Internet Foundations 2

50 Questions | Attempts: 116
Share

SettingsSettingsSettings
Internet Quizzes & Trivia

Questions and Answers
  • 1. 

    Which popular plug-in is Microsoft's response to Adobe Flash?  

    • A.

      Windows Media Player

    • B.

      Silverlight

    • C.

      Real Player

    • D.

      QuickTime

    Correct Answer
    B. Silverlight
    Explanation
    Silverlight is Microsoft's response to Adobe Flash. It is a software development tool used to write and run Internet applications. Silverlight originally focused on streaming audio and video, but now supports graphics, animations, and almost any multimedia.

    Rate this question:

  • 2. 

    Your company wants to simplify the customer support process for its distributors by enabling them to obtain company forms and reports online  You and your Web team are in charge of implementing this capability Which Web based system should you implement?

    • A.

      FTP site

    • B.

      Intranet

    • C.

      Extranet

    • D.

      Webminar

    Correct Answer
    C. Extranet
    Explanation
    An extranet is an internal network designed to provide access to selected external users and is not available to the Internet public. Extranets are an efficient way for business partners to share and exchange information. Customer support tasks can also be performed using an extranet. For example , if customers need to access a sales report generated by your company they will first access the Internet then enter in their browsers the URL of your company's extranet Web server. Once they access the Web server they must log on to the Web server with usernames and passwords. When they are logged on customers access your company's extranet which appears as a normal Web site and provides all the same services. The only difference is that the extranet provides security to exclude the Internet public. Customers can then download sales reports instead of calling your office and asking someone to fax or mail them.

    Rate this question:

  • 3. 

    While you are exploring a Web page in the Firefox browser, a file fails to properly display. You decide to install the required plug-in to view the file and are force to quit Firefox, install the plug-in, then restart Firefox. Which kind of installation is this?  

    • A.

      A lossless installation

    • B.

      An offline installation

    • C.

      A lossy installation

    • D.

      An online installation

    Correct Answer
    B. An offline installation
    Explanation
    There are two ways to install plug-ins, online and offline. Offline installation requires the user to download the plug-in file, quit the browser and start the installation file. When the installation is completed, the computer software maybe need to be restarted before the changes take effect.

    Rate this question:

  • 4. 

    Users can access and navigate an FTP server using an FTP client program. For which action does the FTP client programe use the "put" command?  

    • A.

      To upload a file

    • B.

      To move a file to a new location

    • C.

      To download a file

    • D.

      To search for a file

    Correct Answer
    A. To upload a file
    Explanation
    To upload files, an FTP client use the"put" command.

    Rate this question:

  • 5. 

    What is the term for the part of a browser responsible for reading a Web page and presenting it to an end user?  

    • A.

      Sandbox

    • B.

      Window

    • C.

      Rendering Engine

    • D.

      Interpreter

    Correct Answer
    C. Rendering Engine
    Explanation
    The rendering engine is the part of the browser responsible for reading the Web page and presenting it to an end user. It has the ability to read, parse, and represent HTML, images, and other tools.

    Rate this question:

  • 6. 

    With which prefix does a Web page's Uniform Resource Locator (URL) begin?  

    • A.

      Ftp://

    • B.

      Http://

    • C.

      Mailto://

    • D.

      Html://

    Correct Answer
    B. Http://
    Explanation
    The components of a typical URL include the protocol, the Internet resource (server or host name) and the domain name. In a URL, the protocol component identifies the Internet Protocol used to send information from the server to a user's computer, and thus indicates both the type of server and Internet Service being used. HTTP is used to transfer Web Pages and other information over the WWW.

    Rate this question:

  • 7. 

    Which term is usd to describe a training session that is delivered over the Internet?  

    • A.

      Streaming Video

    • B.

      Intranet

    • C.

      Webinar

    • D.

      Extranet Voice conference Voice conference

    Correct Answer
    C. Webinar
    Explanation
    A Webinar (short for Web-based seminar) is training -- usually a PowerPoint presentation and/or lecture -- that is delivered over the Web. Webinars and Web conferences are essentially synonymous; although a Webinar is a type of Web conference that is typically one-way, from speaker to participants with limited audience participation.

    Rate this question:

  • 8. 

    What is the main advantage of using vector graphics instead of raster graphics to create animations?  

    • A.

      The file size are relatively small, resulting in shorter download times.

    • B.

      Transfer delays are minimised because the animations download streaming media.

    • C.

      The file size are relatively large, allowing you to create highly elaborate animations

    • D.

      Transfer delays are minimised because portion of animations are stored in your local disk cache.

    Correct Answer
    A. The file size are relatively small, resulting in shorter download times.
    Explanation
    The advantage of using vector graphics are that the files are relatively small (resulting in shorter download time) and they are easily resized without affecting image quality.

    Rate this question:

  • 9. 

    Which file format retains formatting information through all platforms and can be created and read on any computer, regardless of the local operating system?  

    • A.

      Rich Text Format (RTF)

    • B.

      Microsoft Word (DOC)

    • C.

      Portable Document Format (PDF)

    • D.

      Encapsulated PostScript (EPS)

    Correct Answer
    C. Portable Document Format (PDF)
    Explanation
    Adobe created the PDF, a general file format that can be created and read on any computer, regardless of the local operating system. These files are suitable for transmission over the Web.

    Rate this question:

  • 10. 

    Anonymous browsing allows users to:

    • A.

      Create new processes and recover from problem threads, thereby avoiding crashes.

    • B.

      Improve the performance of computers with slow connections.

    • C.

      Surf the Web privately, leaving no cached information.

    • D.

      Develop software that lacks any constraints imposed by prior development.

    Correct Answer
    C. Surf the Web privately, leaving no cached information.
    Explanation
    Anonymous browsing allows users to use the browser and leave no cached information, effectively leaving behind no evidence on the hard drive of the sites or content they have browsed.

    Rate this question:

  • 11. 

    Users can access and navigate an FTP server using an FTP client programme. For which action does the FTP client programme user the "get" command?  

    • A.

      To download a file

    • B.

      To search for a file

    • C.

      To move a file to a new location

    • D.

      To upload a file

    Correct Answer
    A. To download a file
    Explanation
    To download files, an FTP client programme uses the "get" command.

    Rate this question:

  • 12. 

    You want to be able to access active content directly from your browser. Which type of application provides the efficient integration of multimedia formats with a browser or computer that will enable you to do this?  

    • A.

      Viewer

    • B.

      Plug-in

    • C.

      Object

    • D.

      Applet

    Correct Answer
    B. Plug-in
    Explanation
    The primary goal of a plug-in is to provide efficient integration of multimedia formats with the browser and computer. Without this integration, a user would have to download multimedia files and play them back later with a separate application.

    Rate this question:

  • 13. 

    You have activated pop-up blockers in your Web browser to prevent pop-up windows from continually interrupting your browsing experience. What could be an unintended consequence of this action?  

    • A.

      You may not be able to access the company intranet.

    • B.

      You may not be able to set up Web feeds when needed to access news headlines.

    • C.

      You may not be able to clear your browser's cache.

    • D.

      You may not be able to enter logon information when needed to access a site.

    Correct Answer
    D. You may not be able to enter logon information when needed to access a site.
    Explanation
    Pop-up windows are small browser windows that appear in from of the browser window you are viewing. Pop-up windows display on their own, and remain open until you click an option inside or close them. Because pop-up windows can be annoying, pop-up blockers are included in most browsers. Although it seems like a great idea, keep in mind that it may prevent vital features of some Web sites (such as logon windows) from displaying.

    Rate this question:

  • 14. 

    Which audio file format is inherently supported by most browsers?  

    • A.

      PDF

    • B.

      AVI

    • C.

      MPEG

    • D.

      AU

    Correct Answer
    D. AU
    Explanation
    Firefox and Internet Explorer include native, or built-in, support for standard audio formats such as AU, MIDI, Audio Interchange File Format (AIFF) and Waveform (WAV). AU is an audio format used by UNIX servers. Most browsers provide built-in support for AU files. Users can play sound files embedded in HTML documents using their browsers, which automatically identify and play most major formats embedded in or linked to a Web page.

    Rate this question:

  • 15. 

    Which of the following plug-ins can be used to show MOV files, which can combine video, animation, text and audio into one file?  

    • A.

      Adobe Flash Player

    • B.

      Windows Media Player

    • C.

      Apple QuickTime

    • D.

      Adobe Reader

    Correct Answer
    C. Apple QuickTime
    Explanation
    QuickTime is a plug-in created by Apple Computer for running video and audio files. The QuickTime Movie (MOV) file format was created by Apple and is supported by all QuickTime versions. Video, animation, text and audio are combined into one file.

    Rate this question:

  • 16. 

    How can you view a Web page, including all related images, fonts, and scripts referenced by the HTML on the page, without connecting to the Internet?  

    • A.

      Save the Web page content to your hard disk.

    • B.

      Save the Web page content to your computer's local disk cache.

    • C.

      Install the appropriate viewer for the browser you are using.

    • D.

      Install the appropriate plug-in for the browser you are using.

    Correct Answer
    A. Save the Web page content to your hard disk.
    Explanation
    You can save entire Web pages or elements of a Web page to your hard disk. When saving a Web page to hard disk, most browsers save all related images, fonts, and scripts referenced by the HTML on the page. You can open the page in your browser even when you are not connected to the Internet.

    Rate this question:

  • 17. 

    You want to learn more about CIW certifications and access a PDF document at http://www.ciwcertified.com/ _resources/CIW_Roadmap.pdf. Which type of URL does this represent?  

    • A.

      A deep URL

    • B.

      A relative URL

    • C.

      An absolute URL

    • D.

      A default URL

    Correct Answer
    A. A deep URL
    Explanation
    A URL that goes deeper into a Web site than the home page, such as www.ciwcertified.com/index.php is called a deep URL because it includes a path that penetrates the folder structure of the Web site.

    Rate this question:

  • 18. 

    The graphics you are probably most familiar with, GIFs, and JPEGs, are raster graphics. What are raster graphics?  

    • A.

      Image that map bits directly to a display space

    • B.

      Mathematical shapes saved as a sequence of vector statements, which map bits directly to a display space.

    • C.

      Mathematical shapes saved as a sequence of vector statements, which describe a series of points to be connected

    • D.

      Pixel-based images that describe a series of points to be connected.

    Correct Answer
    A. Image that map bits directly to a display space
    Explanation
    Raster graphics are images that map bits directly to a display space.

    Rate this question:

  • 19. 

    To what does the term "netiquette" refer?

    • A.

      A set of guidelines that encourage common sense, politeness and general rules for e-mail messages

    • B.

      A set of typographical conventions that govern user practices in e-mail messages

    • C.

      A set of U.S. laws that specify content forbidden from transmission in e-mail messages

    • D.

      An international convention banning the user of profanity and controversial opinions from e-mail messages

    Correct Answer
    A. A set of guidelines that encourage common sense, politeness and general rules for e-mail messages
    Explanation
    The term netiquette has been coined to encourage common sense and politeness, and to establish general rules for e-mail messages.

    Rate this question:

  • 20. 

    Which choice describes the file type(s) that can be attached to an e-mail message?  

    • A.

      Any type of file can be attached to an e-mail message, but only if the file is first compressed using a file compression utility.

    • B.

      E-mail messages do not support attachments of any type unless you use a browser to transmit them.

    • C.

      Almost any type of file can be attached to e-mail messages, such as documents, spreadsheets, presentations or images.

    • D.

      Only image files can be attached to e-mail messages; any text must be palced in the body of the message.

    Correct Answer
    C. Almost any type of file can be attached to e-mail messages, such as documents, spreadsheets, presentations or images.
    Explanation
    You can attach almost any type of file to an e-mail message. The ability to attach files (such as word processor documents, spreadsheets and images) to your messages makes e-mail a powerful tool, and allows users to share files and documents within their organisation or with users in other organisations.

    Rate this question:

  • 21. 

    What is contained in your e-mail application's Outbook folder?

    • A.

      Messages that are queued for sending

    • B.

      Messages that have been sent to you by others

    • C.

      Messages that have been marked for deletion

    • D.

      Messages that you have sent to others

    Correct Answer
    A. Messages that are queued for sending
  • 22. 

    What is the purpose of an e-mail autoresponder?

    • A.

      To send an automated respond to e-mail messages received while you are out of the office for a planned absence

    • B.

      TO automatically attach your signature information to the end of every e-mail message you send

    • C.

      To send an automated response to e-mail messages that your system is configured to discard as spam

    • D.

      To automatically attach your signature information to the end of every e-mail message you forward

    Correct Answer
    A. To send an automated respond to e-mail messages received while you are out of the office for a planned absence
  • 23. 

    What distinguishes S/MIME from MIME?

    • A.

      S/MIME controls the way attachments are organised and distinguished from one another, and it supports encryption; whereas MIME controls the way messages are organised and distinguished from one another, and it supports the user of digital certificates.

    • B.

      S/MIME is designed specifically for servers, whereas MIME is designed specifically for individual clients.

    • C.

      S/MIME controls the way that messages and attachments are organised and distinguished from one another, whereas MIME supports encryption and the user of digital certificates.

    • D.

      S/MIME supports encryption and the user of digital certificates, whereas MIME controls the way that messages and attachements are organised and distinguished from one another.

    Correct Answer
    D. S/MIME supports encryption and the user of digital certificates, whereas MIME controls the way that messages and attachements are organised and distinguished from one another.
    Explanation
    Multipurpose Internet Mail Extension (MIME) controls the way that messages and attachments are organised and distinguished from one another, whereas Secure MIME (S/MIME) controls the way that encryption information and digital certificates can be included as part of an e-mail message.

    Rate this question:

  • 24. 

    Because file attachments may contain malicious code that can be used to damage or infiltrate systems, your company routinely scans all file attachments in incoming e-mail. Where does attachment scanning take place?

    • A.

      At the server, just after the message has been received via POP3

    • B.

      At the client, usually just after the message has been received via SMTP

    • C.

      At the server, usually just after the message has been received via SMTP

    • D.

      At the client, usually just after the message has been received via POP3

    Correct Answer
    C. At the server, usually just after the message has been received via SMTP
  • 25. 

    Which of the following is a drawback of requiring SMTP authentication?

    • A.

      The SMTP server may be used illicitly to send unsolicited junk mail.

    • B.

      Chances are increased that a hacker can use a packet sniffer to obtain a valid user name and password.

    • C.

      Chances are increased that a hacker can use a packet sniffer to obtain a valid digital certificate from the session.

    • D.

      The SMTP server will not send e-mail messages that are not digitally signed

    Correct Answer
    B. Chances are increased that a hacker can use a packet sniffer to obtain a valid user name and password.
    Explanation
    SMTP is a plain text protocol which means that when it is not encrypted, passwords can be sent in plain text. This means that a password which is also used elsewhere may be 'sniffed' from the SMTP protocol and used to attack the network elsewhere, thus SMTP passwords are a vulnerability.

    Rate this question:

  • 26. 

    Which protocol do e-mail programs use to identify the file types of attached files?

    • A.

      SMTP

    • B.

      IMAP

    • C.

      POP3

    • D.

      MIME

    Correct Answer
    D. MIME
  • 27. 

    Why can it be advantageous to write e-mail folders to files on your computer's local disk?

    • A.

      Your e-mail will be more easily transportable from one computer to another.

    • B.

      You will be able to more easily ensure that your e-mail messages are virus-free.

    • C.

      Your e-mail will be more easily integrable with a personal information management (PIM) program.

    • D.

      You will be able to more easily filter out spam.

    Correct Answer
    A. Your e-mail will be more easily transportable from one computer to another.
  • 28. 

    You visit the Web site of a business from which you make online purchases and set up an account on your smartphone. The site requests your mobile phone in order to send you promotional text messages. What type of service does this scenario describe?

    • A.

      An opt-in e-mail marketing service

    • B.

      A listserve subscription service

    • C.

      A Virtual Network Computing (NVC) service

    • D.

      AN opt-in mass texting service

    Correct Answer
    A. An opt-in e-mail marketing service
    Explanation
    You use an opt-in e-mail marketing service when you consent to receiving e-mails regarding special promotions or other types of updates. Opt-in mass texting services are similar, but are used most often on mobile devices. The service is technicall a SMS used by phone carriers, not an Internet Service, but it serves the same purpose as mass e-mail.

    Rate this question:

  • 29. 

    Virtual Network Computing (VNC) is a program that allows you to control a computer at a remote location. VNC consists of which two components?  

    • A.

      The server and the viewer

    • B.

      The client and the viewer

    • C.

      The client and the server

    • D.

      The TCP/IP network and the P2P application

    Correct Answer
    A. The server and the viewer
    Explanation
    VNC consists of two components the server and the viewer. The server listens on a specific port (for example, TCP 5800 on Windows) and allows clients to connect The viewer

    Rate this question:

  • 30. 

    Which of the following is a P2P application that you can use to download huge files because it dramatically reduces the demands on networking hardware and bandwidth?

    • A.

      SSL/TLS-enabled FTP (FTPS)

    • B.

      Secure Copy (SCP)

    • C.

      BitTorrent

    • D.

      SSH File Transfer Protocol (S/FTP)

    Correct Answer
    C. BitTorrent
    Explanation
    BitTorrent is a P2P (peer-to-peer network on the Internet) application used for downloading huge files (more than a gigabyte) because it dramatically reduces the demands on networking hardware and bandwidth.

    Rate this question:

  • 31. 

    What is an anonymous FTP site?

    • A.

      An FTP site that requires a user name and password for access, but is not available to the public

    • B.

      An FTP site that requires a user name and a password for access, but is hosted anonymously

    • C.

      An FTP site that does not require authentication for access, but is not available to the public

    • D.

      An FTP site that does not require authentication for access, and is available to the public

    Correct Answer
    D. An FTP site that does not require authentication for access, and is available to the public
  • 32. 

    You want to receive e-mail messages, announcements and advertising on a regular basis about digital animation. Which action could you take to accomplish this?

    • A.

      Join a newsgroup about digital animation.

    • B.

      Subscribe to a listserve group about digital animation.

    • C.

      Set your browser's home page to digital animation Web site.

    • D.

      Bookmark a digital animation Web site on your favourite browser.

    Correct Answer
    B. Subscribe to a listserve group about digital animation.
    Explanation
    A list server is a server that automates the collection and distribution of messages from an authorised group of participants, allowing collaboration among multiple users. A group of users that subscribes to a mailing list is called a listserve group.

    Rate this question:

  • 33. 

    If you use a Web browser's built-in FTP client, which FTP command would you need to use to download a file from your company's FTP site?

    • A.

      "get" command

    • B.

      You would not need to use any FTP command

    • C.

      "put" command

    • D.

      "open" command

    Correct Answer
    B. You would not need to use any FTP command
    Explanation
    You would not need to use any FTP commands for any reason.

    Rate this question:

  • 34. 

    Companies increasingly want to allow employees to share files directly without having to maintain servers to provide FTP access. Which technology can companies use to maximise processing power while protecting privacy and sensitive materials?

    • A.

      SSH File Transfer Protocol (S/FTP)

    • B.

      Secure Copy

    • C.

      Peer-to-peer networks on the Internet (P2P)

    • D.

      SSL/TLS-enabled (FTPS)

    Correct Answer
    C. Peer-to-peer networks on the Internet (P2P)
    Explanation
    Corporations are beginning to consider P2P as a way for employees to share file directly, eliminating the cost and maintenance associated with a centralised server.

    Rate this question:

  • 35. 

    Two requirements are necessary to upload files to an FTP site. One requirement is gaining access to an FTP client program. What is the other requirement?

    • A.

      An encrypted authentication session

    • B.

      Permission to upload

    • C.

      Access to an anonymous FTP site

    • D.

      A valid user name and password

    Correct Answer
    B. Permission to upload
    Explanation
    It also requires permission, which is usually provided by the FTP server administrator.

    Rate this question:

  • 36. 

    You want to attend a training session remotely. The presenter has recommended an application for you to download that uses VoIP audio technology so you can interact with the presenter and the other participants. Which Web-based system does this scenario describe?

    • A.

      Web conference

    • B.

      Extranet

    • C.

      Webcast

    • D.

      Intranet

    Correct Answer
    A. Web conference
  • 37. 

    Using command-line FTP on a Windows system, how do you gain access to an FTP server?

    • A.

      Double-click the icon that represents the FTP server.

    • B.

      Enter the "get" command at the MS-DOS prompt.

    • C.

      Enter the "open" command at the MS-DOS prompt

    • D.

      Enter the "put" command at the MS-DOS prompt

    Correct Answer
    C. Enter the "open" command at the MS-DOS prompt
    Explanation
    You need to use the "open" command to access an FTP server, and you must use the "get" command to copy a file to your computer. The "put" command is used to upload a file from your system to the FTP server.

    Rate this question:

  • 38. 

    You send an e-mail message to a co-worker to help plan a surprise going-away party for a mutual friend before she embarks on a six-month around-the-world cruise. Which statement reflects your right to e-mail privacy?

    • A.

      You can send e-mail to anyone using company requirement and Internet connections without fear of reprisal as long as you include your immediate supervisor as a recipient.

    • B.

      Your supervisor has no right to read e-mail you send, even if you send it using company equipment and Internet connections.

    • C.

      Your supervisor has the right to read e-mail you send using company equipment and Internet connections.

    • D.

      You can send e-mail to anyone using company equipment and Internet connections without fear of reprisal as long as you include someone from the company as a recipient.

    Correct Answer
    C. Your supervisor has the right to read e-mail you send using company equipment and Internet connections.
    Explanation
    An employer has legal ownership of everything an employee creates while on the job, including personal messages. Your employer has the right to read e-mail you send using company equipment and Internet connections.

    Rate this question:

  • 39. 

    Which of the following statements is true about Voice over IP (VoIP)

    • A.

      VoIP is the primary means by which users communicate with contact centers.

    • B.

      VoIP is voice information delivered in digital form as packets of data using the public switched telephone network.

    • C.

      VoIP is voice information delivered in digital form as packets of data using Internet Protocol (IP).

    • D.

      VoIP is the primary means by which users communicate with call centers.

    Correct Answer
    C. VoIP is voice information delivered in digital form as packets of data using Internet Protocol (IP).
    Explanation
    VoIP is voice information delivered in digital form as packets of data using Internet Protocol (IP).

    Rate this question:

  • 40. 

    You make it a point to send e-mail messages, text messages and instant messages that are considered "safe for work." This is a good way to ensure that your messages:

    • A.

      Abide by the rules of netiquette.

    • B.

      Will not be constructed as sexual harassment.

    • C.

      Are compatible with unified communications technologies.

    • D.

      Will not be deleted by anti-virus software.

    Correct Answer
    B. Will not be constructed as sexual harassment.
    Explanation
    Sending threatening e-mail messages, text messages or instant messages is illegal, just as if the threats were made via telephone. Keep in mind that any messages you send, especially while at work or at school, should always be "safe for work" (SFW). SFW means that the content of your message can safely be viewed by anyone and does not contain any controversial, sexually explicit, profane or otherwise inappropriate content

    Rate this question:

  • 41. 

    When you sign in to your instant messaging (IM) service, your online status is advertised (or published) to the people on your contacts list. What does this scenario represent?

    • A.

      Convergence

    • B.

      Presencing

    • C.

      Unified Communication

    • D.

      Mobile computing

    Correct Answer
    B. Presencing
    Explanation
    Presence information is a status indicator that conveys a person's willingness and ability to engage in communication. For example, when a user signs in to an instant messaging (IM) service, his or her status (e.g. online) is advertised (or published) to the people on a contact list.

    Rate this question:

  • 42. 

    Which of the following is an example of ethical Internet behaviour?

    • A.

      Downloading and using shareware, which is free

    • B.

      Requesting personal information about others during an Internet chat session

    • C.

      Citing information you find on the Internet that you use in your own work

    • D.

      Downloading any songs and movies from the Internet

    Correct Answer
    C. Citing information you find on the Internet that you use in your own work
    Explanation
    Shareware is not free, you can download it for free and try it. Download songs and movies from the internet or peer-to-peer network without obtaining permission or paying a fee is an illegal use of copyrighted information. You should not ask other users to divulge personal information via these sessions.

    Rate this question:

  • 43. 

    As part of the IT department, you configure the employee workstations for your company. When configuring a user's system, you always set the browser security levels to the company standard settings. What is restricted from downloading to the user's system when you configure browser security levels?

    • A.

      Active content

    • B.

      Pop-up windows

    • C.

      Cookies

    • D.

      Pop-under windows

    Correct Answer
    A. Active content
    Explanation
    You can configure your browser for added security by controlling active content that is downloaded from a Web site and run locally on the client's browser.

    Rate this question:

  • 44. 

    How does a proxy server protect a corporate network from unwanted Internet activity?

    • A.

      A proxy server restricts users by requiring a user name and password for every transmission.

    • B.

      A proxy server runs only the corporate extranet.

    • C.

      A proxy server runs only the corporate intranet.

    • D.

      A proxy server replaces the network IP address with another, contingent address.

    Correct Answer
    D. A proxy server replaces the network IP address with another, contingent address.
    Explanation
    A proxy server replaces the network IP address with another, contingent address. This process effectively hides the actual IP address from the rest of the Internet, thereby protecting the entire network.

    Rate this question:

  • 45. 

    You work for your company's IT department diagnosing and servicing the employees's workstations. A user complains that since she has been conducting a lot of research online, performance is slowing. You increase the size of her browser cache. Why might performance slow if the browser cache is too small?

    • A.

      Because it will take longer to complete cache maintenance tasks when user quits the browser

    • B.

      Because a small catch size may slow other computer processes, such as disk defragmentation and virus

    • C.

      Because the browser must search through possibly tens of thousands of cached files to locate a specific page

    • D.

      Because the user may spend a lot of time waiting while pages download from the server

    Correct Answer
    D. Because the user may spend a lot of time waiting while pages download from the server
    Explanation
    If the browser cache is too small, the user will sacrifice performance because he or she will spend a lot of time waiting while pages download from the server.

    Rate this question:

  • 46. 

    Which TCP/IP troubleshooting command should you use to determine whether a client and server are communicating with each other?

    • A.

      Ipconfig command

    • B.

      Ping command

    • C.

      Ifconfig command

    • D.

      Tracert command

    Correct Answer
    B. Ping command
    Explanation
    Ping command can be used to ensure connectivity between two systems.

    Rate this question:

  • 47. 

    Which cookie type remains on your system after you end your browser session?

    • A.

      Third-party cookie

    • B.

      First-party cookie

    • C.

      Persistent cookie

    • D.

      Session cookie

    Correct Answer
    C. Persistent cookie
    Explanation
    A persistent cookie is stored as a file on your computer and remains there after you end your browser session.

    Rate this question:

  • 48. 

    A cookie is a text file that is placed on a Web site visitor's computer. Cookies allow a Web site manager to:

    • A.

      Customise the browser cache size on the site visitor's computer

    • B.

      Customise the frequency with which the site visitor's browser cache checks for newer pages.

    • C.

      Customise the site to the site visitor's Web browsing preferences

    • D.

      Customise the security options on the site visitor's browser.

    Correct Answer
    C. Customise the site to the site visitor's Web browsing preferences
    Explanation
    Cookies are small text files placed on Web site visitors' computers so Web site managers can customise their sites to their visitors' preferences.

    Rate this question:

  • 49. 

    Which statement best describes hash encryption?

    • A.

      An encryption method in which the same key is used to encrypt and decrypt a message

    • B.

      An encryption method in which a key is required to encrypt data for storage and verify its integrity

    • C.

      An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages

    • D.

      An encryption method in which two separate keys -- a private key and a public key -- are used to encrypt and decrypt a message

    Correct Answer
    C. An encryption method in which numbers generated by an algorithm from a text string are used to verify the integrity of transmitted messages
    Explanation
    Hash encryption (also called one-way encryption) is an encryption method in which hashes are used to verify the integrity of transmitted messages. A hash (also called a message digest) is a number generated by an algorithm from a string of text. The generated hash value is smaller than the text itself, and is generated in such a way that it is nearly impossible fro the same hash value to be generated from some other text.

    Rate this question:

  • 50. 

    Computer viruses can cause damage ranging from relatively minor to debilitating. You can protect your system against viruses by using commercial virus-detection software to find and defeat viruses. Because new viruses are created so rapidly, what must you do to ensure that your anti-virus software can protect you?

    • A.

      After you install the anti-virus software, scan your system everyday.

    • B.

      Install anti-virus program updates to keep the signature profiles current.

    • C.

      After you install the software, scan your system at least weekly.

    • D.

      Install at least two different anti-virus programs and alternate their use randomly.

    Correct Answer
    B. Install anti-virus program updates to keep the signature profiles current.
    Explanation
    To ensure that your anti-virus software can protect you, install program updates to the software to keep the signature profiles current.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • May 09, 2013
    Quiz Created by
    Philanderson888
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.