Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CIW 1D0-610 - CIW Web Foundations Associate

Page: 2 / 3
Total 82 questions

Consider the network configuration shown in the command prompt:

What does the Default Gateway identify?

A.

The file server on the network

B.

The local host on the network

C.

The computer on the network

D.

The router on the network

Ron has an older computer to which he frequently downloads and saves company files. He recently noticed that he was running low on disk space and decided to delete many old files that he no longer needed. He now notices that it takes a long time to open or save documents to his hard drive. Which maintenance task can help?

A.

Disk defragmentation

B.

chkdsk command

C.

fdisk command

D.

Disk cleanup

Web developers typically include comments in their code for which reason?

A.

To insert server-side programs, such as JavaScript

B.

To communicate performance issues to site visitors

C.

To explain the purpose of code sections to other developers

D.

To declare which version of HTML each part of the code is using

The Internet has enabled many new anti-social activities, such as online stalking, cyber bullying, and addiction to solitary online activities. Which choice is the most feasible way for schools and parents to reduce cyber bullying?

A.

Monitor, track and record all online activity conducted by students.

B.

Teach teens that the use of online communication is a freedom of expression.

C.

Prevent students from accessing the Internet while at school so that they learn good habits.

D.

Educate students about cyber-ethics and the consequences of questionable online behavior.

You want to enable wireless security on your Android device and your Linux system. Which of the following is a disadvantage of Wired Equivalent Privacy (WEP)?

A.

It enables MAC address filtering.

B.

It is easily compromised by hackers.

C.

It only supports 56-bit symmetric-key encryption.

D.

It is based on the outdated 802.lla wireless standard.

When a developer wants to center a paragraph of text, which code should she use?

A.

This is the text to center

B.

This is the text to center

C.

This is the text to center

D.

This is the text to center

When previewing a Web page using a GUI HTML editor, you will:

A.

be limited to the default browser on your computer or device.

B.

be limited to the browsers installed on your computer or device.

C.

receive an error because GUI editors cannot preview pages in a browser.

D.

be limited to two browser choices that are installed on your computer or device.

You have recently purchased a new wireless router. You would like to configure a name for your wireless network so that you can easily identify it when scanning available wireless networks. Which term describes this wireless network device name?

A.

Default gateway

B.

Wireless access point (AP)

C.

Access Point Identifier (API)

D.

Service Set Identifier (SSID)

Carlos is the Information Technology (iT) administrator for a small company. Over the past year, employees have been using their personal mobile devices and smart phones for business use. This has reduced costs of purchasing new devices for employees. Carlos is now considering whether he should stop supplying employees with company phones and instead require all employees to use their personal smart phones for work. How can Carlos address the most significant security vu inerrability?

A.

Develop a robust app to push security updates out to the various mobile OS devices

B.

Create an employee policy that requires employees to keep phones updated to the latest technology

C.

Create a policy that specifies acceptable use, ensuring security measures are in place for mobile devices

D.

Mandate that employees switch to the company’s mobile service provider to ensure security policies are enforced

You are configuring an e-mail client to connect to your e-mail account. Which of following is required to set up the e-mail account?

A.

An HTTP address

B.

An FTP address

C.

ADNS server address

D.

A POP3 address