Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Angel is using a GUI HTML editor to create a Web page that will be posted on the company site during an advertising promotion. Which of the following is a disadvantage of using GUI HTML editors?

A.

They require you to choose a DTD.

B.

They require you to know HTML well.

C.

They may generate non-standard code.

D.

They take a long time to create page code.

Full Access
Question # 5

You received an e-mail attachment with a .tgz file name extension. Which application has most likely created this file?

A.

Gzip

B.

WinZip

C.

A graphics application

D.

A spreadsheet application

Full Access
Question # 6

Which IP address is called the loopback address, and can be used for testing and troubleshooting?

A.

127.0.0.1

B.

10.1.12.251

C.

132.65.18.91

D.

192.23.111.8

Full Access
Question # 7

Your company is outsourcing some content development tasks. The contractors who work on these projects will see some of your company's proprietary content before it is available to customers. Your company needs to ensure that this trade-secret content is kept confidential by the contractors who see it. Which of the following protects your intellectual property in this situation?

A.

Copyright

B.

Trademark

C.

License agreement

D.

Non-disclosure agreement

Full Access
Question # 8

Which diagnostic tool would you use to determine the physical (MAC) address to systems that you have recently connected with?

A.

arp

B.

netstat

C.

nbtstat

D.

tracert

Full Access
Question # 9

Which type of encryption uses a pair of keys, in which one key is used to encrypt information and the other key is used to decrypt that information?

A.

Hash encryption

B.

One-way encryption

C.

Symmetric encryption

D.

Asymmetric encryption

Full Access
Question # 10

Which of the following is the most efficient method for documenting and communicating a Web site plan?

A.

Photocopying and faxing sketches

B.

Sending a presentation slideshow via e-mail

C.

Describing the plan orally on stakeholders' voicemail

D.

Posting a large diagram on the wall in a busy office hallway

Full Access
Question # 11

You have been asked to determine the download time for pages on your site. One page consists of the XHTML document, several image files, and a Flash presentation. These elements equal 84 kilobytes (KB) total. How long will it take for this page to be downloaded by a user with an Internet connection speed of 33.6 kilobits per second (Kbps)?

A.

Approximately 5 seconds

B.

Approximately 15 seconds

C.

Approximately 20 seconds

D.

Approximately 55 seconds

Full Access
Question # 12

Which term describes a server at the highest level of the Domain Name System (DNS)?

A.

Master

B.

Primary

C.

Top level

D.

Root level

Full Access
Question # 13

You have purchased some products from an online business. This business collected information from you regarding your purchase, such as your name, e-mail address and product preferences. This online business then sold some information about you to a third party. This routine practice is an example of:

A.

a copyright issue.

B.

a privacy concern.

C.

a trademark issue.

D.

a licensing concern.

Full Access
Question # 14

Brian is a systems administrator for his company. He performs many maintenance and troubleshooting tasks in a room that has multiple, redundant connections. This room is used to control the company's network resources. What is the term for this location?

A.

Local area network (LAN)

B.

Peer to-peer (P2P) network

C.

Network access point (NAP)

D.

Network operations center (NOC)

Full Access
Question # 15

Your manager has asked you about the essential difference between worms and viruses. Which of the following is true?

A.

A virus is self-replicating, whereas a worm requires some sort of user action.

B.

A worm is self-replicating, whereas a virus requires some sort of user action.

C.

A virus can work only on Windows systems, whereas a worm can work on any common platform (e.g., Macintosh, UNIX, Windows).

D.

A worm can work only on Windows systems, whereas a virus can work on any common platform (e.g., Macintosh, UNIX, Windows).

Full Access
Question # 16

Because the Internet has experienced tremendous growth, a new protocol has been developed to accommodate Internet address shortages. What is the name of this improved protocol?

A.

IPv6

B.

IPv2

C.

HTTPS

D.

TCP/IPv2

Full Access
Question # 17

Which of the following is designed to help Personal Digital Assistant (PDA) devices communicate with each other, and also provides its own dedicated markup language?

A.

WAP

B.

WEP

C.

Infrared

D.

Bluetooth

Full Access
Question # 18

Maria has filled all the memory space on her hard drive. She plans to obtain a larger hard drive in a month, but she needs some hard drive space now to finish a project. What can she do to free up some hard drive space?

A.

Run chkdsk.

B.

Compress the kernel.

C.

Delete temporary files.

D.

Remove the secondary partition.

Full Access
Question # 19

Which of the following must you specify to uniquely identify each record in a database?

A.

Key word

B.

Primary key

C.

Common field

D.

One-to-one relationship

Full Access
Question # 20

A member of your Web team is gone on vacation. She made some changes to a Web page before leaving. You need information about the changes she made, but you cannot determine the changes without asking her. How can you resolve this problem in the future?

A.

Require team members to validate new code when making changes

B.

Require team members to update the Web site map before vacations

C.

Require team members to document changes with comment tags in code

D.

Require team members to provide evidence of efforts to ensure accessibility

Full Access
Question # 21

The TCP/IP suite of protocols is the current universal standard for both local area networks and wide area networks. Which choice lists protocols that are included in the TCP/IP suite?

A.

TCP, IP and IPX

B.

TCP, IP and SPX

C.

TCP, IP and UDP

D.

TCP, IP and NWLINK

Full Access
Question # 22

You are creating a user-input form for a Web page on your company's site. You want this Web form to send information from the user's browser to your server as securely as possible. Which

tag attribute and value should you use?

A.

action="get"

B.

action="post"

C.

method="get"

D.

method="post"

Full Access
Question # 23

According to "netiquette" guidelines for effective and appropriate business communications, which practice should you avoid in your e-mail messages?

A.

Attaching documents

B.

Using a spelling checker

C.

Typing in all capital letters

D.

Including digital signatures

Full Access
Question # 24

Which of the following best describes the functionality of Extensible Markup Language (XML)?

A.

XML creates content validation in Web documents.

B.

XML creates a language to define context in Web documents.

C.

XML creates static Web documents and describes visual layout.

D.

XML creates dynamic Web documents with database connectivity.

Full Access
Question # 25

Which choice lists the elements that are necessary for a CGI session?

A.

Web browser, Web form, SSJS and database

B.

SSJS, CGI script, Web browser and database

C.

Web form, database, Web browser and Web server

D.

Web browser, CGI script, Web form and Web server

Full Access