Free Cheat-test Samples and Demo Questions Download
Adobe exams Adobe
Apple exams Apple
Avaya exams Avaya
Check Point exams Check Point
Cisco exams Cisco
Citrix exams Citrix
CIW exams CIW
CompTIA exams CompTIA
CWNP exams CWNP
EC-Council exams EC-Council
EMC exams EMC
Exin exams Exin
Fortinet exams Fortinet
GIAC exams GIAC
Hitachi exams Hitachi
HP exams HP
IBM exams IBM
Isaca exams Isaca
ISC exams ISC
ISEB exams ISEB
Juniper exams Juniper
LPI exams LPI
McAfee exams McAfee
Microsoft exams Microsoft
Oracle exams Oracle
PMI exams PMI
Riverbed exams Riverbed
SNIA exams SAP
Sun exams SAS
Symantec exams Symantec
VMware exams VMware
All certification exams

CIW 1D0-51A Exam - Cheat-Test.com

Free 1D0-51A Sample Questions:

Q: 1
You work as a Project Manager for Tech Perfect Inc. You are working on a project with your team members. During the closing phase of your project, you perform a formal project review with your team members. Which of the following tasks are involved in the project review process?
Each correct answer represents a complete solution. Choose three.
A. Evaluate performances.
B. Test the product.
C. Plan dates to perform tasks and meet goals.
D. Document lessons learned.
Answer: A,B,D

Q: 2
Netiquette has developed general rules and guidelines for Internet etiquette. Which of the following guidelines involves multiple rights that may be separated and held by different parties?
A. Chain letter
B. Copyright
C. Flames
D. Ownership
Answer: D

Q: 3
In which of the following appearance modes of plug-ins do multimedia and its player appear as a rectangular sub-portion of a Web page?
A. Hidden
B. Full-screen
C. Embedded
D. Navigate
Answer: C

Q: 4
You are an employee in Tech Perfect Inc. You are responsible for designing, creating, and checking the Web pages and hyperlinks included in the Web pages of your organization.
What is your designation in the organization?
A. Website analyst
B. Web architect
C. Web application developer
D. Website designer
Answer: C

Q: 5
You work as a Project Manager for Tech Perfect Inc. Your organization receives a request to replace one software suite with another throughout the company. As a project manager, you need to determine whether the costs of upgrading a suite can be justified relative to the benefits afforded by the new suite. Which of the following will probably lead you to reject the request, if the cost of upgrading is high and no measurable increase in productivity or sales will result from it?
A. ROI
B. VOI
C. ALE
D. SLE
Answer: A

Q: 6
You work as a System Administrator for Tech Perfect Inc. You administer servers and other computers of your organization remotely. Which of the following tools are you using?
A. VNC
B. Spyware
C. Keylogger
D. CVS
Answer: A

Q: 7
You are using a Web search engine to retrieve information from the Web. You get millions of sites, and it is very difficult for you to obtain the information on a required topic. You want to refine your search in such a way that it returns a small number of suitable matches. Which of the following guidelines will you follow?
Each correct answer represents a complete solution. Choose all that apply.
A. To search for a name or phrase, enclose it all in quotes.
B. Avoid using common words that will return excessive matches.
C. Create very specific or narrow focus queries to avoid duplicate or similar matches.
D. Firstly, use uppercase, then case-sensitive searches, and then lowercase to broaden the search base if required.
Answer: A,B,C

Q: 8
You are using a Web search engine to search contents on the Web. You enter a string and want to get more restricted and appropriate matches as your searching result. What will you do?
A. Add the Boolean AND operator to the search string.
B. Add a plus or minus sign to the search string.
C. Add an asterisk sign to the search string.
D. Add the Boolean OR operator to the search string.
Answer: B

Q: 9
A Web browser, an e-mail program, or a streaming video player displays a Web page, sends an e-mail, or downloads a video without knowing anything about domain names. Which of the following services is used by them to perform these associated tasks?
A. Telnet
B. DHCP
C. DNS
D. ARP
Answer: C

Q: 10
You work as a Security Manager for Tech Perfect Inc. You need to set a safety level that does not allow any active content, such as Java applets or ActiveX controls to display, and shows a notification message whenever a Web page with active contents is encountered. Which of the following safety levels will you set in Internet Explorer on all systems?
A. Medium
B. Medium-low
C. Low
D. High
Answer: D

Q: 11
You have a computer with Windows XP installed on it. You have enabled the desktop firewall feature on your computer for security reasons. Which of the following security features does it offer?
Each correct answer represents a complete solution. Choose all that apply.
A. It maintains context about active sessions and uses that "state information" to speed packet processing.
B. It allows controlling the accessing of a local network and the Internet.
C. It responds to input packets in the manner of an application whilst blocking other packets.
D. It prevents unwanted network traffic from locally installed applications.
E. It hides the computer from port scans by not responding to unwanted network traffic.
F. It alerts about outgoing connections.
Answer: B,D,E,F

Q: 12
Which of the following uses a combination of conventional symmetric-key cryptography for improving speed and public-key cryptography for ease of secure key exchange?
A. MIME
B. IPSec
C. GPG
D. S/MIME
Answer: C


© 2014 Cheat-Test.com, All Rights Reserved