Interview Questions Answers.ORG
Interviewer And Interviewee Guide
CCIE CertificationCCSP CertificationAFMCSun CertificationCCDA Certification Interviews Quizzes

Accounts

AccountingAccounts PayableAuditJunior AccountantSenior Accountant

Analysis

Data AnalystFinancial AnalystGISGIS AnalysisStatistics

Banking

ICICI Bank LtdLoan OfficerRecovery OfficerTreasuryUnderwriter

Basic Job

BehavioralBusiness intelligenceFreshers GraduatePuzzlesTargeted Selection

Best Engineering

Automobile EngineeringChemical EngineeringCivil EngineeringElectrical EngineeringMechanical Engineering

Best Multimedia

3D AnimationCoreldrawDesign EngineerGraphics DesignerInterior Design

Community

Cable OperatorFirefighter SpecialistFuneral DirectorSpeech PathologistTranslator

New Artist

Art DirectorAstrologistInternational RelationshipSociologyVisual Arts

9th Class

9th Class Biology9th Class Chemistry9th Class Computer Studies9th Class Pakistan StudiesEnglish Grammar Section 9th Class

Accounting

Accounting ManagementBank Probationary Officer (PO)Financial Accounting Exam MCQsManagerial Accounting Exam MCQs

Civil Engineering

Building ConstructionRailwaysRCC Structures DesignSoil Mechanics and Foundation EngineeringSurveying

Engineering

Electrical EngineeringElectronic DevicesElectronics EngineeringEngineering MechanicsSoftware Engineering

Information Technology (IT)

Basics of ComputerComputer KnowledgeComputer OrganizationFundamentals Of ComputerWireless Communication

Soft Skills Quizzes MCQs

Communication Skills Exam MCQsCorporate Communication Exam MCQsLeadership Skills Exam MCQsNegotiation Skills Exam MCQsTime Management Exam MCQs

Certifications Interviews

AFMC IQAIIMS Exam IQCCDA Certification IQCCIE Certification IQCCIP Certification IQCCSP Certification IQCertifications IQCheck Point Certification IQCISCO Certification IQCIW Certification IQEngineering Entrance Exams IQEntrance Exams IQGATE Exam IQIBM Certification IQICET Exam IQIIT JEE IQISTQB Certification IQManagement Entrance Exams IQMAT IQMCDBA Certification IQMCSD.NET - 70-089 IQMCSD.NET - 70-300 IQMCSD.NET - 70-306 Exam IQMCSD.NET - 70-310 Exam IQMCSD.NET - 70-315 Exam IQMCSD.NET - 70-316 Exam IQMCSD.NET - 70-320 Exam IQMCSD.NET - 70-330 Exam IQMCSD.NET - 70-340 Exam IQMCTS .Net Certification IQMedical Science Entrance Exams IQMicrosoft Certification IQMSCE 2003 Certification IQNovell Certification IQNovell CLE 9 Certification IQNovell CLP Certification IQNovell CNA Certification IQNovell CNE Certification IQNovell MCNE Certification IQOCP 9i DBA Certification IQOPENMAT Exam IQOracle Application Developer IQOracle Certification IQPMI Certification IQPost Graduation Entrance Exams IQRed Hat Certification IQS/W Quality Assurance IQSun Certification IQSybase Certification IQTesting Certification IQ

Behavioral CIW Certification Interview Questions & Answers:

1. Explain Which diagnostic tool would you use to determine the physical (MAC)
address to systems that you have recently connected with?
A. arp
B. netstat
C. nbtstat
D. tracert

A. arp

2. Suppose your company is outsourcing some content development tasks. The
contractors who work on these projects will see some of your companys proprietary content before it is
available to customers. Your company needs to ensure that this trade-secret content is kept confidential
by the contractors who see it. Which of the following protects your intellectual property in this situation?
A. Copyright
B. Trademark
C. License agreement
D. Non-disclosure agreement

D. Non-disclosure agreement

3. Explain Which term describes a server at the highest level of the Domain Name
System (DNS)?
A. Master
B. Primary
C. Top level
D. Root level

D. Root level

4. Which technology is used to create a table in a relational database?
A. CGI
B. SQL
C. PHP
D. ODBC

B. SQL

5. Suppose changes in project scope tend to occur:
A. only in large corporate projects.
B. in small rather than large increments.
C. in large rather than small increments.
D. only in software development projects.

B. in small rather than large increments.

6. Explain Which of the following is the best example of a client?
A. An FTP site receiving a file
B. A database fulfilling a query
C. A workstation sharing a directory
D. A Web browser querying a database

D. A Web browser querying a database

7. Rolfs Web site does not meet the W3Cs Web Content Accessibility
Guidelines (WCAG). To make his site more accessible according to WCAG, which change could he
make?
A. Remove all tables from site pages
B. Add a disclaimer to the home page
C. Create a text-only version of the site
D. Add more images and decrease text

C. Create a text-only version of the site

8. Suppose 1 What is an intranet?
A. A searchable internal repository that stores an organizations proprietary documents
B. A worldwide network available to anyone who has a TCP/IP connection on a computer
C. A TCP/IP-based network accessible only by an organizations members and employees
D. A TCP/IP-based network accessible only by an organizations internal employees and select external clients

C. A TCP/IP-based network accessible only by an organization's members and employees

9. Explain Which of the following is a contract used in project management that
outlines the requirements for each project task to ensure that the project objectives are met?
A. Project triangle
B. Organizational chart
C. Statement of work (SOW)
D. Return on Investment (ROI)

C. Statement of work (SOW)

10. Explain Which of the following is the most popular protocol that provides
authentication and encryption for secure exchanges over the Internet?
A. Secure Sockets Layer (SSL)
B. Public Key Infrastructure (PKI)
C. Electronic Data Interchange (EDI)
D. Secure Electronic Transactions (SET)

A. Secure Sockets Layer (SSL)

11. Suppose You have purchased some products from an online business. This business
collected information from you regarding your purchase, such as your name, e-mail address and product
preferences. This online business then sold some information about you to a third party. This routine
practice is an example of:
A. a copyright issue.
B. a privacy concern.
C. a trademark issue.
D. a licensing concern.

B. a privacy concern.

12. Explain Which of the following allows multiple systems to communicate on a
wireless network in infrastructure mode?
A. A switch
B. A wireless NIC
C. A network access point (NAP)
D. A wireless access point (WAP)

D. A wireless access point (WAP)

13. Which of the following is a contract used in project management that
outlines the requirements for each project task to ensure that the project objectives are met?
A. Project triangle
B. Organizational chart
C. Statement of work (SOW)
D. Return on Investment (ROI)

C. Statement of work (SOW)

14. Which of the following is the most popular protocol that provides
authentication and encryption for secure exchanges over the Internet?
A. Secure Sockets Layer (SSL)
B. Public Key Infrastructure (PKI)
C. Electronic Data Interchange (EDI)
D. Secure Electronic Transactions (SET)

A. Secure Sockets Layer (SSL)

15. Mike wants to download the Macromedia Flash MX 2004 viewer software
to his desktop. Which Internet protocol will he use?
A. FTP
B. SSH
C. TCP
D. SMTP

A. FTP

16. Which term describes a server at the highest level of the Domain Name
System (DNS)?
A. Master
B. Primary
C. Top level
D. Root level

D. Root level

17. Lars has difficulty when he tries to access some Web pages. He suspects that
his browser has a problem or a bug. Which of the following should he consider downloading?
A. A patch
B. A firewall
C. A pop-up blocker
D. An anti-virus program

A. A patch

18. Which type of encryption uses a pair of keys, in which one key is used to
encrypt information and the other key is used to decrypt that information?
A. Hash encryption
B. One-way encryption
C. Symmetric encryption
D. Asymmetric encryption

D. Asymmetric encryption

19. Suppose Mike is able to check his Web-based e-mail using his cell phone. Which
protocol allows his cell phone to connect to the Internet?
A. Post Office Protocol (POP3)
B. Wireless Access Point (WAP)
C. Wireless Application Protocol (WAP)
D. Multipurpose Internet Mail Extensions (MIME)

C. Wireless Application Protocol (WAP)

20. Explain In general, which choice lists the protocols that must be configured in order
to send and receive e-mail?
A. NNTP and IMAP
B. POP3 and IMAP
C. HTTP and SMTP
D. SMTP and POP3

D. SMTP and POP3

21. Which choice lists computer peripheral port standards that require only one
IRQ and are used to connect multiple high-speed devices?
A. USB and PS/2
B. USB and UART
C. IEEE 1394 and USB
D. IEEE 1394 and IEEE 1284

C. IEEE 1394 and USB

22. Which protocol is most likely to be used when sending e-mail using the
Microsoft Outlook Express client?
A. IMAP
B. HTTP
C. SMTP
D. POP3

C. SMTP

23. Explain When does a copyright become effective?
A. When the original content is created
B. When the original content is the focus of legal contention
C. When the original content is registered in a UNESCO country
D. When the original content is registered with the U.N. Copyright Office

A. When the original content is created

24. Explain Which of the following XHTML elements is always placed within the
<head> section?
A. <html>
B. <body>
C. <meta>
D. <!DOCTYPE>

C. <meta>

25. Explain Which IP address is called the loopback address, and can be used for testing
and troubleshooting?
A. 127.0.0.1
B. 10.1.12.251
C. 132.65.18.91
D. 192.23.111.8

A. 127.0.0.1

26. Suppose Lisa has programmed her companys router to recognize several internal
networks. Which job title best describes her responsibilities?
A. Network engineer
B. Security manager
C. Server administrator
D. Help desk technician

A. Network engineer

27. Explain In XHTML, what is one of the functions of the <input> tag?
A. To create a data cell in a table
B. To create a check box in a form
C. To create a record in a database
D. To create a scrolling select list in a form

B. To create a check box in a form

28. Explain Which protocol is used to transmit files across the Web to be rendered by a
Web browser?
A. Internet Protocol (IP)
B. Hypertext Transfer Protocol (HTTP)
C. Transmission Control Protocol (TCP)
D. Point-to-Point Tunneling Protocol (PPTP)

B. Hypertext Transfer Protocol (HTTP)

29. When creating its Web presence, a business should choose its domain name
carefully so that users will be able to recall it easily. Every domain name is unique. With which of the
following must each domain name be registered?
A. DNS
B. W3C
C. FQDN
D. ICANN

D. ICANN

30. Explain Which of the following IP addresses is invalid?
A. 224.199.23.3
B. 24.256.54.255
C. 177.138.23.89
D. 182.255.254.115

B. 24.256.54.255



SHARE




FORUM
PRIVACY
TERMS & CONDITIONS
FEED BACK

Submit Your Feedback:


×

Thank You For Your Feedback!

Your message has been sent successfully.

Disclaimer
Interview Questions Answers .ORG is responsive and optimized web portal for individuals to get preparation for their job interviews, learning and training. Content at Interview Questions Answers .ORG might be simplified to improve our users experience. We constantly review our content to avoid errors and copyright violations, but we cannot warrant full correctness of all the content. While using this site, you agree to have read and accepted our terms of use, cookie and privacy policy. Copyright 2007-2025 by Interview Questions Answers .ORG All Rights Reserved.

Interview Questions Answers .ORG
Face Book Twitter Linkedin