0% found this document useful (0 votes)
548 views104 pages

Practice Questions

ARPANET was founded In 1966 by the Army Research Projects Agency. Which of the following is not an example of a direct connection? 1. ISDN 2. DSL 3. 56Kbps 4. 28.8Kbps Q5) What speed of connection is the Internet standard for connection? 1. HTTP 2. FTP 3. SMTP 4. POP 5. IMAP 6. TELNET 7. NNTP 8. Gopher.

Uploaded by

Victor Gan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
548 views104 pages

Practice Questions

ARPANET was founded In 1966 by the Army Research Projects Agency. Which of the following is not an example of a direct connection? 1. ISDN 2. DSL 3. 56Kbps 4. 28.8Kbps Q5) What speed of connection is the Internet standard for connection? 1. HTTP 2. FTP 3. SMTP 4. POP 5. IMAP 6. TELNET 7. NNTP 8. Gopher.

Uploaded by

Victor Gan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 104

Practice Questions

Q1) When was ARPANET founded?


1. 1966
2. 1967
3. 1968
4. 1969
Q2) What does ARPA stand for?
1. Army Research Projects Agency
2. Advanced Research Projects Agency
3. Advanced Redirection Projects Agency
4. Advanced Reinforcements Projects Agency
Q3) In order to connect to the Internet, which 6 elements do, you need?
1. Computer, TCP/IP, Client Software, Internet Connection, Internet Address,
Modem, Browser.
2. Computer, OS, TCP/IP, Client Software, Internet Connection, Internet Address.
3. Node, Browser, TCP/IP, Modem, URL, OS, Computer.
4. PC, OS, TCP/IP, Browser, Modem, Internet Address.
Q4) What speed of connection is typically needed for Streaming Audio and Video?
1. 128Kbps
2. 28.8Kbps
3. 56Kbps
4. 64Kbps
Q5) What speed of connection is the Internet standard for connection?
1. ISDN
2. DSL
3. 56Kbps
4. 28.8Kbps
Q6) Which of the following is not an example of direct connection?
1. DSL
2. ISDN
3. CABLE
4. LAN
Q7) Which of the following is capable of the fastest connection?
1. Cable Modem
2. T2
3. T3
4. E4
5. T4

Q8) Protocols are the rules that describe how clients & servers communicate across a
network. Which of the following is used to transfer Web pages from a Web Server to a
Web client (browser)
1. HTTP
2. FTP
3. SMTP
4. POP
5. IMAP
6. TELNET
7. NNTP
8. Gopher
Q9) What does PPP stand for?
1. Power Point Protocol
2. Previous Point Protocol
3. Point-to-Point Protocol
4. Page-to-Point Protocol
Q10) What does DSL stand for?
1. Digital Selection Line
2. Direct Selection Line
3. Digital Subscriber Line
4. Direct Subscriber Line
Q11) What does SLIP stand for?
1. Serial Line Intertwined Protocol
2. Serial Line Internet Protocol
3. Subscriber Line Intertwined Protocol
4. Subscriber Line Internet Protocol
Q12) What does NNTP stand for?
1. Network News Transfer Protocol
2. News Network Transfer Protocol
3. New News Transfer Protocol
4. National News Transfer Protocol
Q13) What does SMTP stand for?
1. Small Mail Transfer Protocol
2. Suitable Mail Transfer Protocol
3. Sample Mail Transfer Protocol
4. Simple Mail Transfer Protocol
Q14) What does IMAP stand for?
1. Instant Messaging Access Protocol
2. Internet Messaging Access Protocol
3. Internet Message Advanced Protocol

4. Instant Message Advanced Protocol


Q15) Which protocols are used to retrieve e-mails? (choose two)
1. IMAP
2. SMTP
3. FTP
4. NNTP
5. POP
6. VERONICA
Q16) Which protocol is used to send e-mails?
1. IMAP
2. SMTP
3. FTP
4. NNTP
5. POP
6. VERONICA
Q17) What does URL stand for?
1. Uniform Resource Locator
2. Universal Resource Locater
3. Uniform Re-locater Locater
4. Unified Resource Locator
Q18) Angelina is corresponding with a business that sends her a file written in Adobe
Acrobat. What extension is on Angelinas file?>
1. .Zip
2. .Tar
3. .Edu
4. .Pdf
Q19) Which of the following tags specifies that a line break be inserted wherever the tag
occurs?
1. <P>
2. <HR>
3. <BR>
4. <PRE>
Q20) Paula has a need to access a remote system, and run a program on it. Which of the
following protocols could she use?
1. TCP/IP
2. Telnet
3. File Transfer Protocol
4. Simple Mail Transfer Protocol
Q21) The OSI/RM includes which of the following layers?

1.
2.
3.
4.

Server
Client
Interactive
Application

Q22) Johan is connecting a single computer to a network. The computer is located farther
from the server than the defined network standards allow. Which of the following devices
should Johan use to solve this problem at the OSI/RM physical layer?
1. Repeater
2. Network Interface Card
3. Bridge
4. Hub
Q23) Describe a container tag.
1. Stand-alone
2. Uses opening and closing tags
3. Opening tags contain /
4. Empty tags closing tag uses /
Q24) <PRE>. What does this tag do?
1. Line breaks and spacing will display in the browser exactly as they appear in the
original text and in the font determined by the rest of the page.
2. This tag places text into courier.
3. Signifies the end of a HTML document.
4. Allows spacing to be seen exactly as the text document portraits.
Q25) What is the accepted HTML comment sequence?
1. //*comment text here*//
2. /*comment text here*/
3. <!--comment text here-->
4. //comment text here//
Q26) If you want to give the user the maximum amount of choices in as little space as
possible?
1. Multiple Text Boxes
2. Multiple Option Select List
3. Single Option Select List
4. Multiple Radio Buttons
Q27) How would you add seven more rows to a table you have designed in HTML?
1. Change <COLSPAN> tag to accommodate the new rows
2. Create a new table with the desired number of rows
3. Use <TR> and <TD> to extend the table
4. Use <TR> seven times

Q28) <B>&copy;1998, Your Company.com&reg;</B> How would this appear in the


browser?
1. Underlined
2. Bold
3. Emphasized
4. Italic
Q29) What is the correct syntax for creating a hyperlink?
1. <img scr="lespaul1.gif" ALIGN="left">
2. <a href=file.ext>Link</a>
3. <mailto:someone@somewhere.extension>Name</a>
4. <a href=mailto:someone@somewhere.extension>name<A/>
Q30)How do you make an alternate description when an image is loading?
1. <img src="image.gif" alt="dont ever mix raspberries and kiwis">
2. <img src="image.gif">alt="dont ever mix raspberries and kiwis">
3. <img src=image.gif> wait= dont ever mix raspberries and kiwis>
4. <img src=image.gif> zoom= dont ever mix raspberries and kiwis>
Q31)How do you create an ordered list?
1. <UN>
2. <OL>
3. <UL>
4. <OD>
Q32)How do you create an unordered list?
1. <UN>
2. <OL>
3. <UL>
4. <OD>
Q33)How do you create a line at half its length with no 3D effect?
1. <HR WIDTH="50%" SHADE="0">
2. <HR WIDTH="50" NOSHADE>
3. <HR LENGTH="50" SHADE="0">
4. <HR WIDTH="50% SHADE="0">
Q34) <HTML> <HEAD><Title>Your Company<Title></HEAD><Body>Sheep have
eight legs </Body></html> Whats wrong with this structure?
1. Title should not be placed in the <Head> tag.
2. <pre> tag is not inserted within the document.
3. There are no images.
4. The <title> tag has not been completed with a </title>
Q35) <IMG SRC="ciw.gif"> You type this in, but the image does not appear. How might
you correct this?

1.
2.
3.
4.

<IMG SRC=ciw.gif>
<IMG SRC="..ciw.gif">
<IMG SRC=.."ciw.gif">
<IMG SRC="images/ciw.gif">

Q36) Olga wants to use HTML forms to gain information from viewers. How should
Olga do this?
1. ISAP
2. CDBC
3. CGI
4. Proprietary script solution
Q37) Rupert wants to test his computers network connectivity with a ping command. He
enters "ping 127.0.0.1". What special address is he using?
1. Loopback address
2. Multicast address
3. Invalid address
4. Experimental address.
Which language allows you to phrase queries on the front end so that they will be
understood by back end databases?
1. SQL
2. Cobol
3. JavaScript
4. Java
Q39) A network uses the X.25 protocol, frame relay connection to exchange information
between router and switching nodes. What is it?
1. LAN
2. WAN
3. MAN
4. VPN
Q40) What type of encryption uses a single key for both encryption and decryption?
1. Asymmetric
2. Hash
3. Public key
4. Symmetric
Q41) What type of encryption uses a pair of keys, one public and one private?
1. Symmetric
2. SSL
3. Asymmetric
4. SLE
Q42) What is the difference between broadband and baseband?

1. Frame relay uses broadband, Ethernet uses baseband


2. Baseband modulates and transmits into separate frequencies, broadband
occupies the entire signal spectrum of the cable
3. Frame relay uses baseband, Ethernet uses broadband
4. Broadband modulates and transmits into separate frequencies, baseband
occupies the entire signal spectrum of the cable
Q43) 200.246.244.0, What class of IP address is this?
1. Class A
2. Class B
3. Class C
4. Class D
Q44) HTTP uses a "best effort" delivery strategy called ..?
1. Stateless Protocol
2. Statefull Protocol
3. Internet Protocol
4. Transfer Control Protocol
Q45) A network using 10baseT adapters, category 5 cable and TCP/IP. How could you
speed up your network?
1. Fibre optic cable and suitable NIC cards
2. Fast Ethernet NICs and 100baseT cable
3. Token ring adapters and fibre optic cable
4. Upgrade network adapters and hubs to fast Ethernet
Q46) The web servers capacity is reaching 100% capacity because of a 200% increase in
web traffic. It needs a scalable, more efficient solution than Perl CGI which is being used.
Whats the best solution?
1. CGI script in C++
2. CGI script in JavaScript
3. ODBC
4. ISAPI
Q47) Herman knows Perl and C++ languages. He wants to connect his web server to his
database. How does big Herman go about this?
1. ISAPI
2. MAPI
3. CGI
4. JDBC
Q48) A company uses IPX/SPX and NetBEUI. It wants to use the Interent to establish
long-term, long-distance connections between company offices in three major cities.
Connection must be as secure as possible. What type of network should be used to
present the least amount of cost and reconfiguration?
1. TCP/IP network

2. Application Gateway Network


3. WAN
4. VPN
Q49) Which layer of the OSI/RM is responsible for data flow between the source and
destination machines during a session?
1. Session
2. Transport
3. Network
4. Presentation
Q50) To search for files across all servers in the companys intranet, which server
provides a single point of access to search distributed data?
1. News server
2. Transaction server
3. Catalog server
4. Directory catalog
Q51) To conserve server resources, set up a network that divides tasks between the
centralised company database and user workstations, which type of system should be
used?
1.
2.
3.
4.

Client/Server
Centralised computer
Diskless mainframe
Peer to Peer

Q52) Ling wants to upload a document to a company FTP server. She will download the
file in two days time. Which program makes it easiest for her to upload?
1. News client
2. Web browser
3. Mail client
4. FTP client
Q53) Jemima wants to create an address book that all company employees can access.
She must be able to update it on the fly and wants all employees to have immediate
access to such changes without having to download and import a new file into their emailo programs. Which type of server must Jemima install and configure?
1. Directory server
2. Certificate server
3. Proxy server
4. HTTP server
Q54) Engelbert wants to send a 1MB document over the internet to a client in Australia.
Which method is best for transmitting the document to his client?
1. FTP

2. Newsgroup
3. Mailing List
4. Telnet
Q55) New names appear on a database. You remove them, but they reappear. How far has
the dirty hacker got?
1. Discovery
2. Control
3. Penetration
4. Brute Force
Q56)A small program which allows one server to access information on another, then
pass it on to a client for browsing Internet is :
1. Java applet
2. Java servlet
3. Hash script
4. Asymmetric keys
Q57) http://www.company.com/pub/links.html The http specification divides this URL
into:
1. Server name, directory path, file name and extension
2. Transfer protocol, server name, directory path and file name
3. Domain name, directory path, file name, file type
4. Directory, directory path, file name, file extension
Q58) Suki wants to conduct an Archie search to quickly locate compression utilities on
the Internet. Which command will she use to log on to other systems to conduct her
Archie search?
1. Gopher
2. Ping
3. Telnet
4. Veronica
Q59)What type of addresses are unique to the network protocol TCP/IP?
1. DNS
2. IP
3. LAN
4. TCP
Q60) What is the best way to find honest opinions about products on the Internet?
1. Standard Web search
2. Joining a news group
3. With Veronica
4. With Archie
Q63) TCP/IP divides addresses into:

1.
2.
3.
4.

Fragments
Segments
Dotted quads
Packets

Q64) A search about corporate law returns too many results when corporate law is typed
into the search engine. How can this be fixed?
1. (corporate law)
2. "corporate law"
3. corporate NEAR law
4. corporate +law
Q65) What does SQL stand for?
1. Sequel
2. Structured Query Language
3. Standard Query Language
4. Simple Query Language
Q66) Geraldo posted a web page on his ISPs web server. He didnt register either any
search engines, but when he performed an Internet search on "Geraldo". His web page
appears. How is this so?
1. His ISP registered his web page
2. A robot or spider indexed his site
3. The search engine was lucky
4. A Free Service Search Engine Registered His Site For Free
Q67) To increase the chances of your companys web page appearing in search results,
which of the following should be instigated?
1. HTML <META> tag
2. HTML <CONTENT> tag
3. HTML <KEYWORDS> tag
4. HTML SEARCH attribute
Q68)What is used for 3D walk throughs?
1. HTML
2. VRML
3. JavaScript
4. RealPlayer
Q69) Your network slows down. Whatever can the problem be?
1. Incorrect logons
2. Lack of bandwidth
3. Incorrect DNS for file server
4. Processor speeds
Q70) Which of the following are networking protocols according to OSI?

1.
2.
3.
4.

FDDI, ATM, ISDN


TCP, SPX, NWLINK, DDP
SMTP, X.500, SNA
IP, IPX, Net BEUI

Q71) You are unable to view some of the contents of a web page. You can only see text.
The download image setting is on. What gives?
1. Must purchase correct application and install it
2. Browser is malfunctioning
3. Incorrect plug-in
4. Browser must be upgraded
Q72)What class is the IP address 215.125.45.5 ?
1. Class A
2. Class B
3. Class C
4. Class D
Q73) Bob has set up a new workstation with the IP address of 129.25.36.5 What is the
appropriate subnet mask for this IP
1. 255.0.0.0
2. 255.255.0.0
3. 255.255.255.0
4. 255.255.255.255
Q74) Jane has programmed the Following HTML code, however when she runs it, she
sees nothing on the browser. Look at the code below determine the error. <HTML>
<HEAD> <TITLE>Jane's Link Page<TITLE> </HEAD> <BODY> <H1>This is my
Web Page</H1> <UL> <LI>My Home Page</LI> <LI>My Links</LI> <LI>My
Pets</LI></UL> </BODY> </HTML>
1. <UL> is not a proper tag
2. </H1> missing
3. / missing from <title> tag
4. The <Head> tag should goes before the <html> tag
Q75) Elise prepares to send a 1-MB e-mail attachment via the Internet to a colleague in
Berlin. When she tries to send it, however, she receives notification that the e-mail server
is temporarily not in service. Elise must transmit the data immediately. With which
method could she transmit the document to her colleague instead?
1. Telnet
2. FTP
3. SMTP
4. Gopher
Q76) Julio wants to include hypertext links in his Web page. He codes references into his
HTML so that when users click a link, they will ( choose all that apply)

1.
2.
3.
4.

Access another Web page


Access the SGML reference code.
Be transferred to the Internet
Access the hypertext extension files

Q77) A packet filter can be defined as:


1. A type of firewall that inspects only network header fields after analyzing Internet
addresses and port numbers
2. An access control firewall
3. A type of gateway that screens e-mail message packets.
4. A type of firewall that inspects only Internet addresses and port numbers after
analyzing network header fields
Q78) Asymmetric encryption uses:
1. A three-way algorithm
2. Secure State Level (SSL) keys.
3. A pair of keys, one public and one private.
4. A pair of private keys.
Q79) Which of the following demonstrates correct usage of a container tag in HTML?
1. <H1/>Welcome<\H1>
2. <BR>What's New</BR>
3. <TITLE>My Web Page</TITLE>
4. <LI>First List Item
Q80) Which of the following IP addresses is valid?
1. 10.1.1.256
2. 127.0.0.1
3. 100.54.100.90
4. 162.34.0.0
Q81) Which layer of the OSI/RM model does IP belong to?
1. Session layer
2. Transport layer
3. Network layer
4. Data Link layer
Q82) Which layer of the OSI/RM model is responsible for preparing information to be
placed on the transmission medium?
1. Application layer
2. Data Link layer
3. Session layer
4. Physical layer
Q83) All of the following belong to the Application layer of the OSI/RM except:
1. SMTP

2. HTTP
3. TCP
4. BOOTP
Q84) Data flow that travels in two directions, but only in one direction at a time is
referred to as:
1. Full duplex
2. Half duplex
3. Simplex
4. Full simplex
Q85) Which port number is reserved for HTTP?
1. 21
2. 25
3. 53
4. 80
Q86) Which of the following does not represent a direct internet connection?
1. DSL
2. Cable modem
3. ISDN
4. LAN connection
Q87) In the following URL, which segment denotes the name of the server:
http://www.CIW4ever.com
1. http://
2. CIW4ever
3. com
4. www
Q88) SMTP, POP, and IMAP are all protocols used with which type of server?
1. News
2. Web
3. Mail
4. Gopher
Q89) Which of the following is not a characteristic of cookies
1. Small text files placed on a Web site visitor's computer
2. Connected to a database entry on the server site
3. Very simple, yet effective form of internet security
4. Can provide important marketing information about users
Q90) Which of the following file formats is a step above simple DOS text formatting?
1. TIFF
2. EPS
3. RTF

4. PDF
Q91) According to HTML 4.0 standards, which of the following tags must an HTML
document contain?
1. <FONT>
2. <P>
3. <STYLE>
4. <HEAD>
Q92) Which of the following is a more suitable alternative to the <B> tag?
1. <EM>
2. <STRONG>
3. <H1>
4. <TT>
Q93) Which of the following file formats supports transparency, interlacing, and
animation?
1. JPG
2. GIF87a
3. BMP
4. GIF89a
Q94) Which of the following is not an atribute of the <AREA> tag used for client-side
image maps?
1. Shape
2. Usemap
3. Coords
4. Href
Q95) How would you define a circular region in a client-side image map?
1. <AREA shape="circle" coords="x1,y1,x2,y2" href="URL">
2. <AREA shape="round" coords="x1,y1,radius" href="URL">
3. <AREA shape="circle" coords="x1,y1,radius" href="URL">
4. <AREA shape="circle" coords="x1,y1" href="URL">
Q96) All of the following tags may be used to incorporate CSS into an HTML page
except:
1. <STYLE>
2. <SPAN>
3. <LINK>
4. <BASE>
Q97) I am a server often used to connect a LAN to the internet. I provide caching of web
documents, coporate firewall access, transaction logging, and I can secure the host. What
server am I?
1. Caching Server

2. Transaction Server
3. Proxy Server
4. DNS Server
Q98) I am a standard SMTP server that can automatically forward an e-mail message to
members on a distribution list. What am I?
1. Mail Server
2. Media Server
3. News Server
4. Mailing List Server
Q99) I use NNTP, have written text output, and allow for multiperson input that is posted
on electronic bulletin boards. What am I?
1. Certificate Server
2. News Server
3. Mail Server
4. Directory Server
Q100) I am a dedicated server and my services are often utilized by proxy servers. I
speed up data access by storing data retrieved by users then presenting it directly to users
who later request the same data. What am I?
1. Directory Server
2. Caching Server
3. DNS Server
4. Certificate Server
Q101) If you receive encrypted info you must validate yourself to me. I generate and
manage digital certificates by using cryptography. What am I?
1.
2.
3.
4.

Proxy Server
DNS Server
Certificate Server
Directory Server

Q102) I am a dedicated server that identifies all resources on a network. I allow remote
access of information from a central location in a quick and efficient manner. You may
use me to search for an entry, modify personal information, or query a database
containing e-mail addresses. I use X.500 and LDAP. What am I?
1. Transaction Server
2. Directory Server
3. Certificate Server
4. DNS Server
Q103) I am a server used by search engines and I run little programs called robots. What
am I?
1. Catalog Server

2. Directory Server
3. DNS Server
4. Mail Server
Q104) Suppose the host or system cannot perform properly because another program or
node is using all of its resources. Or perhaps a user is instantly flooded with thousands of
e-mail messages that crash the system (mail bombing). These are both examples of which
type of hacker attack?
1. Spoofing.
2. Denial-of-service
3. Insider attacks
4. Man-in-the-middle
Q105) A hacker attempting to gain access as a legitimate user is using which type of
attack?
1. Trojan horse
2. Trapdoor
3. Brute-force
4. Replay
Q106) I am a security measure comprised of one computer (called a bastion) that acts as
both a firewall component and the network interface. I screen all packets coming to and
from the internal hosts at the application level. A router forwards all incoming traffic to
the bastion and allows traffic only from the bastion. What am I?
1. Packet-filtering router
2. Screened-host firewall (single-homed bastion)
3. Screened-subnet firewall (demilitarized zone)
4. Screened-host firewall (dual-homed bastion)
Q107) A computer without an IP address can broadcast which address to obtain one?
1. 0.0.0.0
2. 255.0.0.0
3. 0.0.0.255
4. 255.255.255.255
Q108) What is the birthplace of the Web?
1. W3C
2. ICANN
3. CERN
4. ARPANET
Q109) Which is defined as "the inter-organizational exchange of documents in
standardized electronic form directly between participating computers"?
1. Business-to-business model
2. SET
3. EDI

4. UN/EDIFACT
Q110) HTML 4.0 has three flavours, what are they?
1. Extreme, simple, effective
2. Transitional, effective, simple
3. Frameset, effective, simple
4. Transitional, frameset, strict
Q111) Which network topology consists of a central device (hub) through which all
network nodes are connected?
1. Bus
2. Ring
3. Mesh
4. Star
Q112) Which of the following pairings concerning the OSI/RM model is incorrect?
1. Session Layer: Establishes, manages, and terminates connections between
cooperating applications
2. Network Layer: Organizes data into packets and routes them to their destinations
3. Presentation Layer: The interface to the end user
4. Data Link Layer: Provides reliable data transfer across the physical link
Q113) Which of the following operates on several layers of the OSI/RM and can redirect
information flow from one node to another while giving each sender/receiver pair the
line's entire bandwidth?
1. Routers
2. Brouters
3. Switches
4. Gateways
Q114) Which protocol that occupies the internet layer of the Internet archictecture model
is responsible for resolving physical addresses from IP addresses?
1. UDP
2. RARP
3. ARP
4. ICMP
Q115) Which of these is a connectionless, broadcast-oriented protocol that occupies the
transport layer of the Internet architecture model?
1. TCP
2. UDP
3. IP
4. IGMP
Q116) Which of these is a fast packet switching technology that uses fiber optic and
digital cabling and makes use of variable length packets?

1.
2.
3.
4.

ATM
Frame relay
X.25
PPP

Q117) Which of the following is the first point of contact for T1 wires that are connecting
to a LAN?
1. DSU
2. Multiplexor
3. CSU
4. Router
Q118) Which routing protocol allows load balancing, partitioning of a network into areas,
and various types of service routing?
1. OSPF
2. EGP
3. BGP
4. RIP
Q119) Which diagnostic tool tests connectivity between source and destination systems?
1. Ipconfig
2. Netstat
3. Ping
4. Tracert
Q120) Which of the following network components is incorrectly paired with its OSI/RM
layer of operation?
1. Repeaters: Physical layer (Layer 1)
2. Gateways: Any layer
3. Routers: Physical layer (Layer 1)
4. Brouters: Data Link and Network layers (Layers 2 and 3)
Q121) Which is the most commonly used type of cable?
1. Solid STP
2. Solid UTP
3. Stranded STP
4. Stranded UTP
Q122) The following is a list of cable types and their possible uses. Which is incorrect?
1. Multimode fiber optic: LANs and WANs
2. Thicknet: ethernet standard for smaller networks
3. Coaxial: baseband, broadband, and television networks
4. Twisted pair: ethernet and token ring networks
Q123) If a hacker assumes the identity of a legitimate network device to gain access to
important information, this is known as a(n):

1.
2.
3.
4.

Insider attack
Trapdoor attack
Spoofing attack
Man-in-the-middle attack

Q124) Which security level provides the least amount of protection?


1. A1
2. D
3. B1
4. B3
Q125) All of the following are key security organizations except:
1. CERT
2. CSRC
3. IETF
4. CIAC
Q126) Which type of encryption uses a table of hexadecimal numbers to calculate the
encryption and is used with automatic teller machine cards?
1. Hash (one-way)
2. Symmetric
3. Asymmetric
4. Kerberos
Q127) I am a network-level encryption method that allows secure communication across
long distances, usually for a company extranet. I am capable of encapsulating protocols
such as IPX/SPX into other protocols, such as TCP/IP. What am I?
1. SSL session
2. VPN (virtual private network)
3. Kerberos
4. One-time password (OTP)
Q128) Which of the following is not an example of a broadband packet-switching
technology?
1. Frame relay
2. Ethernet
3. DSL
4. Cable TV networks
Q129) The following is a list of network components and their possible functions. Which
pairing is incorrect?
1. Bridge: determine whether a specific frame belongs on a local segment or
another LAN segment
2. CSU/DSU: terminates physical connections and required when using dedicated
circuits, such as T1 lines
3. Repeater: insures that electronic signals do not degrade

4. Router: directs flow of information from one node to another and allows for full
bandwidth use
Q130) A WAN technology implemented at the network layer of OSI/RM, this older
protocol is used for many point-of-sale transactions, operates at 56Kbps or slower, and
ensures error-free data delivery by checking errors at many points along the data's path:
1. ATM (aysnchronous transfer mode)
2. Frame relay
3. X.25
4. PPP
Q131) Which of the following describes the elements, or objects, within a document
rendered by a Web browser?
1. DHTML
2. DOM
3. CSS
4. <META>
Q132) Which of the following allows you to describe the function and context of the
actual information in a document?
1. HTML
2. DOM
3. XML
4. DTD
Q133) Which of the following does not specify a "flavor" of HTML 4.0?
1. Frameset
2. Public
3. Strict
4. Transitional
Q134) Which of the following is an object-based scripting language that can manipulate
HTML objects as well as ActiveX controls?
1. VBScript
2. JavaScript
3. Jscript
4. Java
Q135) Which of the following is an open set of technologies for integrating components
on the web?
1. Java applets
2. JavaScript
3. Plug-in
4. ActiveX

Q136) Recently developed to enhance the security and capabilities of e-commerce, this
protocol features enhanced identification, the passing of encrypted credit card
information that only the merchant's bank can access, and encryption of all sensitive
information among all parties involved:
1. EDI
2. SSL
3. SET
4. Business-to-business model
Q137) Which of the following has been shown NOT to be an effective manner of internet
advertising?
1. Referrer bonus
2. Contest promotions
3. Banner ads
4. Partnerships
Q138) Which of the following e-commerce payment methods enhances authentication
and is capable of storing and updating passwords and other security information?
1. Cash model
2. Smart cards
3. Credit model
4. Check model
Q139) Which layer of the OSI/RM provides useful transformations on data to support a
standardized application interface?
1. Data Link Layer
2. Session Layer
3. Application Layer
4. Presentation Layer
Q140) Which of the following is a token-based LAN standard composed of two counterrotating rings and is often used to cover a city or specific geographic area?
1. Apple LocalTalk
2. FDDI
3. Gigabit Ethernet
4. Ethernet/IEEE 802.3
Q141) Which of the following WAN standards is implemented at the MAC sublayer of
the data link layer and uses fixed-sized cells to support data as well as real-time video and
voice?
1. Frame relay
2. ATM (asynchronous transer mode)
3. PVCs (permanent virtual circuits)
4. IEEE 802.12-100VG-AnyLAN

Q142) This solution is based on the X-Open call-level interface and is one of the industry
standard APIs for using SQL to access relational databases:
1. JDBC
2. ODBC
3. ColdFusion
4. ADO
Q143) You are the administrator of a small company that requires extensive security.
Although security is a concern, you must also consider the costs associated with
obtaining certificates. Which server do you recommend most?
1. Certificate server
2. Directory server
3. Transaction server
4. Proxy server
Q144) Which is the most commonly used web server?
1. Microsoft IIS
2. Apache Server
3. Lotus Domino
4. Lotus Go Webserver
Q145) Which of the following is an advantage of JavaServer Pages (JSP)?
1. JSP is free
2. JSP utilizes memory well
3. JSP communicates with databases
4. All of the Above
Q146) Which is not true of java servlets?
1. They use objects
2. They are platform independent
3. They cannot be chained
4. They are created using java
Q147) Which of the following is true of Relational Database Management System
(RDBMS)?
1. Can allow a user to password protect a database file
2. Allows a user to work with hierarchical database types
3. Allows a user to work with network database types
4. Uses queries to organize tables
Q148) Which one is the correct way to display an H1 heading in HTML?
1. <h1> Welcome to my website </h1>
2. <h1> Welcome to my website
3. <h1> Welcome to my website </h2>
4. <h1> Welcome to my website <\h1>

Q149) Which transportation layer protocol provides reliable delivery and manages
sessions?
1. Transmission Control Protocol (TCP)
2. Sequenced Packet Exchange Protocol (SPX)
3. AppleTalk Transaction Protocol (ATP)
4. NetBEUI
Q150) Which network layer protocol is the Microsoft implementation of IPX/SPX?
1. Internet Protocol (IP)
2. NWLink
3. NetBEUI
4. Internetwork Packet Exchange (IPX)
Q151) Which of the following protocols, is not in the TCP/IP suite?
1.
2.
3.
4.

User Datagram Protocol (UDP)


Internet Control Message Protocol (ICMP)
Address Resolution Protocol (ARP)
Internetworking Packet Exchange (IPX)

Q152) Which network component filters frames to determine whether a specific frame
belongs on a local segment or another LAN segment?
1. Repeater
2. Hub
3. Bridge
4. Router
Q153) Which network component acts like a bridge at the network level?
1. Router
2. Network Interface Card
3. Repeater
4. Hub
Q154) Which type of database does the client server model contain?
1. Single Database Server
2. Distributed Databases
3. Both Single Database Servers and Distributed Databases
4. Neither Single Database Servers and Distributed Databases
Q155) The best way to enable transactions between databases and users is:
1. ODBC
2. SQL
3. TCP/IP
4. RDBMS

Q156) To determine what client server model should be implemented, which of the
following should be considered?
1. Cost, User Requirements, Network Type
2. Cost, Network Type, Types of Applications Run
3. Network Type, Types of Applications Run, User Requirements
4. Cost, Network Type, Types of Applications Run
Q157) A disadvantage of peer-to-peer networking is:
1. The networks are difficult to configure
2. The networks are expensive
3. The network is less secure than a server based network
4. None of the Above
Q158) A disadvantage of star network topology is:
1. If a cable breaks, the entire network is affected.
2. If the hub fails, the entire network can fail.
3. Network expansion is difficult.
4. Isolating problems is difficult.
Q159) Which network component directs the flow of information from one node to
another?
1. Brouter
2. Router
3. Switch
4. Hub
Q160) Which of the following is not optimal for handling increased network traffic on a
LAN?
1. Using a bridge.
2. Implementing a LAN switch.
3. Installing more workstations.
4. Increasing bandwidth.
Q161) What network device terminates physical connections?
1. Brouter
2. Switch
3. Channel Service Unit/Data Service Unit (CSU/DSU)
4. Gateway
Q162) What network device manually switches data between inbound and outbound
transmissions?
1. Gateway
2. Patch Panel
3. Modem
4. Brouter

Q163) Which transmission media is used for video and communication networks?
1. Coaxial cable
2. Twisted pair cable
3. RJ45
4. None of the above
Q164) Which of the following is a common digital leased line service providing 1.544
Mbps data transfer speed?
1. T1
2. T2
3. T3
4. E-Carrier System
Q165) Which layer of internet architecture consists of the OS device drivers, the
corresponding interface card, and the physical connection?
1. Transport Layer
2. Internet Layer
3. Network Access Layer
4. Application Layer
Q166) Which layer of internet architecture utilizes Transmission Control Protocol (TCP)
and User Datagram Protocol (UDP)?
1. Application Layer
2. Transport Layer
3. Network Access Layer
4. Internet Layer
Q167) Which protocol state should only be used in a lab?
1. Draft
2. Proposed
3. Standard
4. Experimental
Q168) Which protocol is not used in the application layer of internet architecture?
1. Hypertext Transfer Protocol (HTTP)
2. File Transfer Protocol (FTP)
3. Telnet
4. User Datagram Protocol (UDP)
Q169) An advantage of ring topology networks is:
1. They are inexpensive.
2. Network expansion does not affect network operation.
3. Performance with heave network traffic is good.
4. Performance differs based on user needs.

Q170) Which is not a function of the Open Systems Interconnection reference model
(OSI/RM)?
1. Provides universal development concepts.
2. Describes packet creation.
3. Explains framework used to connect systems.
4. Releases newly revises applications and protocols.
Q171) Which of the OSI/RM layers organizes data into datagrams?
1. Application
2. Session
3. Physical
4. Network
Q172) To determine if a packet is valid, which of the following is utilized?
1. Anti-virus Software
2. Cyclical Redundancy Check
3. Packet Header
4. None of the Above
Q173) Which application layer protocol is used to send TCP/IP address configuration
information to hosts?
1. Bootstrap (BOOTP)
2. Simple Network Management Protocol (SNMP)
3. Server Message Block Protocol (SMB)
4. X.500
Q174) In the discovery stage of hacking, which of the following options can be revealed?
1. Network Topology
2. System Defaults
3. How to create new user accounts
4. Destruction of evidence a hacker was present
Q175) Which National Computer Security Center (NCSC) security level can be described
as minimal protections like an MS DOS system?
1. D
2. C1
3. B1
4. A1
Q176) Which of the following is not an adequate measure for securing a server?
1. Changing system defaults
2. Manual logging
3. Establishing a baseline of activity
4. Establishing a written policy
Q177) A device that inspects each packet for predefined content is a:

1.
2.
3.
4.

Packet Server
Proxy Server
Packet Filter
None of the Above

Q178) A commonly used implementation of a firewall that creates a fairly secure space
between the internet and another network is the:
1. Screened-host Firewall (dual homes bastion)
2. Screened-host Firewall (single homes bastion)
3. Screened-subnet Firewall
4. Circuit Level Gateway
Q179) The process of choosing a path over which to send packets is known as:
1. Demultiplexing
2. Routing
3. Addressing
4. IP Forwarding
Q180) Which of the following is a feature of Open Shortest Path First (OSPF) routing?
1. Routing Table Updates
2. Load Balancing
3. Authenticated Exchanges
4. All of the Above
Q181) Which of the following is a feature of a subnet mask?
1. Distinguishing the network and host portions of an IP address
2. Specifying whether a destination address is local or remote
3. Both A and B
4. Neither A nor B
Q182) A network analyzer provides which of the following services?
1. Monitors network traffic to identify network trends
2. Deploys repair patches to network problems
3. A and B
4. Neither A nor B
Q183) Which is the most commonly used web server?
1. Microsoft IIS
2. Apache Server
3. Lotus Domino
4. Lotus Go Webserver
Q184) Which of the following is an advantage of JavaServer Pages (JSP)?
1. JSP is free.
2. JSP utilizes memory well.
3. JSP communicates with databases.

4. All of the Above


Q185) Which is not true of java servlets?
1. They use objects
2. They are platform independent
3. They cannot be chained
4. They are created using java
Q186) Which of the following is true of Relational Database Management System
(RDBMS)?
1. Can allow a user to password protect a database file
2. Allows a user to work with hierarchical database types
3. Allows a user to work with network database types
4. Uses queries to organize tables
Q187) What database connectivity option uses its own proprietary language?
1. JavaScript
2. LiveWire
3. ColdFusion
4. Java Database Connectivity (JDBC)
Q188) What is the most common source of computer virus infections?
1. Infected email attachments
2. Floppy disks
3. Internet downloads
4. Hidden server attacks
Q189) What type of servers use robots?
1. Transaction Servers
2. Catalog Servers
3. Directory Servers
4. None of the above
Q190) Inetd is an example of:
1. UNIX
2. Daemon
3. Web Server
4. Service Terminator
Q191) Which statement about client side scripting is not true?
1. Client side scripts can involve javascript or Active X.
2. Client side scripts can slow down a web site.
3. Client side scripts perform better after being downloaded.
4. Client side scripts can involve DHTML.
Q192) Which of the following tasks should be performed at the server side?

1.
2.
3.
4.

Access to the time


Minor changes to HTML layout
Customization to HTML
Determination of browser type

Q193) Which of the following is not a drawback to Common Gateway Interface (CGI)?
1. CGI creates out-of process events.
2. CGI programs cannot account for unexpected user entries.
3. CGI scripts cannot tell the difference between sessions.
4. CGI scripts must be compiled.
Q194) A proxy server typically does all the following except:
1. Caching Web Document
2. Corporate Firewall Access
3. Routing Mail
4. Filtering Client Transactions
Q195) Which of these options is not a true statement about FTP servers?
1. Sending files via FTP is faster than via HTTP
2. Sending files is more secure than other protocols
3. STP is more optimized for larger file downloads than a traditional email client
4. FTP servers generally allow anonymous logons
Q196) Which statement is not true of newsgroups?
1. They are all moderated.
2. They are all unmoderated.
3. They are private.
4. None of the Above
Q197) Which is not a common server encryption method?
1. Asymmetric key encryption
2. Message digest algorithms
3. Private keys
4. Digital Signatures
Q198) A user cannot perform which function on a directory server:
1. Search for an entry or entries
2. Use database email addresses
3. Search for a user or group of users
4. Modify personal information
Q199) What is an IP address?
1. An address used by TCP/IP to send packets of information
2. Also referred to as dotted quads
3. There are roughly 4 billion IP addresses.
4. All of the above

5. None of the above


Q200) Of the following examples, which is not a type of Internet direct connection?
1. DSL
2. ISDN
3. T1
4. T3
Q201) How does SMTP and IMAP relate?
1. SMTP is the Internet protocol for transferring electronic mail between electronic
mail servers. IMAP resides on an incoming mail server and sorts correct mail to
the correct user or users.
2. SMTP is a method developed by University of Minnesota to search for
information via a UNIX system. IMAP is a more current version of the same tool
3. SMTP is a network that you can log into and was created in 1979. IMAP is the
protocol that eventually absorbed SMTP
4. SMTP is the standard protocol for remote terminal connection and IMAP is a
method for transferring files via that remote terminal connection
Q202) Identify the correct mock commercial, World Wide Web accessible URL for a
company that has a file called cold.htm, located in a directory called hot.
1. http://company.edu/hot/cold.htm
2. http://www.company.gov/hot/cold.html
3. http://www.company.com/cold.htm/hot
4. http://www.company.com/hot/cold.htm
Q203) What is a legacy application?
1. A type of computer virus that infects all old computer files
2. Applications that have existed for years, but may not support modern
technologies without being upgraded or manipulated
3. Prototype versions of newer computer systems that are used to test how a new
technology will interface with newer ones.
4. Scalable computer applications that allow newer functions to automatically
update themselves so the system is always at the technical forefront
Q204) Where do you find the browser version under Netscape Navigator?
1. The help menu
2. The edit menu
3. The view menu
4. The communicator menu
Q205) What does the BACK button on your Navigator or Explorer browser do?
1. It reveals the version of the Web site you are viewing
2. It takes you to the beginning of the Web site you are viewing
3. It takes you back one page in the series of pages you have viewed currently

4. It reloads the page you were just on to original default states


Q206) What kind of information might viewing a Web pages' source code reveal?
1. Date of creation or posting
2. Author of the Web page
3. The type of development tool used to create the page
4. The type of browser the developer uses
5. All of the above
6. 1, 2, and 3
Q207) What do you not need to configure in order to receive email through your
browser?
1. An incoming mail POP3 server address
2. The IP group for your ISP- provided by your ISP
3. POP3 account name- the part of the email address before the @
4. POP3 account password- provided by your ISP or IT department
Q208) How is email similar to traditional post office mail?
1. Both need a sender address to be properly delivered
2. Both need a receiving address to be properly delivered
3. Both can contain messages in the form of text or other "attached" media
4. Both can be accessed anywhere in the world at any time
5. Only 2 and 3
6. Only 1 and 4
7. All of the above
Q209) Which of the following are not examples of good Netiquette?
1. Use business language in all work-related messages
2. Always allow a significant margin of time before you to reply to personally
messages. You do not want to appear as though you have nothing better to do
than reply to email
3. Proofread and check your spelling before you send messages
4. It is OK to send private messages you do not want read via email if you send it
with PRIVATE in the subject line.
5. 1 and 3
6. 2 and 4
Q210) What is the best way to ensure you do not violate possible email use rules at work?
1. Wait until your supervisor goes home to send personal messages
2. Use a personal ISP and private email client at home on a computer you own
3. Only access your private web based email at work. Do not use your corporate
account
4. You must notify your employer in writing that you will only use your work email
account for personal messages while at home on their laptop
Q211) What are benefits of using FTP, Telnet, Gopher, and Newsgroups?

1. These tools allow a vast network for research and collaboration


2. They allow business users to complete tasks more efficiently
3. Aids in creating a forum whereby information can be moved and accessed
dynamically
4. 1, 2, and 3
5. 1 and 2
Q212) Of the following file extensions found on Telnet sites, which are not compressed
file formats?
1. .zip
2. .tar
3. .asc
4. .pdf
5. 1, 2, 3, and 4
6. 3 and 4
7. 1, 2, and 4
Q213) Why are Newsgroups more frequently being used by companies?
1. To accumulate knowledge that can aid in better product design and development
2. To create internal knowledge pools where employees can share and collaborate in
the enhancement of various business processes
3. To gain competitor knowledge and preview potential competitors in the
marketplace
4. To keep up to date on the latest business news around the world
5. 1, 2, and 3
6. 2, 3, and 4
Q214) What does the Internet and Gopher share in common?
1. Both are still largely UNIX bases environments, affording access through Telnet
2. Both house rich stores of information available to users
3. Both are accessible via Web browsers
4. All of the above
Q215) Which search engine was created in 1995 to index the entire Internet and has one
of the largest databases of indexed sites and uses spider programs to check indexed sites?
1. Lycos
2. AltaVista
3. Excite
4. Yahoo
Q216) Which search engine was created in 1994 and returns search results based on three
different kinds of information?
1. Yahoo!
2. Google
3. Northern Light
4. Ask.com

Q217) Which of these statements is not true regarding Internet search engines?
1. Some engines assign rank differently than others
2. Some engines have a more extensive web catalogue than others based on their
original design philosophy
3. Some engines use sophisticated programs to auto-validate sites to ensure content
accuracy for searches
4. Some engines offer different levels of granular searching refinement that permits
users to narrow search results
5. 1 and 4 are false
6. 1, 2, 3, and 4 are true
7. 1, 2, and 3 are true
Q218) Of the following list, which statement does not match its value proposition. Ex.
McDonalds = food served quickly
1. Deja.com = find newsgroups on the subject you choose
2. Archie = ideal when you do not know the name of the file for which you are
looking
3. people.yahoo.com = service to find people without a web page directly related to
them
4. WebCrawler = small search engine good for searching specific subject matter
5. 2 and 3 do not match
6. 1, 2, 3, and 4 do not match
Q219) Which of the following are synonyms for market intelligence?
1. Secondary market research
2. company/competitor intelligence
3. primary market intelligence
4. 1 and 2
5. 2 and 3
6. 1 and 3
Q220 Which of the following sites offer information for free?
1. Hoovers
2. Thomas Register
3. AltaVista
4. OSHA.gov
5. all of the above
6. none of the above
7. 3 and 4
Q221) Which of the following are not examples of pull technology?
1. A request to AltaVista
2. An FTP download
3. A PointCast session
4. A Web site member automatic email notice
5. 1 and 2

6. 3 and 4
7. none of the above
8. all of the above
Q222) Which of the following was considered the first practical networking solution?
1. Mainframes
2. Client Server Models
3. The Internet
4. Peer to Peer Networking
Q223) All networks consist of which elements?
1. Servers, Transmission Media, and Network Services
2. Protocols, Servers, and Clients
3. Protocols, Transmission Media, and Network Services
4. Clients, Transmission Media, and Protocols
Q224) Which of the following topologies require that all nodes tap into the same cable?
1. Star Topology
2. Bus Topology
3. Ring Topology
4. All of the Above
Q225) In UNIX, what purpose does X Windows serve?
1. A command based interface for operating a machine.
2. Maintains the file system.
3. Functions as the essential part of the operating system.
4. Provides a graphical user interface.
Q226) Which of the following is an element of a packet?
1. Header
2. Data
3. Trailer
4. All of the above
Q227) SMTP, HTTP, and AFP are examples of:
1. Major Networking Protocols
2. Transport Layer Protocols
3. Application Layer Protocols
4. Network Layer Protocols
Q228) NAPs (Network Access Points) are:
1. Groups of computers connected within a confined geographic area.
2. Groups of computers connected over an expansive geographic area.
3. Junctions between on high-speed network and another.
4. None of the above

Q229) A piece of networking equipment that amplifies the electronic signal traveling on a
cable segment is a:
1. Repeater
2. Network Interface Card (NIC)
3. Transceiver
4. Hub
Q230 What transmission is characterized by the absence of a clock in the transmission
media?
1. Synchronous Transmission
2. Asynchronous Transmission
3. Data Transmission Flow
4. Broadband Transmission
Q231) X.25 and Fast Packet switching are examples of what standards?
1. WAN Standards
2. LAN Standards
3. Both 1 and 2
4. Neither 1 nor 2
Q232) Which layer of Internet architecture corresponds to the physical and data link
layers of the OSI reference model?
1. Transport Layer
2. Internet Layer
3. Network Access Layer
4. Application Layer
Q233) Which type of broadcast address is used for configuring hosts when they boot up?
1. Limited Broadcast
2. Net Directed Broadcast
3. Subnet Directed Broadcast
4. All Subnets Directed Broadcast
Q234) Which of the following TCP/IP troubleshooting commands displays the contents
of various network related data structures like sockets?
1. Ping
2. Tracert
3. Netstat
4. IPConfig
Q235) Which DNS record identifies DNS servers for the DNS domain?
1. Name Server (NS)
2. Start of Authority (SOA)
3. Address (A)
4. Canonical Name (CNAME)

Q236) What type of server is a dedicated server that identifies all resources on a network?
1. Catalog Server
2. Directory Server
3. Transaction Server
4. None of the Above
Q237) Com and Edu are examples of what kind of domains?
1. Root Level Domains
2. Top Level Domains
3. Second Level Domains
4. Second Level Sub Domains
Q238) Which of the following groups of factors should be considered when determining
product advantages and disadvantages?
1. Product Support, Cost, Simplicity of Use, Scalability
2. Cost, Product Testing, Simplicity of Use, Scalability
3. Product Support, Product Testing, Simplicity of Use, Scalability
4. Product Support, Product Testing, Cost, Simplicity of Use
Q239) Whenever a database is accessed on a network, which of the following is NOT a
major element involved?
1. User Interface
2. ODBC
3. Process Logic
4. Data Storage
Q240) Which network asset has carries the potential threat of IP spoofing?
1. Local Resources
2. Network Resources
3. Server Resources
4. Database and Information Resources
Q241) What is the most common type of network attack?
1. Spoofing Attacks
2. Man-in-the-Middle Attacks
3. Denial of Service Attacks
4. Insider Attacks
Q242) What type of attack occurs after a hacker has captured and altered a key part of a
message, such as a network data packet?
1. Trapdoor Attack
2. Replay Attack
3. Social Engineering Attack
4. Brute Force Attack

Q243) After downloading an Excel spreadsheet as an email attachment, a user's system


indicates the presence of a virus. It is most likely a:
1. Macro
2. Executable
3. Boot Sector
4. Stealth
Q244) Of the following key security concepts, which service provides protection of data
on a system or host from unauthorized access?
1. Authentication
2. Access Control
3. Data Integrity
4. Data Confidentiality
Q245) A protocol that encapsulates data packets into another packet is known as:
1. Tunneling Protocol
2. Kerberos
3. Secure Socket Layer
4. TCP/IP
Q246) Which digital certificate types are used by organizations like VeriSign to sign
other certificates?
1. Server Certificates
2. Personal Certificates
3. Software Publisher Certificates
4. Certificate Authority Certificates
Q247) Which of the following markup languages is optimized for limited capability
browsers, as well as developer ease of use for Web documents?
1. SGML
2. HTML 4.0 Frameset
3. HTML 4.0 Transitional
4. HTML 4.0 Strict
Q248) Which of the following would the W3C not establish standards for?
1. XML
2. DOM
3. CSS
4. WYSIWYG
Q249) What is the appropriate source to determine which markup language standard to
adopt for maximum browser compatibility?
1. CERN/MIT
2. W3C
3. Apple Computer
4. ISO

Q250) Of the following tags, which is not recommended for use for formatting text in an
HTML document?
1. <B>
2. <STRONG>
3. <U>
4. <EM>
5. <I>
Q251) Find all the correctable items with the following HTML document.<!DOCTYPE
HTML PUBLIC "-//W3C//DTD HTML 4.0
Transitional//EN!"><html><HEAD><Title>Sun & Sand Tours<Title><!--<B>All your
important text here</B>--><Body></HTML>
1. Remove the "!" from the end of Line 1, Line 2 should be in all caps, Line 3 end
tag should appear </title>, and line 5 should read </BODY>
2. HTML in line 2 should be caps, Line 4 has all critical text in a hidden comment,
and Line 5 should read </Body>
3. Remove lthe "!" from the end of line 1, Line 2 should be on two lines after
<html>, after line 3 should be <body/>, and line 5 should appear as </body>
4. Remove the "!" from the end of line 1, line 2 should be on 2 lines with <html> in
caps, line 3 end title should appear </title> and both should be in caps, line 4 has
all relevant text in a hidden comment and is missing a preceding <BODY> tag,
and line 5 should read </BODY>
Q252) Which of the following is the proper order of elements in an HTML document
with respect to precedence?
1. HTML, HEAD, TITLE, BODY
2. HEAD, TITLE, BODY, HTML
3. HTML, BODY, HEAD, TITLE
4. TITLE, HTML, HEAD, BODY
Q253) If you have to include a horizontal line on your page that extends exactly half way
across the screen, is left justified, is size 10, and is not 3D, what is the appropriate HTML
document?
1. <HR WIDTH="50%" ALIGN="left" SIZE=10 NOSHADE >
2. <SIZE=10 NOSHADE HR WIDTH="50" SIZE=10>
3. <HR WIDTH="50%" ALIGN="default" SHADE>
4. <HR WIDTH=50% ALIGN="left" SIZE=10 NO3D>
Q254) What is the best option for displaying an animated 4 color image on the highest
number of browsers?
1. PNG
2. JPEG
3. BMP
4. GIF 89a

Q255) When inserting an image into an HTML page it is best to:


1. Specify image background color
2. Specify image width in pixels only
3. Specify image width in pixels at a minimum.
4. Specify ALT attribute
5. Specify ALIGN and HSPACE attributes
6. 1, 2, 4, and 5
7. 3, 4, and 5
Q256) How do you turn house.gif into a link to index.htm?
1. <A HREF="index.htm"><IMG SRC= "house.gif"></A>
2. <A HREF=index.htm><ING SRC=house.gif></A>
3. <A HREF=index.htm>ING SRC=house.gif</A>
4. <A HREF="index.htm">ING SRC="house.gif"</A>
Q257) When creating an internally linked document, which of the following are
necessary to making a functional page?
1. Identify your anchor tag for your internal bookmarks to reference, including
target text, image, or both
2. Create a NAME attribute for the internal link destination using the # symbol
(hash) preceding the HREF value
3. Create a NAME attribute for the link destination omitting the # symbol (hash)
preceding the HREF value
4. 1 or 2 is sufficient
5. 1 and 2 are both needed
6. 1 and 3 are both needed
Q258) Which of the following statements is correct?
1. All flavors of the HTML 4.0 Recommendation allow you to specify color
attributes for tables and cells using the BGCOLOR attribute
2. HTML 4.0 Transitional is the only flavor that permits color attribute specification
for tables and cells using the BGCOLOR attribute
3. HTML 4.0 Strict is ideally optimized for color attribute modification for tables
and cells using the BGCOLOR attribute
4. All flavors of the HTML 4.0 Recommendation allow you to specify color
attributes for cells using the BGCOLOR attribute, and TD for table color
attributes.
Q259) Which of the following statements is not true.
1. The <CAPTION> tag can be used to align caption text to the top right or bottom
right of your browser. It defaults to the top right.
2. Navigator 4.0 (and higher) and Internet Explorer 4.0 (and higher) both support
the three alignment options of for tables: ALIGN="left", ALIGN="right" and
ALIGN="center". Older versions of both browsers do not support
ALIGN="center"

3. The proper HTML format for creating a row that spans 3 columns is: <TR><TD
ROWSPAN=3></TD>
4. You cannot have a table without a <TD> tag, unless you are using a <TH> tag.
Q260) What happens to a cell in a table marked column A if you increase the height of
cell in the same table marked column B?
1. A cell in column A cannot be affected by a change in column B
2. A cell in column A experiences a height change in the same way as any cell in
column B
3. A cell in column A is only affected if you alter a cell in row B as well
4. The cells in column A and column B, if on the same row, would share a height
change
Q261) In an HTML Web form, a CGI script can perform which of the following tasks?
1. Download a script to a client and execute on a host computer through such
languages as JavaScript or VBScript via a client side action
2. Residing on the server, a CGI script can remove extraneous information and
format data
3. Execute script within a server process and send the results to the the user
dynamically
4. 1 and 2
Q262) What happens when a form lacks appropriate tags?
1. Internet Explorer and Navigator will not display the form
2. Internet Explorer will display the form but will not submit and Navigator will not
show the form
3. Internet Explorer will display the form and allow you to submit and Navigator
will show the form, but will not let you submit
4. Internet Explorer and Navigator will not display the form
Q263) When building a form, what is the best choice to send two or more mutually
exclusive options?
1. Radio Buttons
2. Multiple Select List
3. Select List
4. Check Box
Q264) A GIF file has an image map associated with it. Here are the following coordinates
taken directly from the HTML string describing its location: 57,79,160,225. Using the
HTML format convention for defining a rectangular image, what dimension does 57
describe?
1. The number of pixels from the left of the image to the left of the rectangular image
map, or upper-left x coordinate
2. The number of pixels from the top of the image to the top of the rectangular image
map, or upper-left y coordinate

3. The number of pixels from the bottom right of the image from the bottom-right of
the rectangle, or bottom-right x coordinate
4. The number of pixels from the bottom of the image to the bottom of the
rectangular image map, or bottom-right y coordinate
Q265) Which of the following statements is not true.
1. To define a circle area image map you need the x and y coordinates, as well as the
radius of the circle you wish to define.
2. To define a polygonal image map, you need to define each individual set of x and
y coordinates for each point that defines the polygon.
3. A polygon image map can only support up to 100 pairs of coordinates per image.
4. To define a square image map you only need to supply an x coordinate and HTML
will auto assign a y coordinate, thus completing an image map for a square.
Q266) What web ready image formats support transparency?
1. GIF 89a
2. PNG
3. JPEG
4. GIF 87a (some graphics programs allow you to save a GIF 89a as a GIF87a,
choosing an option that retains transparency)
5. 1, 2, 3
6. 1, 2, 4
Q267) What are the possible side effects of using interlaced images in a Web page?
1. Interlacing can sometimes make an image larger
2. Interlacing will cause an image to download at a rate of 10% per pass and this
can frustrate users
3. Interlacing is only useful on browsers set up to accept JavaScripts
4. Interlacing an image will make it invisible to the user until it is done downloading
Q268) What is the primary goal of a corporate Web developer?
1. Always impress the user with fancy graphics and many tables
2. Establish a site with huge lists of links so that users can find what they want
3. Help a company reinforce its branding strategy
4. Only use the latest technology for your pages
Q269) What do Cascading Style Sheets not do?
1. Link a CSS sheet to multiple Web pages, allowing a user to make one change in
the CSS in order to affect the change to all associated pages.
2. Allows multiple declarations within a rule using semicolons
3. Uses inheritance to affect style throughout the document, unless otherwise
dictated by a property of superior precedence
4. Choosing a selector allows the user to define a property and its associated value,
thus creating a rule
5. 3 and 4
6. CSS rules obey answers 1, 2, 3, and 4

Q270) Given a 56 Kilobit per second download speed, theoretically how quickly will a
84Kilobyte Web page take to download?
1. 30 seconds
2. 11 seconds
3. 12 seconds
4. 9 seconds
Q271) Where exactly would you place content in a Web page to increase the likelihood a
search engine spider program will find it?
1. <META>
2. <BODY>
3. In the DTD
4. URL
Q272) How do XML and DTD relate to each other?
1. XML is a programming language and DTD is the browser you use to view XML
2. XML describes the function and context of a Web page's content. DTD assigns the
meaning to the custom tags you developed in XML for the corresponding
document, assigning validity to the XML
3. XML is SGML with JavaScript and DTD is the means of ensuring it is "well
formed"
4. XML the means of assigning function to Web content and DTD is the tag
necessary to allow the use of XML
Q273) What is the correct hierarchy for the following Java objects?
1. Window, frame, anchor, button
2. Window, anchor, frame, button
3. Anchor, window, button, frame
4. Frame, window, anchor, button
Q274) How many elements make up the client/server model?
1. 3
2. 2
3. 4
4. 1
Q275) What does the history folder on your Internet browser contain?
1. GIF and JPEG files
2. Recently downloaded applets
3. A list of URLs for previously viewed Web sites
4. All of the above
Q276) What action would you take if you needed to configure a browser for an individual
who does a lot of internet research using Web sites where content changes frequently, like
stock prices

1. Configure disk cache to a lower level and set the cache comparison to every time
you start the program
2. Configure disk cache to a higher level and set the cache comparison to every time
you view the page
3. Configure disk cache to a lower level and set the cache comparison to
automatically
4. Configure disk cache to a higher level and set the cache comparison to every time
you view the page
Q277) What are the primary reasons that a company would ask employees to disable
active content on their browsers?
1. Limits bandwidth consumption over networks
2. Protects servers from possible security compromises
3. Stops the use of email for personal purposes
4. Forces the employees to use the Internet for business purposes only
5. 1 and 2
6. 1, 3, and 4
7. 1, 2, and 3
Q278) What is a cookie?
1. A small Java executable delivered by a web server to a client
2. An HTML snippet that contains your customer data uploaded to the host web
server
3. A small text file created by a web server that resides on a client's computer
4. An active X applet that exists on each HTML page and registers each time you
visit
Q279) A firewall is comprised of what components?
1. Hardware, software, and corporate policies
2. Hardware and software
3. Corporate policies and software
4. Only software
5. Corporate policies and hardware
6. None of the above
Q280) Which standard browser security level grouping is correct?
1. Explorer 4, Navigator 2
2. Explorer 2, Navigator 1
3. Explorer 2, Navigator 3
4. Explorer 3, Navigator 1
Q281) How many general types of authentication exist for Web pages?
1. 2
2. 4
3. 1
4. 5

5. 3
Q282) Of the following, which is the least efficient way to search Web content?
1. Boolean strings
2. Keyword index
3. Full-text index
4. Static index/site map
Q283) Which of the following is not a Boolean operator?
1. IF
2. AND NOT
3. ()
4. ""
5. THEN
6. all of the above
7. A and E
8. C and D
Q284) Which of the following engines are case sensitive when using Boolean operators?
1. Excite
2. Lycos
3. AltaVista
4. None of the above
Q285) If you want to conduct a search on Hats and exclude references to Cat in the Hat,
what would your search string need to look like if you are using standard AltaVista?
1. Cat NOT (Cat in the Hat)
2. (Cat) -hat
3. Cat +NOT "in the hat"
4. Cat -"in the hat"
Q286) Choose the list that displays the most appropriate order of relevance if you were to
go to the web searching for late breaking news on how a U.S. corporate merger will
affect exchange rates in Denmark.
1. Currency exchange site >> Newspaper site >> SEC site
2. Newspaper site >> Currency exchange site >> SEC site
3. Newspaper site >> SEC site >> Currency exchange site
4. Currency exchange site >> SEC site >> Newspaper site
Q287) What is the method for accessing the U.S. copyright database?
1. Telnet
2. Boolean operator
3. T1
4. only available in print
5. none of the above
6. 1 and 3

Q288) Of the following programming languages, which is most appropriate to develop


small to medium applications optimized for use over a network?
1. C++
2. Java
3. C
4. Visual Basic
Q289) What is a difference between JScript and JavaScript?
1. JScript is a subset of Netscape technologies that predated Javascript
2. JScript is the Microsoft "answer" to Sun's stand alone development package
JavaScript
3. JScript is integrated into Netscape and may not run on Explorer and JScript is
integrated into Explorer and may not run on Netscape
4. JScript is an Object oriented Programming language and JavaScript is an objectbased scripting language
Q290) How can you tell if you are not using streaming media?
1. It must download a plug-in to be used first
2. It will download completely before allowing you to view the content
3. It will only show the active portion of the media as the rest downloads in the
background
4. It will warn you that your disk cache is not active
Q291) Which of the following pairs does not match?
1. Flash player = developed for deployment of on-line games
2. Quicktime Movie = optimized for integration of video, animation, text and sound
3. RealAudio = originally developed to deliver fast downloads of non-streaming
audio
4. Shockwave = developed for integrated deployment of animation, sound,
graphics ,and streaming video
5. none of the above
6. all of the above
7. 1 and 3
8. 2 and 3
Q292) Of the following, which are not associated with audio files?
1. MP3
2. EPS
3. TIFF
4. RTPS
5. none of the above
6. 2 and 3
7. 2, 3, and 4
Q293) What is the difference between a plug-in and a viewer?

1. Plug-ins contain files for viewing over the Internet and viewers are scaled down
applications used to access certain file types
2. Plug-ins are specific platform and browser applications that provide integration
of multimedia formats and viewers are the same as plug-ins, but only work in
desktop applications
3. Plug-ins are for viewing files were a normal application would be too large and
viewers are for viewing documents optimized for the web where you have the full
application available for Active X support
4. Plug-ins are applications that are browser and platform specific permitting
integration of multimedia contents for the PC and browser and viewers are scaled
down versions of applications that are needed, often only for viewing and
printing, of files where the full application is not available for use on that
computer
Q294) How many primary elements comprise electronic commerce?
1. 2
2. 3
3. none currently defined
4. 4
Q295) Which is a description of the primary benefits of SET?
1. Enables easy and inexpensive communication, reduces the amount of data
capture, and ensures fast handling of cash flow
2. Protects expression and originality
3. Provides enhanced identification, protects credit card information from the
vendor, encrypts all sensitive information between parties, and facilitates
financial transactions
4. Enables large volume of repetitive standard transactions, help operators on tight
margins, and allows users to function in time-sensitive environments
Q296) What is the relationship between IITF and WIPO?
1. Both are organizations concerned with protecting intellectual property
2. Both are authentication standards for e-commerce transactions between nations
3. IITF is for the music industry and WIPO is for weapons systems and
cryptography
4. There is no relationship between the two products
Q297) How many types of smart cards are there?
1. 1
2. 2
3. 3
4. 4
Q298) What is scope creep?
1. A type of on-line purchasing security violation where the digital thread containing
the secured information is transparently bifurcated to a shell account

2. When changes in cost, schedule, or performance deviate from the initial


expectations during a project
3. A Web site development flaw that occurs when non Web-safe colors are used in a
site that causes strobing
4. The term used to describe the rapid expansion and development of business to
business commerce
Q299) What is the order of the five stages of a project cycle? 1 Pilot/parallel, 2
Technology/architecture design, 3 Cutover/live, 4 Implementation/development, 5
Business process/function design
1. 5, 2, 4, 1, 3
2. 1, 3, 5, 2, 4
3. 4, 3, 1, 2, 5
4. 2, 4, 5, 3, 1
5. 2, 5, 4, 1, 3
Q300) What does ODBC stand for?
1. open database backend connectivity
2. open data backend connectivity
3. open database connectivity
4. open database computer
Q301) What does CICs stand for?
1.
2.
3.
4.

Customer interrelated control system


customer information control system
computer interrelated control system
customer information control system

Q302) What is the client/server model otherwise known as;


1. peer-to-peer
2. single database
3. none
4. distributed computing
Q303) The client /server model contains two types of databases (choose 2)
1. peer to peer
2. distributed databases
3. single database servers
4. ODBC
Q304) What is the main advantage to distributed databases?
1. low cost
2. easy to configure
3. reduces bottlenecks
4. stores information straight to Raid 3 Hard drives

Q305) What does SQL stand for?


1. sequel
2. structured query language
3. standard query language
4. simple query language
Q306) What are the three basic elements that a Network consists of? (Choose 3)
1. protocols
2. clients
3. workstations
4. nodes
5. server
6. transmission media
7. NIC
8. OS
9. Network Services
10. brouter
11. SQL
Q307) What are the disadvantages of a peer-to-peer network? (choose all that apply)
1. less secure
2. supports up to 10 users
3. file storage
4. harder to work with
Q308) On a typical server based network, what are the four basic resource servers?
1. file, mail, web, storage
2. mail, web, file, storage
3. web, mail, file, storage
4. print, mail, file, web
Q309) What does a Bus Topology require at the end of the network cables to ensure
network traffic does not echo back
1. server
2. hub
3. terminator
4. gateway
Q310) How does a Stor Topology connect nodes?
1. Gateway
2. repeater
3. server
4. hub
5. patch panel
6. MAU

Q311) What is the disadvantage to a Star Topology?


1. if a client breaks/fails the network can fail
2. if a hub breaks/fails the network can fail
3. if a cable breaks at any point the network can fail
4. it is difficult to configure
Q312) It is possible to combine Network Topologies through a Hybrid Topology!
1. True
2. False
Q313) Ring Topologies do not have a central connection point!
1. True
2. False
Q314) Ring Topologies often connect through a ...
1. Gateway
2. Central Server
3. AUM
4. MAU
Q315) What does MAU stand for?
1. Multi access unit
2. Multiple access unit
3. Multi appendage unit
4. Multistation Access Unit
Q316) What are the two advantages of a Ring Topology? (choose 2)
1. All computers have equal access to data
2. Network expansion does not affect the network
3. if a cable breaks it will affect the network
4. Performance is equal for all users
5. Reconfiguring the network will not affect the network
Q317) What are the disadvantages of a Ring Topology? (choose 3)
1. Computers do have equal access to data
2. Performance is not equal for all users
3. network expansion effects the network
4. if a cable breaks the network can fail
5. re-configuring the network will effect the network
Q318) What are the advantages of a Hybrid Topology? (choose 2)
1. If a hub breaks the network will still be functionable
2. expanding the network is relatively simple
3. The backbone can support media
4. If a computer fails the network is not affected

Q319) What are the disadvantages of a Hybrid Topology? (choose 2)


1. If a hub breaks, clients on the hub will not be able to communicate
2. Speed is restricted
3. network expansion becomes difficult
4. Connections between hubs will fail if one is broken
Q320) What does W3C stand for?
1. Web Free Criteria
2. Wicked Wild Web Chat
3. World Wide Web Constitution
4. World Wide Web Consortium
Q321) What does CICS stand for?
1. Consortium of Internet Chartered Systems
2. Customer Information Council System
3. Customer Information Control System
4. Client Information Central Server
Q322) Why would it be necessary to disable active content from downloading into your
browser? (choose 2)
1. You want to view Java Applets and Active X components
2. You have limited bandwidth
3. Your browser only supports 56Kbps
4. Origin of active content may be questionable
Q323) Who is responsible for promoting standards?
1. CERN
2. INTERNIC
3. ARPANET
4. W3C
5. IIA
Q324) I am a security measure comprised of one computer (called a bastion) that acts as
both a firewall component and the network interface. I screen all packets coming to and
from the internal hosts at the application level. A router forwards all incoming traffic to
the bastion and allows traffic only from the bastion. What am I?
1. packet-filtering router
2. Screened-host firewall (single-homed bastion)
3. screened-subnet firewall (demilitarized zone)
4. Screend-host firewall (dual-homed bastion)
Q325) A computer without an IP address can broadcast which address to obtain one?
1. 0.0.0.0
2. 255.0.0.0
3. 0.0.0.255
4. 255.255.255.255

Q326) What is the birthplace of the Web?


1. W3C
2. ICANN
3. CERN
4. ARPANET
Q327) Which is defined as "the interorganizational exchange of documents in
standardized electronic form directly between participating computers"?
1. business-to-business model
2. SET
3. EDI
4. UN/EDIFACT
Q328) Which network topology consists of a central device (hub) through which all
network nodes are connected?
1. bus
2. ring
3. star
4. mesh
Q329) Which of the following pairings concerning the OSI/RM model is incorrect?
1. Session Layer: Establishes, manages, and terminates connections between
cooperating applications
2. Network Layer: Organizes data into packets and routes them to their destinations
3. Presentation Layer: The interface to the end user
4. Data Link Layer: Provides reliable data transfer across the physical link
Q330) Which of the following operates on several layers of the OSI/RM and can redirect
information flow from one node to another while giving each sender/receiver pair the
line's entire bandwidth?
1. routers
2. brouters
3. switches
4. gateways
Q331) Which protocol that occupies the internet layer of the Internet archictecture model
is responsible for resolving physical addresses from IP addresses?
1. UDP
2. RARP
3. ARP
4. ICMP
Q332) Which of these is a connectionless, broadcast-oriented protocol that occupies the
transport layer of the Internet architecture model?
1. TCP
2. UDP

3. IP
4. IGMP
Q333) Which of these is a fast packet switching technology that uses fiber optic and
digital cabling and makes use of variable length packets?
1. ATM
2. frame relay
3. X.25
4. PPP
Q334) Which of the following is the first point of contact for T1 wires that are connecting
to a LAN?
1. DSU
2. multiplexor
3. CSU
4. router
Q335) Which routing protocol allows load balancing, partitioning of a network into areas,
and various types of service routing?
1. OSPF
2. EGP
3. BGP
4. RIP
Q336) Which diagnostic tool tests connectivity between source and destination systems?
1. ipconfig
2. netstat
3. ping
4. tracert
Q337) Which of the following network components is incorrectly paired with its OSI/RM
layer of operation?
1. repeaters: Physical layer (Layer 1)
2. gateways: Any layer
3. routers: Physical layer (Layer 1)
4. brouters: Data Link and Network layers (Layers 2 and 3)
Q338) Which is the most commonly used type of cable?
1. solid STP
2. solid UTP
3. stranded STP
4. stranded UTP
Q339) The following is a list of cable types and their possible uses. Which is incorrect?
1. multimode fiber optic: LANs and WANs
2. thicknet: ethernet standard for smaller networks

3. coaxial: baseband, broadband, and television networks


4. twisted pair: ethernet and token ring networks
Q340) If a hacker assumes the identity of a legitimate network device to gain access to
important information, this is known as a(n):
1. insider attack
2. trapdoor attack
3. spoofing attack
4. man-in-the-middle attack
Q341) Which security level provides the least amount of protection?
1. A1
2. D
3. B1
4. B3
Q342) All of the following are key security organizations except;
1. CERT
2. CSRC
3. IETF
4. CIAC
Q343) Which type of encryption uses a table of hexadecimal numbers to calculate the
encryption and is used with automatic teller machine cards?
1. hash (one-way)
2. symmetric
3. asymmetric
4. Kerberos
Q344) I am a network-level encryption method that allows secure communication across
long distances, usually for a company extranet. I am capable of encapsulating protocols
such as IPX/SPX into other protocols, such as TCP/IP. What am I?
1. SSL session
2. VPN (virtual private network)
3. Kerberos
4. one-time password (OTP)
Q345) Which of the following is not an example of a broadband packet-switching
technology?
1. frame relay
2. Ethernet
3. DSL
4. cable TV networks
Q346) The following is a list of network components and their possible functions. Which
pairing is incorrect?

1. Bridge: determine whether a specific frame belongs on a local segment or


another LAN segment
2. CSU/DSU: terminates physical connections and required when using dedicated
circuits, such as T1 lines
3. Repeater: insures that electronic signals do not degrade
4. Router: directs flow of information from one node to another and allows for full
bandwidth use
Q347) A WAN technology implemented at the network layer of OSI/RM, this older
protocol is used for many point-of-sale transactions, operates at 56Kbps or slower, and
ensures error-free data delivery by checking errors at many points along the data's path:
1. ATM (aysnchronous transfer mode)
2. frame relay
3. X.25
4. PPP
Q348) Which of the following describes the elements, or objects, within a document
rendered by a Web browser?
1. DHTML
2. DOM
3. CSS
4. <META> tag
Q349) Which of the following allows you to describe the function and context of the
actual information in a document?
1. HTML
2. DOM
3. XML
4. DTD
Q350) Which of the following does not specify a "flavor" of HTML 4.0?
1. Frameset
2. Public
3. Strict
4. Transitional
Q351) Which of the following is an object-based scripting language that can manipulate
HTML objects as well as ActiveX controls?
1.
2.
3.
4.

VBScript
JavaScript
Jscript
Java

Q352) Which of the following is an open set of technologies for integrating components
on the web?

1.
2.
3.
4.

Java applets
JavaScript
Plug-in
ActiveX

Q353) Recently developed to enhance the security and capabilities of e-commerce, this
protcol features enhanced identification, the passing of encrypted credit card information
that only the merchant's bank can access, and encryption of all sensitive information
among all parties involved:
1. EDI
2. SSL
3. SET
4. business-to-business model
Q354) Which of the following has been shown NOT to be an effective manner of internet
advertising?
1. referrer bonus
2. contest promotions
3. banner ads
4. partnerships
Q355) Which of the following e-commerce payment methods enhances authentication
and is capable of storing and updating passwords and other security information?
1. cash model
2. smart cards
3. credit model
4. check model
Q356) Which layer of the OSI/RM provides useful transformations on data to support a
standardized application interface?
1. Data Link Layer
2. Session Layer
3. Application Layer
4. Presentation Layer
Q357) Which of the following is a token-based LAN standard composed of two counterrotating rings and is often used to cover a city or specific geographic area?
1. Apple LocalTalk
2. FDDI
3. Gigabit Ethernet
4. Ethernet/IEEE 802.3
Q358) Which of the following WAN standards is implemented at the MAC sublayer of
the data link layer and uses fixed-sized cells to support data as well as real-time video and
voice?
1. frame relay

2. ATM (asynchronous transer mode)


3. PVCs (permanent virtual circuits)
4. IEEE 802.12-100VG-AnyLAN
Q359) This solution is based on the X-Open call-level interface and is one of the industry
standard APIs for using SQL to access relational databases:
1. JDBC
2. ODBC
3. ColdFusion
4. ADO
Q360) You are the administrator of a small company that requires extensive security.
Although security is a concern, you must also consider the costs associated with
obtaining certificates. Which server do you recommend most?
1. certificate server
2. directory server
3. transaction server
4. proxy server
Q361) Which is the most commonly used web server?
1. Microsoft IIS
2. Apache Server
3. Lotus Domino
4. Lotus Go Webserver
Q362) Which of the following is an advantage of JavaServer Pages (JSP)?
1. JSP is free.
2. JSP utilizes memory well.
3. JSP communicates with databases.
4. All of the Above
Q363) Which is not true of java servlets?
1. They use objects
2. They are platform independent
3. They cannot be chained
4. They are created using java
Q364) Which of the following is true of Relational Database Management System
(RDBMS)?
1. Can allow a user to password protect a database file
2. Allows a user to work with hierarchical database types
3. Allows a user to work with network database types
4. Uses queries to organize tables
Q365) Which one is the correct way to display an H1 heading in HTML?
1. <h1> Welcome to my website </h1>

2. <h1> Welcome to my website


3. <h1> Welcome to my website </h2>
4. <h1> Welcome to my website <\h1>
Q366) What is the right html tag for a link
1. <a href=url>URL</a>
2. <a href=url>url<a>
3. <a href="url">URL</a>
4. <a href="url" URL></a>
Q367) Thomas is testing a page he created in html. Thomass computer has a VGA
maximum display of 640 by 480 pixels also the Browser he uses can only display the font
Times New RomanHe adds the following code into his html document;<HTML>
<BODY>
<DIV ALIGN=CENTER>
The Trees In Africa
</DIV>
A New species.
</BODY>
</HTML>What would the following code look like when displayed through his
Browser?
1. The Trees In Africa would be centered at the top of the browser, and A New
Species would be centered directly below.
2. The Trees In Africa would be centered at the top of the browser, and A New
Species would be placed next to it on the same line.
3. The Trees In Africa would be placed at the top of the browser, and A New
Species would be centered next to it.
4. The Trees In Africa would be centered at the top of the browser, and A New
Species would be on the line below aligned to the left.
Q377) What is the main function of ARPANET?
1. To aid the US Government to send and receive information throughout
universities across America to aid research.
2. To function under extreme conditions.
3. To aid universities across America develop research.
4. To aid the US Military.
Q378) What was the main design feature that ARPANET created?
1. There was a central HUB, which allowed multiple hosts and connections.
2. There was no central HUB, which allowed multiple hosts and connections
3. Multiple hosts and connections.
4. There was no central HUB, so, control was spread throughout the Network
Q379) What is an example of a country level domain?
1. .Com
2. .Edu

3. .Ca
4. .Net
Q380) Which class of IP addresses uses 8 bits for the Network portion and 24 bits for the
host?
1. Class A
2. Class B
3. Class C
4. Class D
5. Class E
Q381) Which class of IP addresses uses 24 bits for the Network portion and 8 bits for the
host?
1. Class A
2. Class B
3. Class C
4. Class D
5. Class E
Q382) Which class of IP addresses uses 16 bits for the Network portion and 16 bits for
the host?
1. Class A
2. Class B
3. Class C
4. Class D
5. Class E
Q383) Which class of IP addresses is reserved for future use?
1. Class A
2. Class B
3. Class C
4. Class D
5. Class E
Q384) Which class of IP addresses supports Multicasting?
1. Class A
2. Class B
3. Class C
4. Class D
5. Class E
Q385) Block-Level tags are: (choose 2)
1. Elements that affect an entire paragraph or multiple paragraphs.
2. Elements that can affect something as small as a character or a word.
3. Elements that are automatically preceded and followed by paragraph breaks
4. Elements that are not followed by breaks unless the breaks are manually included.

Q386) Text-Level tags are: (choose 2)


1. Elements that affect an entire paragraph or multiple paragraphs.
2. Elements that can affect something as small as a character or a word
3. Elements that are automatically preceded and followed by paragraph breaks
4. Elements that are not followed by breaks unless the breaks are manually included.
Q387) What is the standard language for extracting data from a relational database?
1. CGI
2. SQL
3. ASP
4. PERL
Q388) You have a client who will soon be moving from the U.S. to the Far East. Before
leaving the U.S. He must comply with export regulations regarding encryption
technology. What should you do?
1. Download an international patch for a browser.
2. Download a plug-in or international encryption.
3. Download an international version of browser.
4. Select international MIME type.
Q389) "John Doe" is able to read files (these are files being shared on a Network) but is
not able to _create_ files (even though other users can), What does the Network
Administrator need to change?
1. John's Read Access
2. John's Write Access
3. John's Executable (or Execute?) Access
4. Setup a new user ID and password, because he should be able to read and write.
Q390) What file extension AppleTalks Quicktime associated with?
1. .mpeg
2. .avi
3. .mov
4. .wav
Q391) What method of online payment can hold up to 4MB of data?
1. Smartcard
2. The cash model
3. The check model
4. The credit model
Q392) Sharon uses a 56kbps modem to read certain content from her favourite media rich
site. This site often posts many pictures. Sharon is becoming increasingly annoyed about
the time in which it takes to download the content! What should she do?
1. Change browser font size to 'smallest'
2. Disable 'image loading' within her browser
3. Purchase a faster modem

4. Increase her 'Virtual Memory'


Q393) You are the administrator of small-medium sized, rapidly expanding company.
When you first started a year ago, there were 150 employees, now there are 300. You
have noticed over the last few months that downloading webpages is increasingly
becoming slower. What do you suggest your company implements in order to speed
things up again?
1. A written policy limiting employees to internet usage
2. Stricter access for non-essential employees to access the web
3. Install a proxy server
4. Upgrade network to coaxial (thinnet)
Q394) Which of the following IS a Boolean Logic operator?
1. PLUS
2. OR
3. IF
4. MINUS
Q395) Which E-Commerce protocol is a standard method of transfering information
between computers and companies?
1. EDI
2. SET
3. SSL
4. UDP
Q396) What is the correct definition of the World Wide Web?
1. A global network of networks, that electronically connect millions of people
worldwide
2. Was specifically designed to function under extreme conditions
3. Promotes standards and encourages interoperability among web products
4. Promotes the advancement of science and engineering
Q397) What is the correct fully-qualified syntax for a newsgroup?
1. comp.sys;nt
2. comp.sys.nt*
3. comp.sys,nt
4. comp.sys.nt
Q398) What statement is true of a .GIF and .JPG?
1. They both support transparency
2. They can both be compressed
3. They both have a maximum of 255 colors
4. They have always been compatible with all modern day browers
Q399) What is the most commonly used protocol with a VPN?
1. PPTP

2. Frame Relay
3. SSL
4. SET
Q400) jerome compiles a, an ASP script to work along with his web site, he decides to
test it before implementing it. The script goes through the phases although when it tries to
query the database, it receives an error. What is the problem?
1. The script was not compiled properly
2. The script does not have the necessary permissions to query the database
3. The script has not been chained properly
4. Wrong OS, needs Unix OS to function properly
Q401) An HTML tag can consist of an element, an attribute and a value, enclosed within
a pair of angle brackets or "wickets." Which of the following items constitutes the
minimum requirement for the most basic tag?
1.
2.
3.
4.

Element and attribute


Attribute
Value
Element

Q402) Franco wants to implement a backup solution for his Web server. If the Web
server's hard drive fails, an exact duplicate of the failed drive must exist on another drive
or server. Which data redundancy server should Franco implement?
1. Caching server
2. List server
3. Catalog server
4. Mirrored server
Q403) Eva wants to send an e-mail message to a co-worker named Gregor. Gregor has an
e-mail account on a mail server named colossustravel.com. His e-mail account name on
this server is gregor. Which e-mail address format should Eva use to ensure that Gregor
receives her Internet e-mail message?
1. gregor@colossustravel.com
2. gregor%colossustravel.com
3. gregor#colossustravel.com
4. gregor!colossustravel.com
Q404) Althea needs information about ballpoint pens. She wants to find Web pages based
only on the words "ballpoint" and "pen" when they appear together. On most Web search
engines, which of the following searches would best meet Altheas needs?
1. Search first on "ballpoint" then on "pen"
2. "ballpoint pen"
3. Search first on "pen" then on "ballpoint"
4. ballpoint+pen

Q405) Maja is building a Web site for a client. The client wants a text message to appear
while the image myimage.gif is downloading to the visitor's browser. Which HTML
syntax will produce this result?
1. <IMG SRC="myimage.gif" ALT="Company Logo">
2. <IMG SRC="myimage.gif" INPUT TYPE="Company Logo">
3. <IMG SRC="myimage.gif" NAME="Company Logo">
4. <IMG SRC="myimage.gif" TEXTAREA="Company Logo">
Q406) The HTML <META> tag can be used to describe the contents of your Web page.
This description appears in a search engine when your site is returned as a search result.
Which of the following choices uses the correct <META> tag syntax to specify a
description for a pet-sitting site?
1. <META SEARCH="contents" DESCRIPTION="We provide complete pet-sitting
services.">
2. <META NAME="description" CONTENT="We provide complete pet-sitting
services.">
3. <META DESCRIPTION="We provide complete pet-sitting services.">
4. <META CONTENT="description"> We provide complete pet-sitting services.
</META>
Q407) The current version of HTML ratified by the W3C is HTML 4.0, which includes
three variants or "flavors" of the specification. Which of the following choices lists the
three flavors of the HTML 4.0 standard?
1. Recommended, Dynamic, and Cascading
2. Transitional, Strict, and Frameset
3. Linked, Embedded, and Inline
4. DHTML, CSS, and XML
Q408) Internet domain names sometimes use a country-level domain, or country code, to
identify the geographical region in which an Internet organization or address is based.
Which of the following choices demonstrates the proper syntax for a country-level
domain?
1. mx.salsa.com
2. londontimes.co.uk
3. britishlore.eng
4. bonjour.fra.com
Q409) Why would it be necessary to disable active content from downloading into your
browser? (Select the two best answers.)
1. Your browser only supports 56 Kbps
2. You want to view Java applets and ActiveX components
3. Origin of active content may be questionable
4. You have limited bandwidth
Q410) Cicero wants to implement an e-mail system that will operate on TCP/IP networks.
Which of the following protocols supports e-mail on TCP/IP networks?

1.
2.
3.
4.

NetBEUI/NetBIOS
SMTP/POP3
IPX/IMAP
LPR/LPD

Q411) A popular Windows file compression software file extension used for making
downloads available on the Internet:
1. ASP
2. Tar
3. Zip
4. Doc
5. All of the above
Q412) The acronym ISP is an abbreviation for the folowing terms:
1. Internet Service Provider
2. Independent Systems Programmer
3. Integrated Service Provider
4. None of the above
Q413) The client computer software package that allows the transfer of files between two
computers:
1. File Transfer Protocol
2. File Transfer Process
3. Transfer Software Protocol
4. Software Transfer Protocol
Q414) The communications protocol commonly used on the Internet:
1. Netbios
2. Netbeui
3. IPX/SPX
4. TCP/IP
5. All of the above
Q415) The communications protocol used to allow a user at one site to connect with a
remote system at another site as if the user's terminal were directly connected:
1. Gopher
2. TFTP
3. HTTP
4. Telnet
5. None of the above
Q416) An example of a Internet search engine that is highly automated and initiates a
"robot" or "spider" program that automatically searches the Web and indexes Web sites:
1. Gopher
2. Lycos
3. AltaVista

4. Yahoo
5. None of the above
Q417) A means of transferring files between computers:
1. telnet
2. FTP
3. TCP/IP
4. Gopher
5. BGP
Q418) Client software that allows the end user to communicate and request information
from a server:
1. Real Audio Player
2. Microsoft Internet Explorer
3. Winfax
4. both a and b
5. all of the above
Q419) Small text files placed on a Web site visitor's computer:
1. Javascript
2. GIF's
3. JPEG's
4. none of the above
Q420) Applications used for scrambling information using mathematical algorithms.
1. encryption
2. virus detection and removal
3. firewall
4. none of the above
Q421) The authentication type that encrypts a user name and password being sent:
1. anonymous access
2. basic authentication
3. secure authentication
4. digital certificates
5. none of the above
Q422) Installable multimedia applications that integrate with the Web browser and
operating system on a computer:
1. plug-ins
2. Microsoft Office
3. Adobe Photoshop
4. none of the above
Q423) The file format that maintains the document formatting originally created that can
be rendered on other platforms:

1.
2.
3.
4.

VRML
Shockwave
QuickTime
PDF

Q424) The standardized interorganization exchange of documents in electronic form


directly between participating computers:
1. PDF
2. EDI
3. OSPF
4. none of the above
Q425) An example of a HTML container tag is:
1. <HTML>
2. <IMG SRC>
3. <P>
4. <LI>
5. All of the above
Q426) Web pages created for use on the Internet/Intranet will need to be uploaded to a
Web server specifically designed to handle ________ types of requests:
1. Telnet
2. Real Audio
3. Wave file
4. Hypertext Transfer Protocol (HTTP)
Q427) Jane wants to include hypertext links in her Web page. She codes references into
her HTML so that when users click a link, they will (choose all that apply):
1. access another Web page
2. access the SGML reference code
3. be transferred to the Internet
4. access other media such as sound, video, animation and images
5. access the hypertext extension files
Q428) The network topology that connects network nodes through a central device such
as a hub:
1. star topology
2. ring topology
3. bus topology
4. none of the above
Q429) Non-routable protocols include:
1. netbios
2. spx
3. tcp
4. netbeui

5. a and d
6. none of the above
Q430) The equipment interface between a computer workstation or server and the
network:
1. switch
2. hub
3. bridge
4. router
5. none of the above
Q431) Examples of routing protocols used outside an organization's network:
1. ATM and frame relay
2. netbios and netbeui
3. EGP and BGP
4. RIP and OSPF
5. none of the above
Q432) A fixed piece of formatted information sent across a network:
1. packet
2. protocol
3. byte
4. bit
Q433) A junction between one high-speed network backbone and another high-speed
network:
1. NIC
2. NAP
3. PAP
4. none of the above
Q434) An example of broadband packing switching technology:
1. T1/T3
2. token ring
3. ethernet
4. frame relay
5. none of the above
Q435) An IP address range reserved for use on private Intranets:
1. 121.1.1.1 thru 121.131.1.1
2. 168.100.1.32 thru 168.200.1.1
3. 172.16.16.0.0 thru 172.31.255.255
4. both b and c above
Q436) A packet filter can be defined as:

1. a type of firewall that inspects only network header fields after analyzing Internet
addresses and port numbers
2. an access control firewall
3. a type of gateway that screens e-mail message packets
4. a type of firewall that inspects only Internet addresses and port numbers after
analyzing network header fields
5. a type of gateway that screens application packets
Q437) Asymmetric encryption uses:
1. three-way algorithm
2. Secure State Level (SSL) keys
3. a pair of private keys
4. a symmetric RC-series algorithm
5. a pair of keys, one public and one private
Q438) The IP number 186.3.56.78 uses which default subnet mask?
1. 255.0.0.0
2. 255.255.0.0
3. 255.255.255.0
4. 255.255.255.255
Q439) Which version of HTML 4.0 can use CSS?
1. Transitional
2. Structured
3. Strict
4. Formal
Q440) Which of the following are true about 10base2 cable?
1. Maximum length of 185 feet
2. It is also referred to as thinnet
3. It requires an RJ-45 connector
4. It is coaxial cable
Q441) Which of the following is the correct syntax for an HTML comment tag?
1. <-- Comment -->
2. // Comment --//
3. //-- Comment -->
4. </neglectcomment ....../>
Q442) Which of the following uses a pair of private keys?
1. Asymmetric encryption
2. Symmetric encryption
3. One way hash
4. Public encryption
Q443) Which of the following sends information in 53 byte cells?

1.
2.
3.
4.

Token ring
ATM
ISDN
SONET

Q444) Which topology requires termination at each end point?


1. Mesh
2. Ring
3. Star
4. Bus
Q445) Which of the following refer to twisted pair cable?
1. 10baseT
2. UTP
3. FDDI
4. BNC connectors
Q446) Which type of internet address is unique?
1. DNS
2. Default gateway
3. ISP
4. IP
Q447) Which of the following will provide the largest increase in internet download
speed?
1. Disable images
2. Disable cookies
3. Clear history
4. Clear cache
Q448) Archie is used with __?__
1. Gopher
2. Telnet
3. FTP
4. ISP
5. NNTP
6. SMTP
7. Archie
8. Veronica
Q449) Veronica is used with __?__
1. Gopher
2. Telnet
3. FTP
4. ISP
5. NNTP

6. SMTP
7. Archie
8. Veronica
Q450) Which of the following protocols are used with Usenet?
1. SMTP
2. SNMP
3. FTP
4. HTTP
5. NNTP
6. PPP
7. ISAPI
Q451) John needs to send a file to Rudy in another state. Unfortunately, the large file size
is prohibited by the ISP. How can John transfer the file?
1. IMAP
2. FTP
3. SMTP
4. Archie
Q452) Which of the following are needed to connect a T1 line to a company network?
1. CSU/DSU/Multiplexor
2. Nic card
3. Hub
4. Proxy server
Q453) The major difference between the <br> and <p> tag is that <br> forces a break
with a white space, whereas <p> is essentially just a line return.
1. True
2. False
Q454) In the tag <img src="myciw.gif" alt="myciw">, the alt attribute does which of the
following?
1. Gives an alternate file in case the first file is corrupted
2. Gives an alternate file in case .gif files can't be downloaded by the browser
3. Links to a picture of myciw
4. Displays text while the image is loading
Q455) The IP number 152.9.56.28 belongs to which class?
1. A
2. B
3. C
4. D
Q456) Which of the following servers is generally used to cache information?
1. Database

2. Firewall
3. Proxy
4. Catalog
Q457) Mary is looking for a book on miniature poodles to buy for her niece as a birthday
present. Which of the following will yield the best list?
1. miniature + poodles
2. "miniature poodles"
3. miniature or poodles
4. miniature poodles
5. <miniature and poodles>
Q458) If you want to create a company directory that can be accessed by all the
employees across a LAN, you would use a?
1. RAS
2. Router port
3. Proxy server
4. LDAP server
Q459) Which of the following are empty tags?
1. Li
2. Meta
3. Br
4. Colspan
Q460) The OSI model consists of a series of layers. Which of the following are the
correct sequence?
1. Application, Presentation, Network, Session, Transport, Data Link, Physical
2. Application, Presentation, Session, Transport, Network, Data Link, Physical
3. Application, Presentation, Transport, Network, Session, Data Link, Physical
4. Application, Presentation, Session, Network, Transport, Data Link, Physical
Q461) Which of the following tags are used to create lists? (pick three)
1. <dl>
2. <ol>
3. <li>
4. <dd>
5. <ul>
Q462) James needs to create a web page that will either say, "Good Morning", "Good
Afternoon", or "Good Evening", based on the time of day. What kind of scripting would
be best for james to use?
1. Client Side Scripting
2. Server Side Scripting
3. DHTML Scripting
4. Any of the above would be equally appropriate

Q463) Bridges operate on the __?__ layer of the OSI/RM


1. Data Link
2. Physical
3. Network
4. Application
Q464) A __?__ is a device that enables a computer to comunicate with other computers
over telephone lines
1. Modem
2. Bridge
3. Repeater
4. Data Link
Q465) __?__ is a term used to refer a protocol that require a host to establish a
connection before it transfers information
1. Stateful
2. Stateless
3. Telnet
4. Asynchronous
Q466) Protocols that have been replaced by more recent ones or that never recieved
enough interest to develop are at which maturity level state?
1. Historic
2. Experimental
3. Draft
4. Informational
Q467)Either _____ or a _____ usually makes Network Access Point connections. These
high-speed networks are called "Internet Backbones", because they provide essential
connectivity for the rest of the Internet.
1. Switch or Bridge
2. Bridge or Hub
3. Bridge or Router
4. Router or Switch
Q468) ICANN has reserved three blocks of IP address space for private Internets. Which
of the following would qualify a company to use these network Ids?
1. The host does not require access to other enterprise or Internet hosts.
2. The host's Internet needs can be handled by mediating gateways.
3. Both A & B
4. None of the above
Q469) Bob needs to send an important document message to his lawyer. The lawyer has
Bob's public key. Bob encrypts his message with his private key. He has created an
encrypted file that contains a distinct signature. When the lawyer recieves Bob's message,

he decrypts Bob's digital signature with his copy of Bob's public key. What will
authenticate the message?
1. If the signature's hash value matches the recieved signatures hash value, the
message, it has not been altered.
2. If the lawyer is able to open and view the message by using his copy of the public
key, the message has not been altered.
3. If the lawyer is able to open the message by using his password, the message has
not been altered.
4. If the lawyer is about to open the message using his private key, the message has
not been altered.
Q470) You can measure a router's capability by it's __?__ rate.
1. Transfer
2. MBPS
3. BPS
4. PPS
Q471) A __?__ is a group of computers connected within a confined geographic area, that
allows users to share files and services.
1. WAN
2. LAN
3. Wide Area Network
4. NAP
Q472) Choose the decimal equivalent for this binary value: 01111000 00000001
00000011 11110000.
1. 126.2.3.240
2. 255.216.120.64
3. 120.1.3.240
4. 216.122.12.64
Q473) __?__ is a high capacity cable used for video and communication networks. It
contains a signal wire at the center, which is either stranded or solid, surrounded by a
metallic shield that serves as a ground
1. Twisted Pair
2. Coaxial Cable
3. RJ 45
4. Fiber Optic Cable
Q474) Which statement is correct regarding cookies?
1. Cookies never contain information about you and your preferences.
2. Cookies can be used to view private information about you or your computer
system.
3. It is possible in some browsers to specify that you be alerted when a server
attempts to give your browser a cookie.

4. When a Web site creates a cookie about you it will be able to access your e-mail
address, even if you didn't provide it.
Q475) Melanie is creating a new HTML document for her Web Site. What should
Melanie do to make sure Web bbrowsers will correctly interpret her new document?
1. Use browser specific HTML tags
2. Use the latest version of HTML
3. Use an HTML GUI editor like Dreamweaver
4. Test the document in various Web browsers.
Q476) Mary is e-mailing all employees the new mailing address to the new corporate
office. Mary is including pictures in her e-mail of the office for those employees who
work remotely. What is the inclusion of this file in an e-mail known as?
1. Attachment
2. JPEG
3. BMP
4. TIFF
5. GIF
Q477) John has been given the responsibility of making certain that his company is
secure in its use of the Internet. One of the areas of concern is keeping the network from
being attacked through its Internet connections. What should John use for the purpose of
isolating information from intruders?
1. Firewalls
2. Passwords
3. Certificates
4. Authentication
Q478) Which is considered a public switched network WAN connection?
1. ISDN
2. X.25
3. T1/E1
4. T3/E3
Q479) What do HTML elements that are categorized as block-level elements affect?
1. word
2. line
3. character
4. paragraph
Q480) Which strategy should a Web designer use to have a Web site placed high on a
search engine's results list?
1. Employ frames in the web site
2. Use more graphics than text
3. Focus on keywords one to two words in length
4. Use keywords in strategic places like the page title

Q481) Web browsers are used to access documents on a World Wide Web server. Which
protocol is used between the client and the web server for this purpose?
1. UDP
2. DNS
3. NNTP
4. FTP
5. HTTP
Q482) Mandy has placed the following HTML code in her Web document: <BODY
VLINK="#000000">. What is she trying to achieve with this code?
1. Set the visited hyperlink color to black.
2. Set the unvisited hyperlink color to black.
3. Set the color of the hyperlink upon clicking to black.
4. Set the color of the hyperlink upon mouse over to black
Q483) Pierre wants to add a cell to the top row of his table that spans three rows. He also
wants the text in this cell to be aligned at the center of the cell. Which tag will he add to
his table?
1. <TR ROWSPAN="3" VALIN="center">text</TR>
2. <TD ROWSPAN="3" VALIN="center">text</TD>
3. <TR COLSPAN="3" VALIN="center">text</TR>
4. <TD COLSPAN="3" VALIN="center">text</TD>
Q484) Which statement about HTML tags is true?
1. Tags must be written using uppercase letters
2. Tag attributes are included in the closing tag
3. Tags are surrounded by left and right angle brackets.
4. Tags unsupported by a browser will cause an error message
Q485) George is modifying a Web document that is defined in its Document Type
Declaration as HTML 4.0 Transitional. What will this Web document most likely
exclude?
1. Empty tags
2. Formatting tags
3. Depreciated tags
4. Cascading Style Sheets
Q486) Sophie thinks two computers may have assigned the same IP address. Sophie
would like to see the IP addresses that are assigned to each computer in order to
determine which two computers have been assigned the same IP address. Which is a
protocol used for this purpose?
1. ARP
2. MAC
3. DCHP
4. Gateway

Q487) Nick is a Web developer at RUWithMe.Co.Uk. He has been charged with placing
a META tag on the RUWithMe home page to list keywords for search engine indexing.
Which two attributes will Nick use to list keywords in the META tag?
1. NAME and CONTENT
2. KEYWORDS and HREF
3. TYPE and DATA
4. ACTION and TEXT
Q488) Which is a method of encryption that makes use of one key for encryption and
decryption of mail messages?
1. Private-Key
2. Public-Key
3. Encryption Algorithm
4. Hashing Algorithm
Q489)Which three tags will display text in a fixed-width font?
1. <SAMP><CODE><KBD>
2. <LABEL><DIV><CITE>
3. <CAPTION><TITLE><MAP>
4. <SELECT><META><TEXTAREA>
Q490)You are responsible for assigning IP addresses to 100 machines. Which would be
the most efficient method of assigning the IP addresses and the most efficient way to
maintain them in the future?
1. HOSTS file
2. Proxy configuration
3. Static assignment of IP addresses
4. Dynamic Host Configuration Protocol
Q491)Which is a query language used to extract information from relational databases?
1. API
2. DLL
3. SQL
4. CGI
Q492)Which technology allows Web designers to create Web pages that are responsive to
users, which is based on HTML 4.0, the DOM (Document Object Model), scripting
languages, and Cascading Style Sheets?
1. XML
2. DHTML
3. XHTML
4. Javascript
5. SGML
Q493) Vinod has just installed TCP/IP and he isn't certain that it has initialized. Which
utility will provide this information?

1.
2.
3.
4.

Ping
Route
Netstat
Ipconfig

Q494)Which domain does "www" represent in the URL http://www.myciw.ws?


1. top-level domain
2. host server's name
3. second-level domain
4. country-level domain
Q495)Which best describes the purpose of a URL?
1. Defines the path to a resource on the Internet
2. Supplies the parameters for downloading a file to a client
3. Provides critical informatio to the Web server about the client
4. Specifies the dial-up connection of the server you are trying to access
Q496)Which tag do you use to define the start of the table?
1. <TD>
2. <TR>
3. <TABLE>
4. <TBODY>
Q497)Which is a static text file used to specify IP addresses and their associated fully
qualified domain names?
1. DNS
2. WINS
3. HOSTS
4. Domain
Q498) Sophies networks are connected to the Internet, and she is concerned about
security. Sophie wants to create a firewall between the client workstations and the
connection to the Internet. Which is a type os server that Sophie can use use for this
purpose?
1. SMTP
2. NNTP
3. Proxy
4. Directory
Q499)Which layer of the OSI/RM is responsible for establishing, managing, and
terminating connections between applications
1. Session
2. Transport
3. Data Link
4. Physical

Q500) The Internet was formed in 1968 by the united States Department of Defense.
Which was the network formed by the United States Department of Defense that became
the basis for the Internet?
1. Advanced Research Projects Agency Network (ARPANET)
2. IS (Internet Society)
3. InterNIC (Internet Network information Center)
4. Internet Engineering Task Force (IETF)
Q501) What must a client computer's operating system support in order to connect to the
Internet?
1. TCP/IP
2. Router
3. Host Files
4. UDP Protocol
Q502) What symbol is used to relate a persons name to a domain name when sending email?
1. %
2. &
3. @
4. #
5. !
6. "
Q503) Which network protocol is a non-routable protocol that allows different
applications on different computers using NetBIOS to communicate with one another?
1. TCP/IP
2. NetBEUI
3. DDP
4. UDP
5. IP
Q504) Which is a file type that allows for email messages that contain sound file
attachments to be transmitted and recieved?
1. BMP
2. GIF
3. RA
4. WAV
5. MIME
6. S/MIME
7. JPEG
8. MP3
Q505) When bandwidth is an issue, upgrading to compensate is cost prohibitive, you
could segment your network. Place the users who generate the most traffic on the

network into a seperate segment, and place the users who generate the least traffic on the
network in another segment. Which is used for this purpose?
1. Hub
2. Bridge
3. Adapter
4. Gateway
Q506) Consider the following HTMl code; <HR SIZE="7" WIDTH="75" NOSHADE>.
What will this code render in a browser?
1. A center-aligned, heavy weight, solid, horizontal line that is 75 pixels long.
2. A left-aligned, heavy weight, solid, horizontal line that is 75 pixels long.
3. A left-aligned, thin, shaded, horizontal line that is 75% of the browser window in
length.
4. A center-aligned, thin, shaded, horizontal line that is 75% of the browser window
in length.
Q507) Dave has 10 computers connected to one main computer. The main computer
stores much of the software and files that employees in Daves company need to access.
What is the main computer known as?
1. Client
2. Terminal
3. Server
4. Database
Q508) Which statement is true regarding HTML headings?
1. Headings are a type of empty tag.
2. <H1> is the smallest heading style.
3. HTML 4.0 offers seven heading levels.
4. Headings include a preceding and following paragraph break.
Q509) Sophie has become aware of a new virus that is disabling e-mail systems, but she
is sure that it has not infected her computer. What should ophie do as a first step to
combating this virus outbreak?
1. Run her antivirus emergency boot disk
2. Run an on-access scan of all computer files
3. Run a full on-demand scan of the entire computer system
4. Get the latest update of the definition files for the virus program
Q510) Jeremy does a tremendous amount of research on the Web. During this research
Web pages are downloaded and stored on Jeremys computer. To keep from running out of
hard disk space, which could be caused from the many downloaded pages, what should
Jeremy do?
1. Clear the browser history
2. Place a size limit on the browser cache
3. Disable cookies
4. Disable active content

Q511) Which is NOT an OSI/RM application-layer protocol?


1. SMTP
2. TCP/IP
3. FTP
4. HTTP
Q512) Sonias e-mail system has been flooded with e-mails containing attachments with
excessively large file names. This resulted in locking up her e-mail system. Which type of
attack is her e-mail system under?
1. Syn flood
2. Ping flood
3. Spam attack
4. Denial-of-Service attack
Q513) Which is a type of modem that provides for bandwiths in excess of 128Kbps, uses
common telephone wiring, and digital signaling?
1. DSL
2. Cable
3. Gateway
4. Analog modem
Q514) What is the maximum theoretical connection speed of a T1 line?
1. 3.152 Mbps
2. 1.544 Mbps
3. 6.312 Mbps
4. 44.736 Mbps
Q515) Users at RUWithMe.Co.Uk are complaining that they aren't always seeing the
most recent information on the Product site page. What could be causing this problem?
1. The disk cache folder needs to be updated.
2. Client-side cache settings should be changed.
3. The size of the users memory cache needs to be increased.
4. Increase the size of the disk cache for the users on their computers
Q516) Which is a term used to refer to a computer that serves as a firewall?
1. Subnet
2. Bastion
3. Switch
4. Hub
Q517) Faraz wants to protect his company's network. He would like to arrange it so that
data packets coming across the Internet to the various computers on the network are
examined before bein accepted. Which is used for this purpose?
1. ISP
2. Gateway
3. Firewall

4. Directory server
Q518) Ibrar is looking at the following HTML code; <FORM><INPUT
TYPE="text"><INPUT TYPE="radio" VALUE="no">No</FORM>. What does this
code represent?
1. Three form fields - a text box, a radio button, and a checkbox
2. Three form fields - two text boxes and a radio button
3. Two form fields - a text box and a radio button
4. Two form fields - a text box and a checkbox
Q519) Sophie does not want to have cookies enabled in her Internet browser. Where
should she go to disable cookies in Internet Explorer?
1. Tools Menu
2. Accessories
3. Programs from the Start Menu
4. Control panel in Windows 95 or 98
Q520) What are the two types of HTML tags?
1. Container/empty
2. Opening/closing
3. Begining/ending
4. Elements/attributes
Q521) What is the term used in project management to refer to gradual change in a
project such as schedule changes and/or cost that can be detrimental to a project if
overlooked?
1. Scope Creep
2. Performance risks
3. Scope matrix
4. Pilot/parrellel
Q522) CIWcertified.com has an Internet Address associated with the site name. However,
it is much easier to remember a name than a number. Which is used to resolve a name to
an IP address?
1. DHCP
2. IMAP
3. Telnet
4. DNS
Q523) James has computers that are connected to the server via modems. James would
like these computers to become an actual node on the Internet. In doing so James wants
to have error checking and encryption capabilities as well. Which is a communications
protocol that will accomplish this for James?
1. RSA
2. SSL
3. PPP

4. SLIP
Q524) Which statement is false about emptying a Web browsers cache?
1. Hard drive space will be freed.
2. Old Web pages will be deleted from the client-side.
3. The modem will gain additional bandwidth.
4. The browser must download pages that were viewed earlier.
Q525) What will be needed in the configuration process of TCP/IP in order for computers
on a Local Area Network to be able to communicate?
1. IP address
2. Dial-up connection
3. Subnet mask address
4. IP address and Subnet mask
Q526) Which is the international domain name used to refer to Switzerland?
1. .ca
2. .ch
3. .cm
4. .cv
Q527) Which octet(s) is used for the host ID in a Class A address?
1. First
2. Third
3. Second
4. Last three octets
Q528) Which tag is an example of a text-level element?
1. <B>
2. <PRE>
3. <H1>
4. <BR>
Q529) Brunos company Web site makes use of asymmetric cryptology to protect their
customers who use their credit cards online. Which statement best describes how
asymmetric cryptology protects credit card information traveling to Brunos web site?
1. Credit card data is being encrypted using a public key and when sent to Brunos
company, a private key will be used to decrypt the credit card data.
2. Credit card data on Brunos site will be encrypted using a public key and will be
decypted when recieved with the same public key held by Brunos company.
3. Credit card data is being encrypted using a digital certificate of authority and
will be decrypted when recieved with Brunos company digital certificate.
4. Credit card data submitted is protected through the use of a private key, used to
decrypt what is being submitted and the same key will be used to decrypt the
information when recieved by Brunos company for processing.

Q530) Ibrar is creating a Web document. He has typed a line of text that he now wants to
end. In addition, he wants two lines of blank space between this line and the new one he
is about to type. What HTML code will create the desired effect?
1. <P><P>
2. <P><BR>
3. <BR><BR>
4. Press 'Enter' three times
Q531)Where do you go to configure the sending and recieving of mail within Netscape
Messenger?
1. Control Panel
2. Edit menu within Netscape Messenger
3. File menu within Netscape Messenger
4. Message menu within Netscape Messenger
Q532)Which markup language allows designers to create custom markups?
1. HTML
2. XML
3. SGML
4. DHTML
Q533)Which is used to translate between different protocols?
1. ISP
2. ARP
3. Bridge
4. Gateway
Q534) Bandwidth is an important part of the functionality of an Internet site. Which best
describes bandwidth?
1. Bandwidth is the number of hits a Web site recieves
2. Bandwidth is the amount of times it takes the Web server to send a signal
3. Bandwidth is the amount of time the computer waits for a response from another
computer
4. Bandwidth is the maximum amount of data that can be transmitted over a certain
amount of time
Q535) Nick often send confidential information over the Internet. Nick is aware that this
information could be intercepted as it travels over the Internet so he wants to employ a
method that would keep all but the intended recipient from viewing the contents of the email. What should he use to secure the contents of his e-mails?
1. Encryption
2. Certificate
3. Authentication
4. Digital Signatures

Q536) HTML files can be managed among many different platforms including Windows,
Macintosh, and UNIX. To avoid problems with HTML files rendering in browsers, what
should Web designers know when naming HTML files?
1. Spaces are acceptable
2. Filenames are not case sensitive
3. Extensions should be either .htm or .html
4. Characters like pound signs are acceptable
Q537) Marvin has discovered that the computer host he has been sending credit card
information to is not a trusted host. Which type of attack is Marvin experiencing?
1. Syn
2. Spam
3. Spoofing
4. Ping flood
Q538) Which is a point-to-point connection used for LANs and WANs that uses cellswitching technology?
1. ISDN
2. DDS
3. ATM
4. SONET
Q539) Sophie uses Windows NT 4.0 and she will be using multiple protocols. Sophie
must bind any protocols she plans to use to her NIC. Which option from the Control
Panel should Sophie start with to begin the needed steps to complete this?
1. Network
2. Add/Remove Programs
3. System
4. Regional Settings
Q540) Kims company has a server in place used to store unique electronic credentials of
their Internet customers. When customers submit their credit card information this server
will look at the stored electronic credential and verify the identity of the one submitting
the credit card information. Which type of server is Kim using for this purpose?
1. FTP
2. Cache
3. E-commerce
4. Certificate
Q541) Dave uses Windows 98 on his computer and he has been unable to establish a
connection to the Internet. He feels like the problem may be a TCP/IP problem. Which
can Dave use to see if there is a TCP/IP configuration problem?
1. Ipconfig
2. ARP
3. Tracert
4. Winipcfg

Q542) Which is a TCP/IP protocol that would allow Jeff, who is sitting at his computer in
Brixton, to logon to the RUWithMe.Co.Uk server in London, given that he has the
appropriate permissions to do so?
1. LPR
2. NNTP
3. LDAP
4. Telnet
Q543) Which is a system used on the Internet to ensure the security of credit card
transactions?
1. SSL
2. PGP
3. SET
4. S/MIME
Q544) Which language can be used for programming Internet applications and is
platform-independent?
1. C
2. C++
3. Java
4. COBOL
Q545) Which is a true statement relative to networking protocols?
1. Never combine multiple protocols such as TCP/IP and IPX/SPX
2. Routable and non-routable protocols can be combined in a routed network for
network efficiency
3. Using multiple protocols can decrease the time it takes to maintain and
troubleshoot a network
4. Do not combine NetBEUI and TCP/IP an the same network
Q546) Which network component will provide a central connection point for all your
network devices and provide more bandwidth for those devices?
1. Switch
2. Router
3. Bridge
4. Gateway
Q547) Sophie has gone to the Lotus Web site by keying in www.lotus.com/newsviews.
The URL that appears afterwards is www.lotus.com/home.nsf/welcome/newsviews.
Which portion of this address represents the fully qualified domain name?
1. www.lotus.com
2. www.lotus.com/home.nsf/
3. www.lotus.com/home.nsf/welcome
4. www.lotus.com/home.nsf/welcome/newsviews
Q548) Which is an agency that assigns and regulates IP addesses on the Intenet?

1.
2.
3.
4.

IS (Internet Society)
Internet Engineering Task Force (IETF)
World Wide Web Consortium (W3C)
InterNIC (Intenet Network Information Center)

Q549) Faraz always wants his name, title, company, and phone number to be
automatically placed at the close of all his e-mails. What does Faraz need to create?
1. HTML File
2. Java applet
3. CGI script
4. Signature file
Q550) Ibrar is conneced to his ISP via a 56 Kbps dial-up connection. He is requesting
pages that have been frequently requested by others using the same ISP. These pages are
being delivered from the ISPs cache, which is invisible to Ibrar. What kind of cache is the
ISP most likely using?
1. Web cache
2. File cache
3. Proxy cache
4. Server cache
Q551) The term World Wide Web relates to?
1.
2.
3.
4.

The computers connected to the Internet


A web site having a few web pages
All the sites and pages on the web
An organisation

Q552) To accomplish an Internet task as a client, such as sending an e-mail message you
need not have one of the following?
1. A computer connected to the Internet using TCP/IP
2. A client program
3. A web server
4. An IP address or the domain name of a server you are authorised to use
Q553) Which of the following is the correct in descending order of speed?
1. T1
2. T3
3. 56K Modem
4. T2
Q554) Simple Mail Transfer Protocol is used to?
1. send and receive e-mails
2. upload and download files from a web server
3. receive mails
4. send mails

Q555) Which protocol is used in the application, which allows a user to connect with a
remote system and access the applications and files on the system?
1. FTP
2. HTTP
3. TELNET
4. NNTP
Q556) Which part of the URL HTTP://WWW.EXECUTRAIN.COM tells about the type
of organisation having
this URL?
1. http://
2. executrain
3. ae
4. none of the above
Q557) Which of the following denotes a non-profit organisation?
1. .com
2. .org
3. .ca
4. .edu
Q558) The organisation which manages the domain names is:
1. CERN
2. Network Solutions Incorporation
3. World Wide Web Consortium
4. IITF
Q559) Which of the following URLs is incorrect?
1. HTTP://ABCD.COM
2. HTTP://WWW.ABCD.COM/ABCD
3. MAILTO://WWW.ABCD.COM
4. NEWS:ABCD.ABCD.COM
Q560) Which of the following is not a valid e-mail address?
1. ABCD@ABCD.COM.OM
2. ABCD.ABCD.COM
3. ABCD@ABCD.COM
4. ABCD.ABCD@ABCD.CO.AE
Q561) If you want to get a neutral view about a particular product through the web, you
will visit:
1. The web site of the product or its related firm
2. The newsgroup which holds articles about the product
3. The products competitors web site
Q562) Which of the statements about FTP is false?Using FTP, user can:

1.
2.
3.
4.

upload files of any type


upload and download files of any type
upload and download files of particular types only
download files of any type

Q563) Newsgroup articles are generally posted by:


1. Owner of the Newsgroup only
2. Manager of the Newsgroup only
3. Any subscriber of the Newsgroup
4. Webmaster of the site only
Q564) Which is the most important term related to getting listed under search engines?
1. Title
2. URL
3. Keywords
4. Hyperlink
Q565) Which of the following search string will consider the words search and string as a
single phrase?
1. search string
2. search AND string
3. search + string
4. search string
Q566) Which of the following work under the Push Technology?
1. search engines
2. web sites
3. mailing lists
4. newsgroups
Q567) Veronica is used to search the:
1. HTTP sites
2. GOPHER sites
3. FTP sites
4. TELNET sites
Q568) Archie is used to search the:
1. HTTP sites
2. GOPHER sites
3. FTP sites
4. TELNET sites
Q569) Which are the programs that are designed specifically to render hypermedia
documents from the Internet?
1. Web browsers
2. Plug-ins

3. Web servers
4. Search engines
Q570) HTML is controlled by:
1. IICI
2. W3C
3. IITF
4. MIT
Q571) Which one of the following is a reason for avoiding HTML editors
1. They do not keep in pace with the evolution of HTML
2. Easy to use
3. Features are less
4. They dont allow the user to edit HTML code
Q572) Which of the following is a container tag
1. <TITLE>
2. <BR>
3. <LI>
4. <B>
Q573) HTML elements that can affect something as small as a character or a word are
referred to as:
1. block-level elements
2. container tags
3. text-level elements
4. document structure tags
Q574) Which of the following statement is false?
1. H1 is bigger than H3
2. H2 is bigger than H6
3. H5 is smaller than H6
4. H5 is smaller than H4
Q575) The tag that is used to display plain text files in their original format is:
1. <FORMAT>
2. <FONT>
3. <PRE>
4. <TEXT>
Q576) Which of the following rule applies to HTML files?
1. All the tags should be in uppercase only
2. The tags should be written in a structured way
3. The files should be plain text files saved as .HTM or .HTML
4. .The empty tags should have a closing tag also

Q577) The tag used to indent a paragraph of text is:


1. <CENTER>
2. <BLOCKQUOTE>
3. <ALIGN>
4. <INDENT>
Q578) Which of the following is not a text-level element?
1. <B>
2. <BR>
3. <U>
4. all the above
Q579) The ALT attribute of the <IMG> tag is used for the following reasons but not :
1. To give a meaningful alternate representation to the image when the mouse is
taken over the image.
2. To give an alternate representation to the image while the image is getting
downloaded
3. To give an alternate representation to the entire web page if the file is not found
4. To give an alternate representation to the image if the Browsers are set not to
show pictures
Q580) which of the following is not a fully qualified URL?
1. http://www.abcd.com
2. http://www.abcd.com/dir/subdir/file.htm
3. /dir/subdir/file.htm
4. ftp://ftp.abcd.com
Q581) Which part of the URL http://www.abcd.com is termed as the top-level domain
name?
1. http://
2. www
3. abcd
4. com
Q582) Which of the following is not a valid URL?
1. http://abcd.com
2. ftp://ftp.abcd.com
3. mailto://anybody@abcd.com
4. gopher://gopher.abcd.com
Q583) In an HTML table:
1. <CAPTION> and <TH> are compulsory
2. <CAPTION> and <TH> are optional
3. <CAPTION> is optional and <TH> is compulsory
4. <TH> is optional and <CAPTION> is compulsory

Q584) What is the attribute of the <TABLE> tag is used to color a table border?
1. <TABLE BGCOLOR=COLOR NAME>
2. <TABLE BORDER.COLOR(COLOR NAME)>
3. <TABLE BORDERCOLOR=COLOR NAME>
4. <TABLE BORDER=COLOR NAME>
Q585) The VALIGN attribute is not used with one of the following:
1. <TR>
2. <TABLE>
3. <TH>
4. <TD>
Q586) <ALIGN=TOP> can be used with one of the following table element:
1. <TABLE>
2. <CAPTION>
3. <TR>
4. <TD>
Q587) <ROWSPAN> and <COLSPAN> are used to:
1. merge cells
2. widen the table
3. increase spacing between text
4. add more rows or columns
Q588) The basic purpose of a CGI script is:
1. to enable links on a web page
2. to process form data
3. to send mails
4. to create animations
Q589) Joe is creating a web site for his organisation. He wants to place a form on his site
to collect data from the visitor as input to his server side gateway program. What method
should he use?
1. INPUT
2. GET
3. SEND
4. POST
Q590) RESETting a form will:
1. clear all the contents input by the user
2. send all the contents input by the user to the server
3. set all the components to their default values
4. all the above
Q591) Which of the following components is not an <INPUT> element?
1. Textbox

2. Submit Button
3. Text area
4. Checkbox
Q592) Which of the following statements about RadioButtons is false?
1. RadioButtons should always be individual elements
2. RadioButtons should always be group elements
3. RadioButtons group should always share the same name
4. One of the RadioButtons can be selected by default
Q593) Jane wants to give an option on her form for the visitors to select the month, year
and date of birth. Which form component should she use?
1. Textbox
2. Multiple option select list
3. Single option select list
4. Textarea
Q594) Which of the following is not a valid Image Map shape?
1. Polygon
2. Square
3. Rectangle
4. Circle
Q595) Which network model has a dumb terminal at the client side?
1. Client-Server
2. LAN
3. Mainframe
4. None of the above
Q596) The web-based networking is a:
1. Single-Tier model
2. Two-Tier model
3. Three-Tier model
4. N-Tier model
Q597) An organisation having nine employees in a small building wants to connect the
computers of all their employees and make a network without much expenditure. They
want the data to be shared between all the computers without any restrictions. What type
of network would you prefer if were the network designer?
1. Server-based
2. Peer-to-peer
3. Mainframe
4. Web-based
Q598) For the network mentioned in Q. 57, which will be the suitable network topology?
1. Star

2. Star-Bus
3. Bus
4. Star-Ring
Q599) Which of the following statement is false about the Star Topology?
1. Network nodes are connected through a central device
2. Network expansion is simple
3. If one computer fails, the entire network fails
4. Network management can be centralized
Q600) Which of the following statement is false about the Ring Topology?
1. All computers have equal access to the data
2. Performs well even with heavy traffic
3. Network expansion will not affect the operation
4. They do not have a central connection point
601) Connection-oriented protocols reside in the:
1.
2.
3.
4.

Transport Layer
Network Layer
Data Link Layer
Physical Layer

602) A typical packet will not contain one of the following:


1.
2.
3.
4.

Header
Data
Frame
Trailer

603) CRC is added to the:


1.
2.
3.
4.

Header
Trailer
Data
None of the above

604) All the protocols related to networking belong to one of these group of layers:
1.
2.
3.
4.

Application, Session, Network


Application, Transport, Network
Application, Network, Physical
Transport, Network, Physical

605) Which of the following is not an Application Layer Protocol?

1.
2.
3.
4.

SMTP
BOOTP
SPX
HTTP

606) A Network Access Point is:


1.
2.
3.
4.

A client in a LAN
A server in a LAN
A junction between one high-speed network and another
A junction between two clients on Internet

607) Which of the following network device cant be placed inside a computer?
1.
2.
3.
4.

Modem
NIC card
Hub
None of the above

608) The device used to divide a network into two segments is:
1.
2.
3.
4.

Repeater
Router
Bridge
Hub

609) A Gateway can operate at:


1.
2.
3.
4.

Network Layer only


Transport Layer only
Any Layer
Network and Transport Layer only

610) Which of the following LAN standard doesnt use CSMA/CD or CSMA/CA?
1.
2.
3.
4.

Ethernet
Fast Ethernet
100VG-AnyLAN
LocalTalk

611) Which of the following statements is false?


1.
2.
3.
4.

In Asynchronous Transmission, data is transmitted as individual characters


In Synchronous Transmission, data is transmitted as individual characters
In Asynchronous Transmission, data is not transmitted as character streams
In Synchronous Transmission, data is transmitted as character streams

612) Which of the following is false?


1. Baseband uses the cables full spectrum.
2. Broadband uses the cables full spectrum.
3. Broadband modulates signals from various channels onto separate carrier
frequencies.
4. None of the above
613) Which of the following WAN methods uses permanent Virtual Circuits?
1.
2.
3.
4.

X.25
Fast Packet Switching
Fibre Distributed Data Interface
All the above

614) The Address Resolution Protocol is an example of:


1.
2.
3.
4.

Direct Routing Protocol & Indirect Routing Protocol


Direct Routing Protocol only
Indirect Routing Protocol only
None of the above

615) Which is the state of the protocols that may be considered for future
standardisation?
1.
2.
3.
4.

Experimental
Standards
Proposed
Historic

616) How many bits are occupied by an IP address?


1.
2.
3.
4.

16
32
48
64

617) Which of the following is not a valid IP address to be assigned to computer on any
network?
1.
2.
3.
4.

192.23.111.8
192.23.111.256
0.0.0.0
127.0.0.3

618) Which of the following is false?

A user can access an FTP site.


1.
2.
3.
4.

If he is an administrator of the server


If he is the web developer of the site
If anonymous access is allowed
If anonymous access is not allowed

619) Which of the following is not a typical function of a proxy server?


1.
2.
3.
4.

Corporate firewall access


Caching of web documents
Creating HTML pages
Filtering client transactions

620) Jean is the web developer for his organisation. He wants to put the contact details
about all the employees in the company on his Intranet site. What server would he prefer
to accomplish this task successfully?
1.
2.
3.
4.

HTTP Server
Certificate Server
Directory Server
Catalog Server

621) X is the web administrator of his company. His organisation plans to host an Intranet
site, which involves a lot of dynamic features. Xs team of developers are all experts in
Visual Basic and Vbscripts. What server solution should X opt for?
1.
2.
3.
4.

Apache
Microsoft Internet Information Server
Netscape Suite Spot
Lotus Domino Server

622) X is developing a web site for one of his clients who is a Multinational IT Company.
The web site has to perform on-line transactions with various IT companies like
Microsoft, Netscape, Sun etc., which run on different servers. Which programming
solution should X use to perform all the server side transactions?
1.
2.
3.
4.

Visual Basic
Active-X
JAVA
Javascript

623) Which of the following statements about Client-side scripting is false?


1. executed at server end
2. resides at server and gets downloaded to the browser

3. shares load
4. reduces server overhead
624) Which of the following do Netscape Browsers not directly support?
1.
2.
3.
4.

JAVA
Javascript
Active-X
Multimedia

625) Which of the following about Trojan Horse Attack is true?


1.
2.
3.
4.

The hacker assumes the identity of a legitimate user


Hacker establishes certain commands, which may lead to unauthorised access
The hacker captures packets sent from one node to another
Hiding an unauthorised command within a commonly used function to cause a
breach.

626) Which of the following is not a Security Organisation?


1.
2.
3.
4.

CERT
W3C
EuroCERT
FIRST

627) Risk Analysis:


1.
2.
3.
4.

determines probable attacks


prevent probable attacks
determines which network systems are exposed
logs various problems occurred in the network

628) In symmetric encryption:


1.
2.
3.
4.

one key is used for encryption and another for decryption


one key is used for both encryption and decryption
public key is used to encrypt and private key is used to decrypt
private key is used to encrypt and public key is used to decrypt

629) The algorithm used to perform one-way encryption is :


1.
2.
3.
4.

Symmetric algorithm
Asymmetric algorithm
Hash algorithm
Hot Potato Algorithm

630) The protocol used to perform encryption at the network level is:
1.
2.
3.
4.

Network Protocol
Encryption Protocol
Point-to-point Tunneling Protocol
VPN

631) A Firewall cannot do:


1.
2.
3.
4.

Filter Packets
Detect Intrusions
Take evasive actions
None of the above

632) Your company requires the best connection speed available in the local area to
support its intranet. Currently, a T1 service provider is available in the area. What is the
maximum speed that can be achieved using all the bandwidth of a T1 line?
1.
2.
3.
4.

1.544Mbps
500Kbps
56Kbps
1.544Gbps

633) Cellpadding in an HTML document can best be described as which of the


following? :
1.
2.
3.
4.

White space between cells of a table


White space between outside table borders and page borders
White space between text and cell borders in a table
White space between cell borders

634) Which of the following is the utility that allows the verifying of connectivity
between two host machines?
1.
2.
3.
4.

Telnet
Ping
Route
IPCONFIG

635) You are currently running a Java-based Web page. From this page you require the
ability to access a database and retrieve information. Which of the following application
programming interfaces is your best choice to accomplish the task required?
1. DSN
2. JDBC
3. JavaScript

4. ODBC
636) The company you are currently working with is entering the e-commerce
marketplace by creating and publishing a complete Web site with product and ordering
information. The site will include numerous forms and require high-end hardware and
applications to run. Currently, the preferred operating system for this server is Linux
because no costs for licensing are required. With this knowledge, which of the following
Web server applications would you suggest?
1.
2.
3.
4.

Apache
Microsoft IIS
Lotus Domino Server
Microsoft PWS

637) Your supervisor has asked you to research information about the InterNIC and its
subcommittees. Which of the following search criteria best suits your needs?
1.
2.
3.
4.

InterNIC OR subcommittees
InterNIC NOT subcommittees
InterNIC AND subcommittees
InterNIC NEAR subcommittees

638) Which of the following organizations oversees and sanctions the use of HTML
coding and tags?
1.
2.
3.
4.

IANA
NSFNET
W3C
InterNIC

639) Which layer of the OSI is responsible for the placing of signals onto the media?
1.
2.
3.
4.

Transport
Network
Data Link
Physical

640) What is the best description of a network using or running the X.25 protocol?
1.
2.
3.
4.

LAN
WAN
MAN
Peer-to-peer

641) Your in-house development team is planning to create a simple, generic Web page
using HTML code that will collect user information and send it into a database. Which of

the following should the development team employ to accomplish this collection of user
data?
1.
2.
3.
4.

C++
VRML
CGI
JavaScript

642) Review the following URL and from the list provided select the correct description
for the line:
http://www.coriolis.com/training.htm
1.
2.
3.
4.

Protocol, Web server, top-level server, file name, and extension


Protocol, service, Web server, top-level server, Web page name, file extension
Service, Internet name, company name, directory, file
Protocol, service, fully qualified domain name, file name, and extension

643) You are currently running a DHCP server to dynamically assign IP addresses to your
client machines. You understand that clients requiring an IP address will broadcast on the
network to reach a DHCP with available addresses. To which address are these broadcasts
addressed?
1.
2.
3.
4.

0.0.0.0
224.0.0.0
255.255.255.255
127.0.0.1

644) Jean is the web developer for his organisation. He wants to put the contact details
about all the employees in the company on his Intranet site. What server would he prefer
to accomplish this task successfully?
1.
2.
3.
4.

HTTP Server
Certificate Server
Directory Server
Catalog Server

645) Your company has a departmentalized business structure. As the structure requires
all staff within a department to be informed about departmental issues, a common shared
email mailbox has been created. The ability to share mailboxes is performed using which
of the following protocols?
1.
2.
3.
4.

SMTP
IMAP
X.400
POP

646) TCP/IP functions by using physical and logical addresses as well as hostnames.
Which of the following servers resolves hostnames to their logical IP addresses?
1.
2.
3.
4.

DNS
WINS
ARP
Host file

647) Your company has numerous traveling salespeople who require dial-in access form
their homes and hotel rooms. You require a method to create secure channels between the
salespeoples point and the network access point. What is the protocol used to create
VPNs? [Check all correct answers]
1.
2.
3.
4.

PPP
IPSec
L2TP
PPTP

648) Which of the following governing bodies is responsible for the assignment or
management of domain names?
1.
2.
3.
4.

IETF
InterNIC
ICANN
IAB

649) Your new Web site has taken several months to develop and now you are ready to
publish it to your Web server. If you want the largest possible number of search engines
to locate your new site, which of the following should you include in your Web pages?
1.
2.
3.
4.

ICRA ratings
Meta tags
Index server address
Links to search engines

650) Your current network is running a star topology and the 802.3 architecture. Speeds
that can be achieved are optimized at approximately 10Mbps. New management has
suggested that the users of the network would be better served by providing a faster
network. Given that your network cards can achieve speeds of up to 100Mbps which type
of cabling would you recommend?
1.
2.
3.
4.

Coaxial 10Base5
Category 3, UTP
Fiber optic
Category 5, UTP

HTML Fundamentals
TITLE; CIW(tm)
Foundations Certification
Bible
Hardcover - 768 pages
Bk&Cd-Rom edition
(March 15, 2002) Hungry
Minds, Inc;
ISBN: 0764549081;

TITLE; CIW:
Foundations Study Guide
Hardcover - 864 pages
Study Gd edition (April 5,
2002) Sybex;
ISBN: 0782140815;

TITLE; Sams Teach


Yourself Html 4 in 24
Hours
Paperback - 481 pages 4th
edition (September 1999)
MacMillan Computer Pub;
ISBN: 0672317249;

TITLE; Creating Cool


Html 4 Web Pages
Paperback - 440 pages 2nd
Bk&cdr edition (June
2000) I D G Books
Worldwide;
ISBN: 076453484X;

TITLE; HTML: The


Complete Reference
(Osborne Complete
Reference Series)
Paperback - 1208 pages
3rd edition (December
14, 2000) McGraw-Hill
Professional Publishing;
ISBN: 0072129514;

TITLE; Dummies 101:


HTML 4
Paperback - 288 pages 2nd
Bk&cdr edition (February
12, 1998) Hungry Minds,
Inc;
ISBN: 0764502050;

TITLE; HTML For


Dummies
Paperback - 400 pages 3rd
Edition edition (June 23,
1997) IDG Books
Worldwide Inc;
ISBN: 076450214X;

TITLE; HTML 4 for


Dummies (with CD-ROM)
Paperback - 405 pages 3nd
edition (May 15, 2000)
Hungry Minds, Inc;
ISBN: 0764507230;

TITLE; Sams Teach


Yourself Web Publishing
with HTML 4 in 21 Days,
Hardcover - 1191 pages
2nd Bk&cdr edition
(February 2000) Sams;
ISBN: 0672318385;

TITLE; HTML 4 for the


World Wide Web Visual
Quickstart Guide
Paperback - 384 pages 4th
edition (January 15, 2000)
Peachpit Press;
ISBN: 0201354934;

TITLE; Html Black Book


Paperback - 1195 pages
Bk&Cd-Rom edition (June
1, 2000) The Coriolis
Group;
ISBN: 1576106179;
TITLE; CIW Foundations
Exam Cram: Exam: 1D0-410
Paperback - 456 pages 1st
edition (August 21, 2001)
The Coriolis Group;
ISBN: 1588801659;

TITLE; Html Pocket


Reference (Nutshell
Handbook)
Paperback - 92 pages 2nd
edition (December 1999)
O'Reilly & Associates;
ISBN: 1565925793;
TITLE; Special Edition
Using HTML 4, Sixth
Edition
Paperback - 1109 pages
6th Bk&cdr edition
(December 22, 1999) Que;
ISBN: 0789722674;

TITLE; Html 4 Bible


Paperback - 903 pages
Bk&Cd Rom edition
(August 1998) IDG Books
Worldwide Inc;
ISBN: 0764532200;

Basic-Advanced Networking Fundamentals


TITLE; CIW(tm)
Foundations Certification
Bible
Hardcover - 768 pages
Bk&Cd-Rom edition
(March 15, 2002) Hungry
Minds, Inc;
ISBN: 0764549081;
TITLE; How Networks
Work, Millennium Edition
Paperback - 232 pages
millennium edition
(January 15, 2000) Que;
ISBN: 0789724456;

TITLE; CIW:
Foundations Study Guide
Hardcover - 864 pages
Study Gd edition (April 5,
2002) Sybex;
ISBN: 0782140815;

TITLE; Build Your Own


Home Network
Paperback - 120 pages
(July 27, 2000) Computing
McGraw-Hill;
ISBN: 0072124660;

TITLE; Networking by
Example (By Example)
Paperback - 448 pages 1
edition (May 8, 2000)
Que;
ISBN: 0789723565;

TITLE; Practical
Firewalls (Practical)
Paperback - 504 pages 1
edition (June 12, 2000)
Que;
ISBN: 0789724162;

TITLE; Mastering Home


Networking
Paperback - 513 pages 1st
edition (April 15, 2000)
Sybex;
ISBN: 0782126308;

TITLE; Firewalls 24seven


Paperback - 576 pages 4
edition (October 1999)
Sybex, Inc.;
ISBN: 0782125298;

TITLE; Designing
Network Security
Hardcover - 426 pages 1st
edition (June 15, 1999)
Cisco Pr;
ISBN: 1578700434;

TITLE; Home Networking


Bible
Paperback - 696 pages (30
April, 2000) Hungry
Minds Inc;
ISBN: 0764533991;

TITLE; Hacking
Exposed: Network
Security Secrets and
Solutions
Paperback - 703 pages
2nd edition (January 15,
2000) McGraw-Hill
Professional Publishing;
ISBN: 0072127481;
TITLE; Hack Proofing
Your Network: Internet
Tradecraft
Paperback - 450 pages 1st
edition (January 15, 2000)
Syngress Media Inc;
ISBN: 1928994156;

TITLE; Routing in the


Internet
Textbook Binding - 319
pages 1 edition (March 15,
1995) Prentice Hall;
ISBN: 0131321927;

TITLE; CIW Foundations


Exam Cram: Exam: 1D0-410
Paperback - 456 pages 1st
edition (August 21, 2001) The
Coriolis Group;
ISBN: 1588801659;

TITLE; The Essential


Guide to Home Networking
Technologies
Paperback - 339 pages 1
edition (January 15, 2000)
Prentice Hall PTR;
ISBN: 0130198463;
TITLE; Networking : A
Beginner's Guide
(Network Professional's
Library)
Paperback - 432 pages 2nd
edition (August 2001)
Osborne McGraw-Hill;
ISBN: 0072132310;
TITLE; Hacker Attack
Mass Market Paperback 320 pages Bk&Cd-Rom
edition (September 22,
2000) Sybex;
ISBN: 0782128300;

TITLE; Internet
Architectures
Hardcover - 544 pages 1
edition (January 27, 1999)
John Wiley & Sons;
ISBN: 0471190810;
TITLE; Home
Networking Visual
Jumpstart
Paperback - 252 pages 1st
edition (January 15, 2000)
Sybex;
ISBN: 0782127959;

You might also like