You are not logged in.

#1 2012-04-02 06:12:22

Ibraheem
Webmaster
From: Capital
Registered: 2012-03-16
Posts: 23,140
Website

CIW Certification Interview Questions And Answers

Certifications :: CIW Certification Exam Job Interview Questions and Answers

CIW Certification Exams Frequently Asked Questions in various CIW Certification Exams Interviews asked by the interviewer. So learn CIW Certification Exams with the help of this CIW Certification Exams Interview questions and answers guide and feel free to comment as your suggestions, questions and answers on any CIW Certification Exams Interview Question or answer by the comment feature available on the page.

1 ► Explain Which of the following IP addresses is invalid?A. 224.199.23.3B. 24.256.54.255C. 177.138.23.89D. 182.255.254.115
2 ► When creating its Web presence, a business should choose its domain namecarefully so that users will be able to recall it easily. Every domain name is unique. With which of thefollowing must each domain name be registered?A. DNSB. W3CC. FQDND. ICANN
3 ► Explain Which protocol is used to transmit files across the Web to be rendered by aWeb browser?A. Internet Protocol (IP)B. Hypertext Transfer Protocol (HTTP)C. Transmission Control Protocol (TCP)D. Point-to-Point Tunneling Protocol (PPTP)
4 ► Explain In XHTML, what is one of the functions of the <input> tag?A. To create a data cell in a tableB. To create a check box in a formC. To create a record in a databaseD. To create a scrolling select list in a form
5 ► Suppose Lisa has programmed her companys router to recognize several internalnetworks. Which job title best describes her responsibilities?A. Network engineerB. Security managerC. Server administratorD. Help desk technician
6 ► Explain Which IP address is called the loopback address, and can be used for testingand troubleshooting?A. 127.0.0.1B. 10.1.12.251C. 132.65.18.91D. 192.23.111.8
7 ► Explain Which of the following XHTML elements is always placed within the<head> section?A. <html>B. <body>C. <meta>D. <!DOCTYPE>
8 ► Explain When does a copyright become effective?A. When the original content is createdB. When the original content is the focus of legal contentionC. When the original content is registered in a UNESCO countryD. When the original content is registered with the U.N. Copyright Office
9 ► Which protocol is most likely to be used when sending e-mail using theMicrosoft Outlook Express client?A. IMAPB. HTTPC. SMTPD. POP3
10 ► Which choice lists computer peripheral port standards that require only oneIRQ and are used to connect multiple high-speed devices?A. USB and PS/2B. USB and UARTC. IEEE 1394 and USBD. IEEE 1394 and IEEE 1284
11 ► Explain In general, which choice lists the protocols that must be configured in orderto send and receive e-mail?A. NNTP and IMAPB. POP3 and IMAPC. HTTP and SMTPD. SMTP and POP3
12 ► Suppose Mike is able to check his Web-based e-mail using his cell phone. Whichprotocol allows his cell phone to connect to the Internet?A. Post Office Protocol (POP3)B. Wireless Access Point (WAP)C. Wireless Application Protocol (WAP)D. Multipurpose Internet Mail Extensions (MIME)
13 ► Which type of encryption uses a pair of keys, in which one key is used toencrypt information and the other key is used to decrypt that information?A. Hash encryptionB. One-way encryptionC. Symmetric encryptionD. Asymmetric encryption
14 ► Lars has difficulty when he tries to access some Web pages. He suspects thathis browser has a problem or a bug. Which of the following should he consider downloading?A. A patchB. A firewallC. A pop-up blockerD. An anti-virus program
15 ► Which term describes a server at the highest level of the Domain NameSystem (DNS)?A. MasterB. PrimaryC. Top levelD. Root level
16 ► Mike wants to download the Macromedia Flash MX 2004 viewer softwareto his desktop. Which Internet protocol will he use?A. FTPB. SSHC. TCPD. SMTP
17 ► Which of the following is the most popular protocol that providesauthentication and encryption for secure exchanges over the Internet?A. Secure Sockets Layer (SSL)B. Public Key Infrastructure (PKI)C. Electronic Data Interchange (EDI)D. Secure Electronic Transactions (SET)
18 ► Which of the following is a contract used in project management thatoutlines the requirements for each project task to ensure that the project objectives are met?A. Project triangleB. Organizational chartC. Statement of work (SOW)D. Return on Investment (ROI)
19 ► Explain Which of the following allows multiple systems to communicate on awireless network in infrastructure mode?A. A switchB. A wireless NICC. A network access point (NAP)D. A wireless access point (WAP)
20 ► Suppose You have purchased some products from an online business. This businesscollected information from you regarding your purchase, such as your name, e-mail address and productpreferences. This online business then sold some information about you to a third party. This routinepractice is an example of:A. a copyright issue.B. a privacy concern.C. a trademark issue.D. a licensing concern.
21 ► Explain Which of the following is the most popular protocol that providesauthentication and encryption for secure exchanges over the Internet?A. Secure Sockets Layer (SSL)B. Public Key Infrastructure (PKI)C. Electronic Data Interchange (EDI)D. Secure Electronic Transactions (SET)
22 ► Explain Which of the following is a contract used in project management thatoutlines the requirements for each project task to ensure that the project objectives are met?A. Project triangleB. Organizational chartC. Statement of work (SOW)D. Return on Investment (ROI)
23 ► Suppose 1 What is an intranet?A. A searchable internal repository that stores an organizations proprietary documentsB. A worldwide network available to anyone who has a TCP/IP connection on a computerC. A TCP/IP-based network accessible only by an organizations members and employeesD. A TCP/IP-based network accessible only by an organizations internal employees and select external clients
24 ► Rolfs Web site does not meet the W3Cs Web Content AccessibilityGuidelines (WCAG). To make his site more accessible according to WCAG, which change could hemake?A. Remove all tables from site pagesB. Add a disclaimer to the home pageC. Create a text-only version of the siteD. Add more images and decrease text
25 ► Explain Which of the following is the best example of a client?A. An FTP site receiving a fileB. A database fulfilling a queryC. A workstation sharing a directoryD. A Web browser querying a database
26 ► Suppose changes in project scope tend to occur:A. only in large corporate projects.B. in small rather than large increments.C. in large rather than small increments.D. only in software development projects.
27 ► Which technology is used to create a table in a relational database?A. CGIB. SQLC. PHPD. ODBC
28 ► Explain Which term describes a server at the highest level of the Domain NameSystem (DNS)?A. MasterB. PrimaryC. Top levelD. Root level
29 ► Suppose your company is outsourcing some content development tasks. Thecontractors who work on these projects will see some of your companys proprietary content before it isavailable to customers. Your company needs to ensure that this trade-secret content is kept confidentialby the contractors who see it. Which of the following protects your intellectual property in this situation?A. CopyrightB. TrademarkC. License agreementD. Non-disclosure agreement
30 ► Explain Which diagnostic tool would you use to determine the physical (MAC)address to systems that you have recently connected with?A. arpB. netstatC. nbtstatD. tracert

2012-04-02 06:12:22

Advertisement
Ads By Google

Re: CIW Certification Interview Questions And Answers



\n

Board footer