ciw practice exam
Terms in this set (78)
Which TCP/IP troubleshooting command should you use to determine whether a client and server are communicating with each other?
The ping command
Which of the following is a vital part of any firewall strategy?
The security policies created by firewall administrators
For which type of server -- used by your e-mail client -- is it especially important that you archive e-mail messages to your local hard drive?
Which choice lists the two principal methods of connecting to the Internet through an Internet Service Provider (ISP)?
Dial-up connection and direct connection
data transmission standard for the Internet
route the packets of information from your source address to the destination address.
Which protocol is the data transmission standard for the Internet, responsible for sending information from one computer to another using uniquely identifying addresses?
Which IT job role best describes an individual who manages and maintains a network infrastructure?
an information portal will only index Web sites that are
is free, as long as you follow the rules
Open-source "copy left" license means users can
modify and redistribute the software's source code
What is the purpose of Bookmarks and Favorites?
Bookmarks and Favorites allow you to save frequently accessed URLs in your browser for quick reference.
Which choice lists the systems for which the Windows Media Player is available?
Windows and Macintosh systems
What happens to the e-mail messages you receive while the autoresponder feature is enabled?
The messages are stored in your Inbox as usual.
When you search for topics using a Web search engine, what are you searching?
An index or database of referenced Web sites
Consider the following address:
Which part of this address represents the server name on which this page resides?
The portions .CIWcertified and .CIWcertified.com are the
What does it mean to configure an e-mail client?
You must provide the user name given by the ISP, and provide the names of the mail servers used by your ISP.
You work with UNIX workstations and want to install a Web browser specific to your environment. Which browser should you install?
text-only browser that runs on most operating systems
browser designed with social networking in mind
Copyleft is the practice of
removing restrictions from the distribution and use of software, and requiring all modified versions of the software to be free as well.
Which of the following statements is true regarding copyleft licenses?
Software that is distributed with a copyleft license is in the public domain.
Which choice lists two methods that you can use to reference an FTP or file-storage server (such as Dropbox) in order to download files?
By IP address or domain name
Which protocol is often used to publish Web pages to a Web server?
File Transfer Protocol
allows you to tag Web pages using relevant keywords, compile these tags into a public list, and share with others.
What distinguishes instant messaging from e-mail?
Instant messages can be sent only to contacts who are currently online.
Which term is used to describe a computer that is responsible for storing and providing information requested by a client application?
What is the purpose of conducting an ontological study as it pertains to a particular organization or business?
To enable software engineers and programmers to accurately map technology solutions to business needs
You want to be able to quickly view news headlines without the need to open your Web browser and visit any news Web sites. How can you accomplish your goal?
Set up a Web feed.
Which of the following search engines uses cross-referencing fields for conceptual searches, in addition to allowing keywords searches?
Virtual Network Computing (VNC) is a program that allows you to control a computer at a remote location. VNC consists of which two components?
The server and the viewer
Which term is used to describe a network in which each computer has both server and client capabilities?
What is a software patent?
What is a software patent?
What are vector graphics?
Mathematical shapes saved as a sequence of vector statements, which describe a series of points to be connected
Approximately how many numeric IP addresses are possible with IPv4?
Web site and network used only by employees within a company.
internal network designed to provide access to selected external users
Companies increasingly want to allow employees to share files directly without having to maintain servers to provide FTP access. Which technology can companies use to maximize processing power while protecting privacy and sensitive materials?
static index/site map
enables users to manually search information portals to locate indexed information
How can you reduce file size so that files can be sent more efficiently across the Internet?
What is the disadvantage of your decision to encrypt company transmissions?
Encrypting data slows data communication because each packet of data must be encrypted and decrypted.
This is considered an advantage of open-source solutions
Software that is distributed with an open-source license is in the public domain
A compression/ decompression algorithm used by modern video and audio player plug-ins
A field contained in two or more database tables that forms a connection between the tables.
Common Gateway Interface (CGI)
A program that processes data submitted by the user. Allows a Web server to pass control to a software application, based on user request. The application receives and organizes data, then returns it in a consistent format
database management system (DBMS)
A program used to store, access and manipulate database information.
A password-protected, encrypted data file containing message encryption, user identification and message text. Used to authenticate a program or a sender's public key, or to initiate SSL sessions. Must be signed by a certificate authority (CA) to be valid
Digital Subscriber Line (DSL)
A high-speed direct Internet connection that uses all-digital networks.
Storage space on a computer hard disk used to temporarily store downloaded data
An IP address represented in words.
Domain Name System (DNS)
A system that maps uniquely hierarchical names to specific Internet addresses.
Which file format should you use to create a resume that you intend to send as an e-mail attachment that can be read by various programs on different platforms?
Rich Text Format (RTF)
What is the term for an individual who is responsible for examining an organization's security requirements and determining the necessary infrastructure?
Database administrators are responsible for the
maintenance and security of an organization's database resources and data.
Database administrators manage
backup and recovery procedures to prevent data loss, and apply database software upgrades and repairs as needed.
The World Wide Web Consortium (W3C) is a vendor-neutral forum whose mission is to create Web standards and guidelines. The W3C has published more than 110 Web standards, called W3C Recommendations, since its founding in 1994. The W3C does not force manufacturers to follow the Recommendations, but encourages them to do so. Many of the standards define levels of conformance, which manufacturers must follow if they want to label their products W3C-compliant.
The International Organization for Standardization (ISO) is a grouping of national standards bodies from 157 countries. ISO develops technical specifications for intellectual, scientific, technological and economic activities worldwide.
The Internet Engineering Task Force (IETF) is an open international community of network designers, operators, vendors and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. The IETF develops and promotes Internet standards for the TCP/IP and Internet protocol suites.
The Institute of Electrical and Electronics Engineers (IEEE) creates standards relating to various technologies, including those used on the Internet (such as Ethernet [802.3] and Wireless Ethernet [802.11]).
Which of the following retains all the formatting characteristics of a word-processing document, but may render inconsistently in different browsers?
HTML resumes are generally created to post as Web pages. HTML resumes retain all the formatting characteristics of a word-processing document, although the attributes may render inconsistently in different browsers.
Which of the following top-level domains would generally refer to an Internet Service Provider (ISP)?
Root-level servers are at the highest level of the Domain Name System (DNS)
To what does the term "cloud" in "cloud computing" refer?
The network of servers and connections that make up the Internet is collectively known as the "cloud." The term "cloud" derives from the practice of representing the Internet as a cloud in network diagrams.
A domain name usually indicates the server name, the registered company domain name and the domain category, also called a top-level domain. A top-level domain is the group into which a domain is categorized, by common topic (company, educational institution) and/or geography (country, state).
Grid computing, though similar to cloud computing, relates specifically to the use of multiple systems dedicated to processing a vast amount of data or solving a particular mathematical or scientific problem. Examples of grid computing include systems that engage in economic forecasting or analyze seismic data.
Although cloud computing applications reside on remote servers, end users can choose to store files on a local drive or on a remote system.
Two requirements are necessary to upload files to an FTP site. One requirement is gaining access to an FTP client program. What is the other requirement?
Permission to upload
Which protocol allows a computer using an analog modem to make an initial connection to the Internet?
Point-to-Point Protocol (PPP)
While you are exploring a Web page in the Firefox browser, a file fails to properly display. You decide to install the required plug-in to view the file and are forced to quit Firefox, install the plug-in, then restart Firefox. What kind of installation is this?
An offline installation
Which of the following is a Web-based seminar or training session that is typically interactive, enabling participants to communicate with the presenter and with each other via online chat?
You are part of a development team that needs to adopt an integrated development environment tool to increase programmer productivity. The team narrowed the options down to two. One is open-source; the other will require an expensive site license. The tool you choose must be reliable, stable and well maintained. Which of the following could be a disadvantage for you to choose open-source, and thus a compelling enough reason to purchase the licensed software instead of using the open-source solution?
Maintenance of an open-source solution relies on developers who volunteer to work on the code.
Which action can you perform to filter spam at your client computer?
Use a client-side filter to identify and filter spam messages.
The standard protocol most likely transferring the application in this scenario is File Transfer Protocol (FTP). When you download software programs and documents from Web sites, you are usually transferred to FTP sites for the download. Hypertext Transfer Protocol (HTTP) is used to transfer Web pages. Secure HTTP (HTTPS) is the encrypted transfer of Web pages. Simple Mail Transfer Protocol (SMTP) is used to send e-mail messages to an e-mail server.
The graphics you are probably most familiar with, GIFs and JPEGs, are raster graphics. What are raster graphics?
Images that map bits directly to a display space
Which protocol is used to receive e-mail messages from an incoming mail server, and forces you to download e-mail messages before reading, deleting or otherwise managing them?
Post Office Protocol (POP)
In many cases, project teams are created and developed with people who have different perspectives and priorities. Why is it important for a project manager to have the ability to develop and manage teams?
To help team members complete the project schedule within the project constraints
In which database table relationship type is a junction table a necessary component?
A many-to-many relationship
In which encryption method are the public and private keys mathematically related so that only the public key can be used to encrypt messages, and only the corresponding private key can be used to decrypt them?
Which of the following entities possesses the digital certificate during an Internet transaction?
The server always possesses the digital certificat
Which of the following should you use to encrypt and decrypt digital signatures, and to protect passwords from disclosure?
What is ciphertext?
Most servers use the Secure Sockets Layer (SSL) protocol
for secure exchanges over the Internet
YOU MIGHT ALSO LIKE...
Introduction to Business | Gaspar, Bierman, Kolari, Hise, Smith, Arreola-Risa
CIW LESSON 9 OBJECTIVE REVIEW AND TEST (ALL OF LESSON 9)
Chapter 9 Test
OTHER SETS BY THIS CREATOR
Chapters 4, 5, 6 Test
THIS SET IS OFTEN IN FOLDERS WITH...
CIW Practice Exam Questions #1
ciw practice exam 50 questions
CIW Practice Exam Questions #5
CIW Practice Exam