Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

CIW 1D0-510 Exam - Cheat-Test.com

Free 1D0-510 Sample Questions:

Q: 1
What is the purpose of the traceroute command?

A. It displays the IP address information for a NIC.
B. It displays the ports that are active on a system.
C. It displays and manually configures the routes in a routing table.
D. It determines the path between a source system and destination system.

Answer: D

Q: 2
The XHTML 1.0 Recommendation describes three variations or "flavors." Which of the following best describes the XHTML 1.0 transitional and its requirements?

A. Developers must use Cascading Style Sheets (CSS) for all formatting.
B. Developers can use any markup tags that we supported in HTML Recommendations 1.0 or later.
C. Developers can use either Cascading Style Sheet (CSS) or HTML 4.0-compilant markup tags for all formatting.
D. Developers must use Cascading Style Sheets (CSS) for all formatting and use frames with XHTML 1.0-compliant markup tags.

Answer: C

Q: 3
Which choice lists the three basic elements that are required by all networks?

A. Network services, clients, and servers.
B. Clients, servers, and transmission media.
C. Protocols, transmission media, and network services.
D. Shared resources, hosts, and transmission protocols.

Answer: C

Q: 4
Which type of malware resides in active memory, consumes system resources and self-replicate?
A. Virus.
B. Worm.
C. Illicit server.
D. Trojan horse.
Answer: B

Q: 5
Your company has decided to use a freelance artist's digital photos to enhance the company Web site. Which process should your company follow?

A. License the artist's copyrighted photos.
B. Use the artist's photos until the artist protests.
C. Buy the infringement rights to the artist's photos.
D. Trademark the photos and register the artist as the copyright owner.

Answer: A

Q: 6
Which of the following is absolutely necessary in order to connect to the Internet?

A. A VPN.
B. TCP/IP.
C. A network cable.
D. A static IP address.

Answer: B

Q: 7
You are creating a user-input form for a Web page on your company's site. You want this Web form to send information from the user's browser to your server as securely as possible which <form> tag attribute and value should you use?

A. action="get".
B. action="post".
C. method="get"
D. method="post".

Answer: D

Q: 8
Which term describes the activity of a hacker who travels through a neighbourhood or business district trying to discover unsecured wireless networks?

A. War driving.
B. Man in the middle.
C. System snooping.
D. Connect hijacking.

Answer: A

Q: 9
Which common peripheral connection port can support up to 127 peripherals, and support speeds of up to 480 Kbps?

A. USB 1.0.
B. USB 2.0.
C. FireWire.
D. Game Port.

Answer: B

Q: 10
Which connection medium operates at a maximum speed of 44.736 Mbps?

A. T1.
B. T3
C. DSL
D. ISDN

Answer: B

Q: 11
Which IP address class uses 8 bits for the network partition of the address and 24 bits for the host portion of the address?

A. Class A
B. Class B
C. Class C
D. Class D

Answer: A

Q: 12
Which device contains a transceiver, is responsible for transmitting and receiving only digital network signals, and can be attached to a workstation via various methods, including Universal Serial Bus (USB) and Peripheral Component Interconnect (PCI)?

A. A hub.
B. A modem.
C. A network Interface Card (NIC).
D. A wireless Access Point (WAP).

Answer: C

Q: 13
You are using a GUI HTML editor. You have decided to use this editor to publish the pages you create. Which choice lists the elements required to upload your files?

A. A private key, a page name, and a user name.
B. A destination directory, a host name, and a private key.
C. A user name, a host name, a private key, and a destination directory.
D. A user name and password, a host name, and a destination directory.

Answer: D

Q: 14
Which scenario describes a back-end issue that you must consider when developing a Web site?

A. Your Web site is easy for users to navigate because it uses familiar conventions and contains no dead ends.
B. Your site uses the most current design trends available, to present exiting content considered fashionable by your target audience.
C. Your home page presents a lot of small text explaining your company in detail, but no images and no colors other than black and white.
D. Your Web site contains a lot of images so it is visually exciting but it takes a long time to download each page, even with high-speed connections.

Answer: D

Q: 15
The human Resources department needs to provide a variety of policy information to the company employees. Member of HR will configure and manage their own Web server in-house. This server will use Linux and Apache Server, and it will be part of the company intranet. Which of the following costs must be considered?

A. The cost of implementing a firewall.
B. The cost of licensing Apache server.
C. The cost of a person to configure server hardware and software.
D. The cost of customer support from an Application Server Provider (ASP).

Answer: C

Q: 16
You are developing some new pages for your company's Web site, and you are ready to post the pages to the site. You will upload your files to a remote Web server using a command-line FTP client. To upload the files, which command will your FTP client program use?

A. Is.
B. Put.
C. Get.
D. Post

Answer: B

Q: 17
Which fact must network administrators consider when implementing encryption policies for company data that will be sent internationally?

A. Some countries do not allow large keys to be use.
B. Some countries do not allow smaller encryption keys to be exported.
C. The largest available encryption key should be used to ensure privacy.
D. Larger encryption keys work much faster than smaller, less efficient keys.

Answer: A

Q: 18
A company with a business-to-consumer Web site uses a service to securely transmit its costumer's credit card information to the company's merchant bank. Which technology performs this function?

A. Payment gateway.
B. Merchant authentication.
C. Secure Sockets Layer (SSL).
D. Open Trading Protocol (OTP).

Answer: A

Q: 19
Which hardware device operates at the network layer of the OSI reference model?

A. Hub.
B. Bridge.
C. Router.
D. Repeater.

Answer: C

Q: 20
Which of the following would you expect to occur during a Web site planning meeting?

A. Determining sales projections with the sales team.
B. Explaining branding issues to the Web development team.
C. Training the marketing team to obtain demographic information.
D. Explaining the purpose of XHTML DTD to the Web development team.

Answer: B

Q: 21
You have two computers, each with a different operating system. One is a Linux system, which uses the Gnu Public License (GPL). You can use this Linux software free of charge, and you can make changes to code that created the operating system. The other system is a Windows system. Which of the following describes a typical commercial software license?

A. It describes the right to use the software on a single computer.
B. It describes the steps you must first perform to install the system.
C. It allows you to use the software, but does not imply any penalties if you violate the license.
D. It allows you to make changes to the operating system code, but only if you agree not to redistribute the code.

Answer: A

Q: 22
You received the following file attachment in e-mail messages from unknown sources. Which is the most likely to contain s computer virus?

A. File.avi
B. File.pdf
C. File.exe
D. File.wav

Answer: C

Q: 23
Which of the following is a protocol and command interface that can be use to gain secure access to a remote computer and then execute commands to administer the system?

A. SSL.
B. SSH.
C. FTPS.
D. HTTPS.

Answer: B

Q: 24
Chris works on the Web team for his company. He updates the company Web site at the IP address
12.42.192.73. on Chris's business cards, he uses the URL www.CIWcertefied.com instead of the IP
address for the company site. Which technology allows both URL and the IP address to refer to the same Web site?

A. Network Access Point (NAP.
B. Domain Name Server (DNS).
C. Internet Service Provider (ISP).
D. Uniform Resource Identifier (URI).

Answer: B

Q: 25
Your manager has asked you about the essential difference between worms and viruses. Which of the following is true?

A. A virus is self-replicating, whereas a worm requires some sort of user action.
B. A worm is self-replicating, whereas a worm requires some sort of user action.
C. A virus can work only on windows systems, whereas a worm can work on any common platform (e g, Macintosh, UNIX, Windows).
D. A worm can work only on windows systems, whereas a worm can work on any common platform (e g, Macintosh, UNIX, Windows).

Answer: B

Q: 26
Which choice lists the entities most often used to spread viruses?

A. End users and database servers.
B. Computer files and DHCP servers.
C. Removable disks and e-mail servers.
D. Weak passwords and directory servers.

Answer: C

Q: 27
Mike wants to transfer an update file from one system to another. Currently, these two systems can not communicate with each other via the standard network. Which type of cable can he use to quickly transfer a file from one computer to the other without a hub or switch?

A. Crossover cable.
B. Category 1 cable.
C. Standard Ethernet cable.
D. Standard telephone cable.

Answer: A

Q: 28
Which practice will help ensure that you are using company systems and resources appropriate?

A. Use your work computer to store personal data.
B. Use your home computer to send personal e-mail messages.
C. Assume that only intended recipients will read your e-mail messages.
D. Install personal gaming software on corporate servers for after-hour use.

Answer: B

Q: 29
Perl, .net and PHP are all examples of.

A. Database technologies.
B. Client-side scripting technologies.
C. Server-side scripting technologies.
D. Application programming interfaces.

Answer: C

Q: 30
Chris and his Web development team are beginning a Web site project. What is the first step in this project?

A. Create a site map.
B. Submit the site URL to search engines.
C. Develop markup code and test functionally.
D. Document the site's purpose and intended audience.

Answer: D


© 2014 Cheat-Test.com, All Rights Reserved