICRA ratings
Meta tags
Index server address
Links to search engines
650) Your current network is running a star topology and the 802.3 architecture. Speeds
that can be achieved are optimized at approximately 10Mbps. New management has
suggested that the users of the network would be better served by providing a faster
network. Given that your network cards can achieve speeds of up to 100Mbps which type
of cabling would you recommend?
1.
2.
3.
4.
Coaxial 10Base5
Category 3, UTP
Fiber optic
Category 5, UTP
HTML Fundamentals
TITLE; CIW(tm)
Foundations Certification
Bible
Hardcover - 768 pages
Bk&Cd-Rom edition
(March 15, 2002) Hungry
Minds, Inc;
ISBN: 0764549081;
TITLE; CIW:
Foundations Study Guide
Hardcover - 864 pages
Study Gd edition (April 5,
2002) Sybex;
ISBN: 0782140815;
TITLE; CIW:
Foundations Study Guide
Hardcover - 864 pages
Study Gd edition (April 5,
2002) Sybex;
ISBN: 0782140815;
TITLE; Networking by
Example (By Example)
Paperback - 448 pages 1
edition (May 8, 2000)
Que;
ISBN: 0789723565;
TITLE; Practical
Firewalls (Practical)
Paperback - 504 pages 1
edition (June 12, 2000)
Que;
ISBN: 0789724162;
TITLE; Designing
Network Security
Hardcover - 426 pages 1st
edition (June 15, 1999)
Cisco Pr;
ISBN: 1578700434;
TITLE; Hacking
Exposed: Network
Security Secrets and
Solutions
Paperback - 703 pages
2nd edition (January 15,
2000) McGraw-Hill
Professional Publishing;
ISBN: 0072127481;
TITLE; Hack Proofing
Your Network: Internet
Tradecraft
Paperback - 450 pages 1st
edition (January 15, 2000)
Syngress Media Inc;
ISBN: 1928994156;
TITLE; Internet
Architectures
Hardcover - 544 pages 1
edition (January 27, 1999)
John Wiley & Sons;
ISBN: 0471190810;
TITLE; Home
Networking Visual
Jumpstart
Paperback - 252 pages 1st
edition (January 15, 2000)
Sybex;
ISBN: 0782127959;