Exam Code: 1D0-510
Exam Name: CIW Web Foundations Associate
What is spyware?
A. Software that opens an undocumented port on your server and allows attackers to control your system
B. Software that determines and reports improper software licensing
C. Software that gathers information and relays it to outside parties
D. Software that reports security holes to hackers
Each system in a TCP/IP network must be configured with an IP address and a subnet mask. The subnet mask identifies what parts of an IP address?
A. Loopback and broadcast
B. Network portion and host portion
C. The number of bytes per field
D. Source and destination
In XHTML, what is one of the functions of the <input> tag?
A. To create a check box in a form
B. To create a scrolling select list in a form
C. To create a record in a database
D. To create a data cell in a table
Three factors affect every project, and when one factor is adjusted, it affects the others. This relationship is known as the Project Triangle. What are the three factors in the Project Triangle?
A. Gantt charts, tracking and documentation
B. Testing, evaluating and controlling
C. ROI, quality and stakeholders
D. Time, money and scope
Which of the following Web site maintenance functions helps ensure that users continue to visit your site?
A. Clearing the cache
B. Fixing dead links
C. Changing page locations
D. Moving links
Which type of encryption uses a pair of keys, in which one key is used to encrypt information and the other key is used to decrypt that information?
A. Hash encryption
B. One-way encryption
C. Symmetric encryption
D. Asymmetric encryption
Lo-An created her Web site using XHTML frames. She adds an inline frame into one of her existing frames. Which of the following will result?
A. A floating frame that allows a separate document to be inserted in the page
B. A page that will fail validation because it is not user-friendly
C. A new borderless frame that appears in a separate pop-up browser window
D. A page that will validate to XHTML 1.0 Strict standards
In general, which choice lists the protocols that must be configured in order to send and receive e- mail?
A. SMTP and POP3
B. HTTP and SMTP
C. NNTP and IMAP
D. POP3 and IMAP
Which of the following accurately describes a difference between a Java servlet and a PHP script?
A. Servlets can be used only to communicate with databases, whereas PHP scripts can be used to provide additional features.
B. Servlets must be interpreted, whereas PHP scripts are only compiled.
C. PHP scripts can be used only to communicate with databases, whereas servlets can be used to provide additional features.
D. Servlets must be compiled, whereas PHP scripts are only interpreted.
Which layer of the Open Systems Interconnection reference model (OSI/RM) organizes transmitted information into datagrams or packets?
A. Session layer
B. Network layer
C. Data link layer
D. Application layer
What is an intranet?
A. A searchable internal repository that stores an organization’s proprietary documents
B. A TCP/IP-based network accessible only by an organization’s members and employees
C. A TCP/IP-based network accessible only by an organization’s internal employees and select external clients
D. A worldwide network available to anyone who has a TCP/IP connection on a computer
The ICANN assigns your company the network address 188.8.131.52. What is the default subnet mask for this network?
You have two computers, each with a different operating system. One is a Linux system, which uses the Gnu Public License (GPL). You can use this Linux software free of charge, and you can make changes to code that created the operating system. The other system is a Windows system. Which of the following describes a typical commercial software license?
A. It allows you to make changes to the operating system code, but only if you agree not to redistribute the code.
B. It describes the steps you must first perform to install the system.
C. It allows you to use the software, but does not imply any penalties if you violate the license.
D. It describes the right to use the software on a single computer.
You are hosting a Web server in your office. Your ISP will provide connectivity. What do you need from your ISP in order to publish your site?
A. Directory locations
B. A user name and password
C. A DNS name or IP address
D. Permissions to use CGI
You want to find information about Java. You visit a popular search engine and manually search through a directory tree of topics until you find a directory titled "Computers" and a subdirectory titled "Programming Languages." You select the topic "Java" and look through a list of indexed pages on that topic, then choose one page with which to begin your research. Which type of search index did you use?
A. Boolean index
B. Keyword index
C. Static index
D. Full-text index
What is a cookie?
A. A file created by the browser each time its user accesses a Web site.
B. A virus placed on a computer by spyware to delete directories.
C. An image file that expands to fill a browser’s cache.
D. A text file placed on a client by a Web server to track user preferences.
Which of the following eventually becomes a site map?
A. A needs analysis
B. A scope diagram
C. A storyboard
D. A stakeholder meeting
If you want to pass CIW 1D0-510 successfully, donot missing to read latest lead2pass CIW 1D0-510 practice exams.
If you can master all lead2pass questions you will able to pass 100% guaranteed.