Practice Ibf Section Of CIW Test Part I

63 Questions

Settings
CIW Quizzes & Trivia

Here is a super awesome quiz to hopefully ensure you to success on the IBF part of the CIW test


Questions and Answers
  • 1. 
    What does DNS stand for?
  • 2. 
    What is the name of a server at the highest level of a domain?
    • A. 

      IRC server

    • B. 

      Root-level server

    • C. 

      Application server

    • D. 

      FTP server

  • 3. 
    What protocol do PDA use?
    • A. 

      PIM

    • B. 

      IP

    • C. 

      WAP

    • D. 

      HTTP

  • 4. 
    What type of file used by the gunzip application?
    • A. 

      .docx

    • B. 

      .xls

    • C. 

      .png

    • D. 

      .tgz

  • 5. 
    PIM is used for
    • A. 

      Text-based web browsing

    • B. 

      Supporting PDA synchronization to a computer

    • C. 

      Distributing IP addresses

    • D. 

      Accessing servers

  • 6. 
    This provides for digital certificates and data encryption
    • A. 

      SSL

    • B. 

      IMAP

    • C. 

      DNS

    • D. 

      FTP

  • 7. 
    MTA is responsible for routing, delivering, and receiving messages
    • A. 

      True

    • B. 

      False

  • 8. 
    Incoming mail servers use SMTP
    • A. 

      True

    • B. 

      False

  • 9. 
    MDA (mail delivery agent)
    • A. 

      Forces you to download messages

    • B. 

      Receives sent messages and places them in the right destination mailbox

    • C. 

      Is used by servers to secure exchanges

    • D. 

      Provides foundational naming services

  • 10. 
    What provides foundational naming services?
  • 11. 
    What type of language do PDAs use?
  • 12. 
    What protocol does the incoming mail server use?
    • A. 

      POP

    • B. 

      IMAP

    • C. 

      SMTP

    • D. 

      MTA

  • 13. 
    What keeps others from gaining unauthorized access to an unattended workstation?
    • A. 

      VoIP

    • B. 

      Cookies

    • C. 

      Password protected screensaver

    • D. 

      ROI

  • 14. 
    Changes in project scope tend to occur when? 
    • A. 

      At the beginning of the process

    • B. 

      Gradually in small increments

    • C. 

      Quickly

    • D. 

      When projects follow the schedule as planned

  • 15. 
    Which of the following situations provide an example of privacy concern
    • A. 

      Full access is granted into a database

    • B. 

      Worms attack a computer's hard drive

    • C. 

      A competing business hacks into its competition network files

    • D. 

      A company audits its employees' hard drives

  • 16. 
    When can a client access information from any server?
    • A. 

      When both the client and server use the same protocol

    • B. 

      The DNS allows it

    • C. 

      Internet connection is available

    • D. 

      The information is encrypted within the server

  • 17. 
    Which protocols are used in network and internet communication?
    • A. 

      IPv3

    • B. 

      IPv4

    • C. 

      IPv5

    • D. 

      IPv6

  • 18. 
    What are characteristics of IPv4?
    • A. 

      4 sets of numbers

    • B. 

      Most efficient internet protocol

    • C. 

      Dotted quad

    • D. 

      Uses decimals

    • E. 

      Uses colons

  • 19. 
    What are characteristics of IPv6?
    • A. 

      Dotted quad

    • B. 

      Supports 4 trillion addresses

    • C. 

      Uses decimals

    • D. 

      Uses colons

    • E. 

      Hexadecimal numbering

    • F. 

      Addresses IP shortages

  • 20. 
    The FQDN is the complete domain name of an internet computer and provides enough information to convert the domain name to an IP address.
    • A. 

      True

    • B. 

      False

  • 21. 
    A registered company domain name must be approved by
    • A. 

      VoIP

    • B. 

      ICANN

    • C. 

      HTTP

    • D. 

      MDA

  • 22. 
    What is included in a DNS?
    • A. 

      Top-level domain

    • B. 

      Server name

    • C. 

      Registered company domain name

    • D. 

      Host name

    • E. 

      Domain category

  • 23. 
    Which of the following is an example of a domain category? 
    • A. 

      Www.

    • B. 

      Http://

    • C. 

      .edu

  • 24. 
    What protocol allows a cell phone to connect to the internet?
    • A. 

      SSH

    • B. 

      VoIP

    • C. 

      ICANN

    • D. 

      FQDN

  • 25. 
    This allows you to make voice calls using a broadband internet connection instead of a analog phone line
  • 26. 
  • 27. 
    What are the basic elements of authorship?
  • 28. 
    What protocol is used to transmit files across the internet?
  • 29. 
    Which type of file is most likely to contain a virus?
    • A. 

      .exe

    • B. 

      .tiff

    • C. 

      .tgp

    • D. 

      .tgz

  • 30. 
    The Static Index/Site Map method of search enables users to 
    • A. 

      Upload files

    • B. 

      Manually search information portals

    • C. 

      Locate indexed information through a directory tree

    • D. 

      Analyse a website layout

  • 31. 
    What refers to programs or files whose specific intent is to harm computer systems? examples are viruses, worms, and Trojans
  • 32. 
    What is the purpose of a command line prompt in windows?
    • A. 

      To destroy malware

    • B. 

      To direct requests

    • C. 

      To change default settings

    • D. 

      To organize files

  • 33. 
    What does the command "open" do?
    • A. 

      Open the most recently used application

    • B. 

      Display internet connections

    • C. 

      Open a new window in a browser

    • D. 

      Provide access to the ftp server

  • 34. 
    What does the command "get" do?
    • A. 

      Show internet connection

    • B. 

      Retrieve data

    • C. 

      Allow you to go a get a file/copy it to your computer

    • D. 

      Get access to the hard drive

  • 35. 
    What does the command "put" do?
    • A. 

      Allows you to upload files from your computer

    • B. 

      Allows you to place files into the recycle bin

    • C. 

      Allows you to access the ftp server

    • D. 

      Allows you to places files into separate folders

  • 36. 
    Any third party who distributes information about you is considered a 
    • A. 

      Privacy party

    • B. 

      Privacy issue

    • C. 

      Privacy distributor

    • D. 

      Privacy authorizer

  • 37. 
    Which protocol allows you to gain secure access to a remote computer and execute commands to administer the system?
    • A. 

      SSH

    • B. 

      MDA

    • C. 

      SSL

    • D. 

      POP3

  • 38. 
    What can prevent vital features of a website from displaying?
    • A. 

      PIM

    • B. 

      Connection speed

    • C. 

      Pop-up blockers

    • D. 

      IMAP

  • 39. 
    What is absolutely necessary for an internet connection to take place?
    • A. 

      TCP/IP

    • B. 

      SOW

    • C. 

      POP

    • D. 

      WAP

  • 40. 
    What is the currently used protocol called, also known as the dotted quad?
  • 41. 
    What is the total capacity that can be carried on a network? (also called traffic)
    • A. 

      Patch

    • B. 

      ICP

    • C. 

      Bandwidth

    • D. 

      The SQL

  • 42. 
    What changes IP addresses into easily recognizable text-based names?
    • A. 

      DNS systems

    • B. 

      Url translators

    • C. 

      Patches

    • D. 

      SMTP

  • 43. 
    Network administrators must consider ______ when conducting business internationally, because they are different in various countries
    • A. 

      HTTP

    • B. 

      IP addresses

    • C. 

      Operating systems

    • D. 

      Encryption laws

  • 44. 
    What are the phases of project management?
    • A. 

      Initiating

    • B. 

      Planning

    • C. 

      Executing and controlling

    • D. 

      Closing

  • 45. 
    What is a cookie?
    • A. 

      An internal network designed to provide access to selected external users

    • B. 

      A file of programing code to fix a known problem of bug

    • C. 

      A text fie that resides in either a hard drive or the memory and contains information sent between a server and a client to help maintain and track user activities

    • D. 

      Any file or collection of software tools that resolves system liabilities and improves software performance

  • 46. 
    What is an internal network accessible to only the users within a company
    • A. 

      Intranet

    • B. 

      Extranet

    • C. 

      Internet

    • D. 

      Supernet

  • 47. 
    What is the internet standard protocol for transferring email messages from one computer to another?
    • A. 

      WAP

    • B. 

      MTA

    • C. 

      MDA

    • D. 

      SMTP

  • 48. 
    What are the protocols used to send and receive email?
    • A. 

      DNS

    • B. 

      Email protocols

    • C. 

      TCP

    • D. 

      Application protocols

  • 49. 
    To send and receive email, SMTP and POP3 or IMAP are not needed
    • A. 

      True

    • B. 

      False

  • 50. 
    Check all statements that are true about spyware
    • A. 

      Software application

    • B. 

      Conspicuously placed on a user's system

    • C. 

      Gathers information and relays it outside parties usually for advertising parties

    • D. 

      Can be placed on a system by a virus

    • E. 

      Cannot be placed on a system from an application downloaded from the internet

  • 51. 
    What is an internal network designed to provide access to selected external users?
  • 52. 
    What is a file of programming code to fix a known problem or bug?
  • 53. 
    What is any file or collection of software tools that resolves system liabilities and improves software performance?
    • A. 

      Update

    • B. 

      Cookie

    • C. 

      Bandwidth

    • D. 

      Scope

  • 54. 
    What is a sequence of tasks that must be accomplished within a defined frame in order to achieve a desired result?
    • A. 

      Table

    • B. 

      Scope creep

    • C. 

      Task

    • D. 

      Project

  • 55. 
    What is a unit of work that must be finished during the project?
  • 56. 
    What is a person, department, or device needed for a task?
    • A. 

      SOW

    • B. 

      Application

    • C. 

      Resource

    • D. 

      Table

  • 57. 
    What is the end product or ultimate goal of a project, along with the tasks required to achieve that goal?
  • 58. 
    What is a list of the planned dates for performing tasks and meeting goals identified in the project plan
    • A. 

      Project schedule

    • B. 

      Project scope

    • C. 

      Project resources

    • D. 

      Project table

  • 59. 
    The project manager, project team, sponsors, and customers are all
    • A. 

      Resources

    • B. 

      Project analysts

    • C. 

      Primaries

    • D. 

      Stakeholders

  • 60. 
    What is the profit earned as a result of a project, relative to the amount spent?
  • 61. 
    What is a process used to identify the problems or needs that the project must resolve or address?
  • 62. 
    What is an outline that lists the requirements for each tast to make sure the objectives are met?
    • A. 

      Project schedule

    • B. 

      SOW

    • C. 

      Task

    • D. 

      Project scope

  • 63. 
    A  project schedule is a chart of the project tasks and task durations
    • A. 

      True

    • B. 

      False