CIW v5 Foundations Exam
Questions, Answers, Braindumps (1D0-510)
every body , feeling free to clear my paper and sending
some questions from my paper which were exactly the
same ones which i got from www.examcheets.com.
What is the purpose of the trace route command?
A. It displays the IP address information for a NIC.
B. It displays the ports that are active on a system.
C. It displays and manually configures the routes
in a routing table.
D. It determines the path between a source system
and destination system.
The XHTML 1.0 Recommendation describes three variations
or "flavors." Which of the following
best describes the XHTML 1.0 transitional and its
A. Developers must use Cascading Style Sheets (CSS)
for all formatting.
B. Developers can use any markup tags that we supported
in HTML8 Recommendations 1.0 or
C. Developers can use either Cascading Style Sheet
(CSS) or HTML 4.0-compilant
Markup tags for all formatting.
D. Developers must use Cascading Style Sheets (CSS)
for all formatting and use Frames with
XHTML 1.0-compliant markup tags.
Which choice lists the three basic elements that are
required by all networks?
A. Network services, clients, and servers.
B. Clients, servers, and transmission media.
C. Protocols, transmission media, and network services.
D. Shared resources, hosts, and transmission protocols.
Which type of malware resides in active memory, consumes
system resources and
C. Illicit server.
D. Trojan horse.
Your company has decided to use a freelance artist's
digital photos to enhance the
company Web site. Which process should your company
A. License the artist's copyrighted photos.
B. Use the artist's photos until the artist protests.
C. Buy the infringement rights to the artist's photos.
D. Trademark the photos and register the artist as
the copyright owner.
Which of the following is absolutely necessary in
order to connect to the Internet?
A. A VPN.
C. A network cable.
D. A static IP address.
You are creating a user-input form for a Web page
on your company's site. You
want this Web form to send information from the user's
browser to your server as
securely as possible which <form> tag attribute
and value should you use?
Which term describes the activity of a hacker who
travels through a neighbourhood
or business district trying to discover unsecured
A. War driving.
B. Man in the middle.
C. System snooping.
D. Connect hijacking.
Which common peripheral connection port can support
up to 127 peripherals, and
support speeds of up to 480 Kbps?
A. USB 1.0.
B. USB 2.0.
D. Game Port.
Which connection medium operates at a maximum speed
of 44.736 Mbps?