Latest CIW 1D0-510 Dumps and Practice Tests

IW V5 Founfations Exam: 1D0-510 Exam

  • 1D0-510 Questions & Answers
  • Exam Code: 1D0-510
  • Exam Name: CIW V5 Founfations Exam
  • Q & A: 178 Q&As

1: What is an intranet?
A.A searchable internal repository that stores an organization’s proprietary documents
B.A worldwide network available to anyone who has a TCP/IP connection on a computer
C.A TCP/IP-based network accessible only by an organization’s members and employees
D.A TCP/IP-based network accessible only by an organization’s internal employees and select external clients
Correct Answers: C

2: You have been asked to determine the download time for pages on your site. One page consists of the XHTML document, several image files, and a Flash presentation. These elements equal 84 kilobytes (KB) total. How long will it take for this page to be downloaded by a user with an Internet connection speed of 33.6 kilobits per second (Kbps)?
A.Approximately 5 seconds
B.Approximately 15 seconds
C.Approximately 20 seconds
D.Approximately 55 seconds
Correct Answers: C

3: Which choice lists computer peripheral port standards that require only one IRQ and are used to connect multiple high-speed devices?
A.USB and PS/2
B.USB and UART
C.IEEE 1394 and USB
D.IEEE 1394 and IEEE 1284
Correct Answers: C

4: What is spyware?
A.Software that reports security holes to hackers
B.Software that gathers information and relays it to outside parties
C.Software that determines and reports improper software licensing
D.Software that opens an undocumented port on your server and allows attackers to control your system
Correct Answers: B

5: Rolf’s Web site does not meet the W3C’s Web Content Accessibility Guidelines (WCAG). To make his site more accessible according to WCAG, which change could he make?
A.Remove all tables from site pages
B.Add a disclaimer to the home page
C.Create a text-only version of the site
D.Add more images and decrease text
Correct Answers: C

6: Lisa has programmed her company’s router to recognize several internal networks. Which job title best describes her responsibilities?
A.Network engineer
B.Security manager
C.Server administrator
D.Help desk technician
Correct Answers: A

7: Which type of encryption uses a pair of keys, in which one key is used to encrypt information and the other key is used to decrypt that information?
A.Hash encryption
B.One-way encryption
C.Symmetric encryption
D.Asymmetric encryption
Correct Answers: D

8: Which of the following accurately describes a difference between GIF images and JPEG images?
A.GIF images support the transparency technique, whereas JPEG images do not.
B.GIF images support millions of colors, whereas JPEG images support only 256 colors.
C.JPEG images use vector graphics, whereas GIF images use bitmap or raster graphics.
D.JPEG images support interlacing and animation techniques, whereas GIF images do not.
Correct Answers: A

9: In the client/server model, a client can access information from any server if:
A.both the client and server understand the protocol.
B.both the client and the LAN understand the protocol.
C.both the LAN and the WAN understand the protocol.
D.both the server and the LAN understand the protocol.
Correct Answers: A

10: Which of the following is required for a wireless network to run in infrastructure mode?
A.A bridge
B.A switch
C.A wireless access point (WAP)
D.Wireless Equivalency Privacy (WEP)
Correct Answers: C

11: Which choice lists the three image file formats that are universally supported by modern Web browsers?
A.BMP, TIFF and GIF
B.PNG, GIF and BMP
C.GIF, JPEG and BMP
D.GIF, JPEG and PNG
Correct Answers: D

12: Which of the following is the most popular protocol that provides authentication and encryption for secure exchanges over the Internet?
A.Secure Sockets Layer (SSL)
B.Public Key Infrastructure (PKI)
C.Electronic Data Interchange (EDI)
D.Secure Electronic Transactions (SET)
Correct Answers: A

13: Which of the following IP addresses is invalid?
A.224.199.23.3
B.24.256.54.255
C.177.138.23.89
D.182.255.254.115
Correct Answers: B

14: Lars has difficulty when he tries to access some Web pages. He suspects that his browser has a problem or a bug. Which of the following should he consider downloading?
A.A patch
B.A firewall
C.A pop-up blocker
D.An anti-virus program
Correct Answers: A

15: When creating its Web presence, a business should choose its domain name carefully so that users will be able to recall it easily. Every domain name is unique. With which of the following must each domain name be registered?
A.DNS
B.W3C
C.FQDN
D.ICANN
Correct Answers: D

16: You need to register a domain name for the Web sites that will promote your company’s new product in international markets. You decide to register several top-level domains, such as .ca, .au and .ae, in addition to the commonly used .com domain. Why would you do this?
A.To appeal to the national identities of your customers
B.To make it easier for search engines to find your Web site
C.To ensure that you can sell your product legally in various countries
D.To ensure that customers remember the spelling of your product name
Correct Answers: A

17: Which protocol is most likely to be used when sending e-mail using the Microsoft Outlook Express client?
A.IMAP
B.HTTP
C.SMTP
D.POP3
Correct Answers: C

18: Your company is outsourcing some content development tasks. The contractors who work on these projects will see some of your company’s proprietary content before it is available to customers. Your company needs to ensure that this trade-secret content is kept confidential by the contractors who see it. Which of the following protects your intellectual property in this situation?
A.Copyright
B.Trademark
C.License agreement
D.Non-disclosure agreement
Correct Answers: D

19: As an IT professional, you must always consider the Return on Investment (ROI) impact that IT projects have on your organization. You may be required to justify a project’s benefits relative to its cost. What must you do to relate such information about IT projects to upper managers?
A.Explain decisions in purely technical terms to ensure that the issues are properly understood.
B.Make decisions without input from management so as not to confuse the managers or stakeholders.
C.Consult only managers who have technical experience so that the project benefits will be fully understood.
D.Put the information in terms that your managers can understand so that they can make informed decisions.
Correct Answers: D

20: Which term describes a server at the highest level of the Domain Name System (DNS)?
A.Master
B.Primary
C.Top level
D.Root level
Correct Answers: D