CIW Web Foundations Associate v6.0 (1D0-610)

Page:    1 / 12   
Total 172 questions

You have just checked the balance in your bank account by logging into your banks Web site. Which protocol was most likely used for the transmission of your information?

  • A. IMAPS
  • B. HTTPS
  • C. POP3
  • D. FTPS


Answer : B

You can use the HTML <input>, <select> and <text area> tags to create form fields in a
Web page by placing them between the <form> /form> container tags. Which attribute is used with the <input> element to designate the fields that will appear in the form?

  • A. The type attribute
  • B. The name attribute
  • C. The value attribute
  • D. The action attribute


Answer : A

Which term describes the practice of actively collecting wireless networking data from companies and individuals?

  • A. War driving
  • B. Spear phishing
  • C. Dictionary attack
  • D. Social engineering


Answer : A

Your Web browser is currently open and displaying a popular sports site. You decide that you want to browse to the CIW site without closing the browser. What is the most efficient way to accomplish this?

  • A. By performing a search on your computer for the term “CIW”
  • B. By performing a search within the site currently displayed in your Web browser
  • C. By typing in the FTP address (ftp.CIWcertified.com) in the address bar of your Web browser
  • D. By typing the CIW sites URL (www.CIWcertified.com) in the address bar of your Web browser


Answer : D

What should be your first step when troubleshooting a network connection that uses a cable modem?

  • A. Ping the proxy server.
  • B. Ping the default gateway.
  • C. Ping local devices using their DNS names.
  • D. Ping local devices using their IP addresses.


Answer : D

The Windows Device Manager is a tool that enables you to perform a variety of tasks, including:

  • A. Map to a printer.
  • B. Ping an IP address.
  • C. Defragment a hard drive.
  • D. Change a resource assignment.


Answer : D

You have 20 remote employees flying in to attend a corporate meeting. The morning of travel day, the administrator tells you that the hotel reservations have changed. What is the best way to send each traveling employee a quick message with the new hotel information?

  • A. Update the meeting agenda with the hotel information.
  • B. Post an announcement to the company’s Web site with the new hotel information.
  • C. Call each stakeholder and leave a message with the address of the hotel.
  • D. Send a text message with the hotel information to the mobile phone of each traveler.


Answer : D

You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance drafting business. You have a personal Web site and would like to share samples of your work for potential new customers to review. To which file format should you convert your drawings so that they are viewable regardless of the local operating system used by the individual viewing your site?

  • A. PDF
  • B. MP3
  • C. DOC
  • D. XML


Answer : A

Aisha is coding a Web site using a GUI HTML editor. She wants to quickly check her code for errors and compliance with HTML standards as she works. How can she best accomplish this?

  • A. Render and validate the code using http://validator.w3.org.
  • B. Render the code with a browser to see if it looks correct.
  • C. Validate the code using http://validator.w3.org.
  • D. Validate the code using the GUI Validator.


Answer : D

The capabilities of cellular networks have improved greatly since their original development for analog voice phone calls. Most recently, fourth-generation (4G) wireless supports a variety of data-intensive needs. A benefit of 4G networks is that they:

  • A. Use spread-spectrum technology to ensure high transmission rates.
  • B. Provide fast transmission rates equivalent to DSL or broadband-cable.
  • C. Provide fast transmission rates equivalent to high-speed dial-up connections.
  • D. Enable bandwidth throttling, allowing the user access to unrestricted download speeds.


Answer : B

You are a software developer who wants to start developing mobile apps for smartphones.
You have the option to develop apps for an open-source operating system. Which of the following could persuade you to focus your development efforts on the open-source operating system?

  • A. An open-source license will never be in the public domain.
  • B. Source code for an open-source app is not viewable and cannot be modified.
  • C. Open-source operating systems and development tools are free from software bugs and viruses.
  • D. The operating system and associated development tools are free, provided you comply with the copy left license.


Answer : D

Acme Company has been receiving complaints from its suppliers saying that its extra net site does not render correctly in all their employees browsers. The suppliers are asking that the extra net site be fixed so that everyone can access it, regardless of browser type.
When examining this problem, the Acme Web Development team finds that many developers worked on the site and each used code that he or she was comfortable with. To resolve this problem, what can the Acme developers do?

  • A. Edit the code so that it consistently uses uppercase letters.
  • B. Edit the code in several common browsers before publishing.
  • C. Edit the code so that it conforms to a single W3C HTML standard.
  • D. Edit the code so that it follows a single W3C scripting language standard.


Answer : C

What does the following represent?
2E22: 4F00: 000E: 00D0:A267:97FF:FE6E:FE34

  • A. A MAC address
  • B. AnlPv4address
  • C. An IPv6 address
  • D. An IP diagnostic loopback address


Answer : C

You need to center and indent a quote on your Web page. Which is the best way to accomplish this using HTML5?

  • A. Use the <pre> element.
  • B. Use the <blockquote> element.
  • C. Use the style attribute 1%Iith the <p> tag.
  • D. Use the text-align attribute with the <p> tag.


Answer : B

Which of the following strategies will help protect your computer against virus attacks?

  • A. Perform regular backups of your hard drive.
  • B. Open e-mail attachments only from unknown senders.
  • C. Update the definitions for your malware protection application frequently.
  • D. Configure security settings for your Web browser to the lowest possible level.


Answer : C

Page:    1 / 12   
Total 172 questions