Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CIW 1D0-510 - CIW v5 Founfations Exam

Page: 1 / 6
Total 170 questions

Your wireless client cannot properly communicate with a wireless access point (WAP). Which of the following might need to be changed?

A.

The location of the router

B.

The Service Set Identifier (SSID)

C.

The wireless client's MAC address

D.

The Basic Service Set Identifier (BSSID)

Lo-An created her Web site using XHTML frames. She adds an inline frame into one of her existing frames. Which of the following will result?

A.

A page that will validate to XHTML 1.0 Strict standards

B.

A page that will fail validation because it is not user-friendly

C.

A floating frame that allows a separate document to be inserted in the page

D.

A new borderless frame that appears in a separate pop-up browser window

Perl, .Net and PHP are all examples of:

A.

database technologies.

B.

client-side scripting technologies.

C.

server-side scripting technologies.

D.

application programming interfaces.

Which of the following is a way to limit access to a wireless Ethernet network?

A.

Enable MAC address filtering

B.

Enable Wireless Application Protocol

C.

Remove the access point's MAC address

D.

Configure the access point into ad-hoc mode

The TCP/IP suite of protocols is the current universal standard for both local area networks and wide area networks. Which choice lists protocols that are included in the TCP/IP suite?

A.

TCP, IP and IPX

B.

TCP, IP and SPX

C.

TCP, IP and UDP

D.

TCP, IP and NWLINK

Which fact must network administrators consider when implementing encryption policies for company data that will be sent internationally?

A.

Some countries do not allow large encryption keys to be used.

B.

Some countries do not allow smaller encryption keys to be exported.

C.

The largest available encryption key should be used to ensure privacy.

D.

Larger encryption keys work much faster than smaller, less efficient keys.

Which protocol is used to receive e-mail on an incoming server, and allows you to browse and manage e-mail messages while they reside on the server, rather than downloading messages before reading them?

A.

Post Office Protocol (POP3)

B.

Simple Mail Transfer Protocol (SMTP)

C.

Internet Message Access Protocol (IMAP4)

D.

Transmission Control Protocol/Internet Protocol (TCP/IP)

You are developing some new pages for your company's Web site, and you are ready to post the pages to the site. You will upload your files to a remote Web server using a command-line FTP client. To upload the files, which command will your FTP client program use?

A.

ls

B.

put

C.

get

D.

post

Which choice lists the three basic elements that are required by all networks?

A.

Network services, clients, and servers

B.

Clients, servers, and transmission media

C.

Protocols, transmission media, and network services

D.

Shared resources, hosts, and transmission protocols

What is an intranet?

A.

A searchable internal repository that stores an organization's proprietary documents

B.

A worldwide network available to anyone who has a TCP/IP connection on a computer

C.

A TCP/IP-based network accessible only by an organization's members and employees

D.

A TCP/IP-based network accessible only by an organization's internal employees and select external clients