CIW v5 Foundations Exam
Questions, Answers, Braindumps (1D0-510)
every body , feeling free to clear my paper and sending
some questions from my paper which were exactly the
same ones which i got from www.examcheats.net.
What is the purpose of the trace route command?
A. It displays the IP address information for a NIC.
B. It displays the ports that are active on a system.
C. It displays and manually configures the routes in
a routing table.
D. It determines the path between a source system and
The XHTML 1.0 Recommendation describes three variations
or "flavors." Which of the following
best describes the XHTML 1.0 transitional and its requirements?
A. Developers must use Cascading Style Sheets (CSS)
for all formatting.
B. Developers can use any markup tags that we supported
in HTML8 Recommendations 1.0 or
C. Developers can use either Cascading Style Sheet (CSS)
or HTML 4.0-compilant
Markup tags for all formatting.
D. Developers must use Cascading Style Sheets (CSS)
for all formatting and use Frames with
XHTML 1.0-compliant markup tags.
Which choice lists the three basic elements that are
required by all networks?
A. Network services, clients, and servers.
B. Clients, servers, and transmission media.
C. Protocols, transmission media, and network services.
D. Shared resources, hosts, and transmission protocols.
Which type of malware resides in active memory, consumes
system resources and
C. Illicit server.
D. Trojan horse.
Your company has decided to use a freelance artist's
digital photos to enhance the
company Web site. Which process should your company
A. License the artist's copyrighted photos.
B. Use the artist's photos until the artist protests.
C. Buy the infringement rights to the artist's photos.
D. Trademark the photos and register the artist as the
Which of the following is absolutely necessary in order
to connect to the Internet?
A. A VPN.
C. A network cable.
D. A static IP address.
You are creating a user-input form for a Web page on
your company's site. You
want this Web form to send information from the user's
browser to your server as
securely as possible which <form> tag attribute
and value should you use?
Which term describes the activity of a hacker who travels
through a neighbourhood
or business district trying to discover unsecured wireless
A. War driving.
B. Man in the middle.
C. System snooping.
D. Connect hijacking.
Which common peripheral connection port can support
up to 127 peripherals, and
support speeds of up to 480 Kbps?
A. USB 1.0.
B. USB 2.0.
D. Game Port.
Which connection medium operates at a maximum speed
of 44.736 Mbps?