Certified Internet Web Professional (CIW) Interview Questions

 
1.
Explain Which of the following IP addresses is invalid?
A. 224.199.23.3
B. 24.256.54.255
C. 177.138.23.89
D. 182.255.254.115
2.
When creating its Web presence, a business should choose its domain name
carefully so that users will be able to recall it easily. Every domain name is unique. With which of the
following must each domain name be registered?
A. DNS
B. W3C
C. FQDN
D. ICANN
3.
Explain Which protocol is used to transmit files across the Web to be rendered by a
Web browser?
A. Internet Protocol (IP)
B. Hypertext Transfer Protocol (HTTP)
C. Transmission Control Protocol (TCP)
D. Point-to-Point Tunneling Protocol (PPTP)
4.
Explain In XHTML, what is one of the functions of the tag?
A. To create a data cell in a table
B. To create a check box in a form
C. To create a record in a database
D. To create a scrolling select list in a form
5.
Suppose Lisa has programmed her companys router to recognize several internal
networks. Which job title best describes her responsibilities?
A. Network engineer
B. Security manager
C. Server administrator
D. Help desk technician
6.
Explain Which IP address is called the loopback address, and can be used for testing
and troubleshooting?
A. 127.0.0.1
B. 10.1.12.251
C. 132.65.18.91
D. 192.23.111.8
7.
Explain Which of the following XHTML elements is always placed within the
section?
A.
B.
C.
D.
8.
Explain When does a copyright become effective?
A. When the original content is created
B. When the original content is the focus of legal contention
C. When the original content is registered in a UNESCO country
D. When the original content is registered with the U.N. Copyright Office
9.
Which protocol is most likely to be used when sending e-mail using the
Microsoft Outlook Express client?
A. IMAP
B. HTTP
C. SMTP
D. POP3
10.
Which choice lists computer peripheral port standards that require only one
IRQ and are used to connect multiple high-speed devices?
A. USB and PS/2
B. USB and UART
C. IEEE 1394 and USB
D. IEEE 1394 and IEEE 1284
11.
Explain In general, which choice lists the protocols that must be configured in order
to send and receive e-mail?
A. NNTP and IMAP
B. POP3 and IMAP
C. HTTP and SMTP
D. SMTP and POP3
12.
Suppose Mike is able to check his Web-based e-mail using his cell phone. Which
protocol allows his cell phone to connect to the Internet?
A. Post Office Protocol (POP3)
B. Wireless Access Point (WAP)
C. Wireless Application Protocol (WAP)
D. Multipurpose Internet Mail Extensions (MIME)
13.
Which type of encryption uses a pair of keys, in which one key is used to
encrypt information and the other key is used to decrypt that information?
A. Hash encryption
B. One-way encryption
C. Symmetric encryption
D. Asymmetric encryption
14.
Lars has difficulty when he tries to access some Web pages. He suspects that
his browser has a problem or a bug. Which of the following should he consider downloading?
A. A patch
B. A firewall
C. A pop-up blocker
D. An anti-virus program
15.
Which term describes a server at the highest level of the Domain Name
System (DNS)?
A. Master
B. Primary
C. Top level
D. Root level
16.
Mike wants to download the Macromedia Flash MX 2004 viewer software
to his desktop. Which Internet protocol will he use?
A. FTP
B. SSH
C. TCP
D. SMTP
17.
Which of the following is the most popular protocol that provides
authentication and encryption for secure exchanges over the Internet?
A. Secure Sockets Layer (SSL)
B. Public Key Infrastructure (PKI)
C. Electronic Data Interchange (EDI)
D. Secure Electronic Transactions (SET)
18.
Which of the following is a contract used in project management that
outlines the requirements for each project task to ensure that the project objectives are met?
A. Project triangle
B. Organizational chart
C. Statement of work (SOW)
D. Return on Investment (ROI)
19.
Explain Which of the following allows multiple systems to communicate on a
wireless network in infrastructure mode?
A. A switch
B. A wireless NIC
C. A network access point (NAP)
D. A wireless access point (WAP)
20.
Suppose You have purchased some products from an online business. This business
collected information from you regarding your purchase, such as your name, e-mail address and product
preferences. This online business then sold some information about you to a third party. This routine
practice is an example of:
A. a copyright issue.
B. a privacy concern.
C. a trademark issue.
D. a licensing concern.
21.
Explain Which of the following is the most popular protocol that provides
authentication and encryption for secure exchanges over the Internet?
A. Secure Sockets Layer (SSL)
B. Public Key Infrastructure (PKI)
C. Electronic Data Interchange (EDI)
D. Secure Electronic Transactions (SET)
22.
Explain Which of the following is a contract used in project management that
outlines the requirements for each project task to ensure that the project objectives are met?
A. Project triangle
B. Organizational chart
C. Statement of work (SOW)
D. Return on Investment (ROI)
23.
Suppose 1 What is an intranet?
A. A searchable internal repository that stores an organizations proprietary documents
B. A worldwide network available to anyone who has a TCP/IP connection on a computer
C. A TCP/IP-based network accessible only by an organizations members and employees
D. A TCP/IP-based network accessible only by an organizations internal employees and select external clients
24.
Rolfs Web site does not meet the W3Cs Web Content Accessibility
Guidelines (WCAG). To make his site more accessible according to WCAG, which change could he
make?
A. Remove all tables from site pages
B. Add a disclaimer to the home page
C. Create a text-only version of the site
D. Add more images and decrease text
25.
Explain Which of the following is the best example of a client?
A. An FTP site receiving a file
B. A database fulfilling a query
C. A workstation sharing a directory
D. A Web browser querying a database
26.
Suppose changes in project scope tend to occur:
A. only in large corporate projects.
B. in small rather than large increments.
C. in large rather than small increments.
D. only in software development projects.
27.
Which technology is used to create a table in a relational database?
A. CGI
B. SQL
C. PHP
D. ODBC
28.
Explain Which term describes a server at the highest level of the Domain Name
System (DNS)?
A. Master
B. Primary
C. Top level
D. Root level
29.
Suppose your company is outsourcing some content development tasks. The
contractors who work on these projects will see some of your companys proprietary content before it is
available to customers. Your company needs to ensure that this trade-secret content is kept confidential
by the contractors who see it. Which of the following protects your intellectual property in this situation?
A. Copyright
B. Trademark
C. License agreement
D. Non-disclosure agreement
30.
Explain Which diagnostic tool would you use to determine the physical (MAC)
address to systems that you have recently connected with?
A. arp
B. netstat
C. nbtstat
D. tracert