CoolInterview.com - World's Largest Collection of Interview Questions & Answers, FAQs, queries, sample papers, exam papers, dumps, what, why, how, where, when questions OneStopTesting.com - Testing EBooks, Tutorials, Articles, Jobs, Training Institutes etc.
OneStopGate.com - Gate EBooks, Tutorials, Articles, FAQs, Jobs, Training Institutes etc.
OneStopMBA.com - MBA EBooks, Tutorials, Articles, FAQs, Jobs, Training Institutes etc.
OneStopIAS.com - IAS EBooks, Tutorials, Articles, FAQs, Jobs, Training Institutes etc.
OneStopSAP.com - SAP EBooks, Tutorials, Articles, FAQs, Jobs, Training Institutes etc.
OneStopGRE.com - of GRE EBooks, Tutorials, Articles, FAQs, Jobs, Training Institutes etc.

Sponsored Links

Interview Questions
Our Services



INTERVIEW QUESTIONS CERTIFICATION EXAMS CIW CERTIFICATION EXAMS DETAILS
Question :

Which protocol is used to transmit files across the Web to be rendered by a
Web browser?
A. Internet Protocol (IP)
B. Hypertext Transfer Protocol (HTTP)
C. Transmission Control Protocol (TCP)
D. Point-to-Point Tunneling Protocol (PPTP)


Category CIW Certification Exams Interview Questions
Rating (3.2) By 5 users
Added on 7/30/2015
Views 35
Rate it!


Answers:

Source: CoolInterview.com

B. Hypertext Transfer Protocol (HTTP)
Source: CoolInterview.com




If you have the better answer, then send it to us. We will display your answer after the approval.
Rules to Post Answers in CoolInterview.com:-
  • There should not be any Spelling Mistakes.
  • There should not be any Gramatical Errors.
  • Answers must not contain any bad words.
  • Answers should not be the repeat of same answer, already approved.
  • Answer should be complete in itself.
Name :*
Email Id :*
Answer :*
Verification Code Code Image - Please contact webmaster if you have problems seeing this image code Not readable? Load New Code
Process Verification Enter the above shown code: *
Inform me about updated answers to this question

Related Questions
View Answer
Mike is able to check his Web-based e-mail using his cell phone. Which
protocol allows his cell phone to connect to the Internet?
A. Post Office Protocol (POP3)
B. Wireless Access Point (WAP)
C. Wireless Application Protocol (WAP)
D. Multipurpose Internet Mail Extensions (MIME)
View Answer
What is a cookie?
A. An image file that expands to fill a browser's cache.
B. A virus placed on a computer by spyware to delete directories.
C. A file created by the browser each time its user accesses a Web site.
D. A text file placed on a client by a Web server to track user preferences.
View Answer
Your supervisor directs you to make static IP address assignments on the
workstations in your office. Your workstations are part of a company WAN that also connects directly to
the Internet. What information must you have in order to complete this assignment?
A. An IP address for each workstation and the subnet mask
B. An IP address to be shared by all workstations and the subnet mask
C. An IP address for each workstation, the default gateway address and the subnet mask
D. An IP address to be shared by all workstations, the default gateway address and the subnet mask
View Answer
Which of the following is a contract used in project management that
outlines the requirements for each project task to ensure that the project objectives are met?
A. Project triangle
B. Organizational chart
C. Statement of work (SOW)
D. Return on Investment (ROI)
View Answer
Mike wants to download the Macromedia Flash MX 2004 viewer software
to his desktop. Which Internet protocol will he use?
A. FTP
B. SSH
C. TCP
D. SMTP
View Answer
Which of the following is the most efficient method for documenting and
communicating a Web site plan?
A. Photocopying and faxing sketches
B. Sending a presentation slideshow via e-mail
C. Describing the plan orally on stakeholders' voicemail
D. Posting a large diagram on the wall in a busy office hallway
View Answer
Which term describes a server at the highest level of the Domain Name
System (DNS)?
A. Master
B. Primary
C. Top level
D. Root level
View Answer
Q: 19 As an IT professional, you must always consider the Return on Investment
(ROI) impact that IT projects have on your organization. You may be required to justify a project's
benefits relative to its cost. What must you do to relate such information about IT projects to upper
managers?
A. Explain decisions in purely technical terms to ensure that the issues are properly understood.
B. Make decisions without input from management so as not to confuse the managers or stakeholders.
C. Consult only managers who have technical experience so that the project benefits will be fully understood.
D. Put the information in terms that your managers can understand so that they can make informed decisions.

View Answer
Your company is outsourcing some content development tasks. The
contractors who work on these projects will see some of your company's proprietary content before it is
available to customers. Your company needs to ensure that this trade-secret content is kept confidential
by the contractors who see it. Which of the following protects your intellectual property in this situation?
A. Copyright
B. Trademark
C. License agreement
D. Non-disclosure agreement
View Answer
Which protocol is most likely to be used when sending e-mail using the
Microsoft Outlook Express client?
A. IMAP
B. HTTP
C. SMTP
D. POP3
View Answer
You need to register a domain name for the Web sites that will promote
your company's new product in international markets. You decide to register several top-level domains,
such as .ca, .au and .ae, in addition to the commonly used .com domain. Why would you do this?
A. To appeal to the national identities of your customers
B. To make it easier for search engines to find your Web site
C. To ensure that you can sell your product legally in various countries
D. To ensure that customers remember the spelling of your product name
View Answer
When creating its Web presence, a business should choose its domain name
carefully so that users will be able to recall it easily. Every domain name is unique. With which of the
following must each domain name be registered?
A. DNS
B. W3C
C. FQDN
D. ICANN
View Answer
Lars has difficulty when he tries to access some Web pages. He suspects that
his browser has a problem or a bug. Which of the following should he consider downloading?
A. A patch
B. A firewall
C. A pop-up blocker
D. An anti-virus program
View Answer
Which of the following IP addresses is invalid?
A. 224.199.23.3
B. 24.256.54.255
C. 177.138.23.89
D. 182.255.254.115
View Answer
Which of the following is the most popular protocol that provides
authentication and encryption for secure exchanges over the Internet?
A. Secure Sockets Layer (SSL)
B. Public Key Infrastructure (PKI)
C. Electronic Data Interchange (EDI)
D. Secure Electronic Transactions (SET)
View Answer
Which choice lists the three image file formats that are universally
supported by modern Web browsers?
A. BMP, TIFF and GIF
B. PNG, GIF and BMP
C. GIF, JPEG and BMP
D. GIF, JPEG and PNG
View Answer
Which of the following is required for a wireless network to run in
infrastructure mode?
A. A bridge
B. A switch
C. A wireless access point (WAP)
D. Wireless Equivalency Privacy (WEP)
View Answer
In the client/server model, a client can access information from any server if:
A. both the client and server understand the protocol.
B. both the client and the LAN understand the protocol.
C. both the LAN and the WAN understand the protocol.
D. both the server and the LAN understand the protocol.
View Answer
Which of the following accurately describes a difference between GIF images
and JPEG images?
A. GIF images support the transparency technique, whereas JPEG images do not.
B. GIF images support millions of colors, whereas JPEG images support only 256 colors.
C. JPEG images use vector graphics, whereas GIF images use bitmap or raster graphics.
D. JPEG images support interlacing and animation techniques, whereas GIF images do not.
View Answer
Which type of encryption uses a pair of keys, in which one key is used to
encrypt information and the other key is used to decrypt that information?
A. Hash encryption
B. One-way encryption
C. Symmetric encryption
D. Asymmetric encryption
View Answer

Please Note: We keep on updating better answers to this site. In case you are looking for Jobs, Pls Click Here Vyoms.com - Best Freshers & Experienced Jobs Website.

View ALL CIW Certification Exams Interview Questions & Answers



User Options
India News Network

Latest 20 Questions
What is an execution plan? When would you use it?
What is BCP? When does it used?
What are the advantages of using Stored Procedures?
What is a Scheduled Jobs or What is a Scheduled Tasks?
What is NOT NULL Constraint?
What is CHECK Constraint?
What is FOREIGN KEY?
What is UNIQUE KEY constraint?
What is PRIMARY KEY?
What is the difference between a Local and a Global temporary table?
Name 3 ways to get an accurate count of the number of records in a table?
What is Log Shipping?
What is SQL Server Agent?
Which command using Query Analyzer will give you the version of SQL server and operating system?
What are the authentication modes in SQL Server? How can it be changed?
What is SQL Profiler?
What are the properties and different Types of Sub-Queries?
What is the difference between a HAVING CLAUSE and a WHERE CLAUSE?
When is the use of UPDATE_STATISTICS command?
What is difference between DELETE and TRUNCATE commands?



Fresher Jobs | Experienced Jobs | Government Jobs | Walkin Jobs | Company Profiles | Interview Questions | Placement Papers | Companies In India | Consultants In India | Colleges In India | Exams In India | Latest Results | Notifications In India | Call Centers In India | Training Institutes In India | Job Communities In India | Courses In India | Jobs by Keyskills | Jobs by Functional Areas

Testing Articles | Testing Books | Testing Certifications | Testing FAQs | Testing Downloads | Testing Interview Questions | Testing Jobs | Testing Training Institutes

Gate Articles | Gate Books | Gate Colleges | Gate Downloads | Gate Faqs | Gate Jobs | Gate News | Gate Sample Papers | Gate Training Institutes

MBA Articles | MBA Books | MBA Case Studies | MBA Business Schools | MBA Current Affairs | MBA Downloads | MBA Events | MBA Notifications | MBA FAQs | MBA Jobs
MBA Job Consultants | MBA News | MBA Results | MBA Courses | MBA Sample Papers | MBA Interview Questions | MBA Training Institutes

GRE Articles | GRE Books | GRE Colleges | GRE Downloads | GRE Events | GRE FAQs | GRE News | GRE Training Institutes | GRE Sample Papers

IAS Articles | IAS Books | IAS Current Affairs | IAS Downloads | IAS Events | IAS FAQs | IAS News | IAS Notifications | IAS UPSC Jobs | IAS Previous Question Papers
IAS Results | IAS Sample Papers | IAS Interview Questions | IAS Training Institutes | IAS Toppers Interview

SAP Articles | SAP Books | SAP Certifications | SAP Companies | SAP Study Materials | SAP Events | SAP FAQs | SAP Jobs | SAP Job Consultants
SAP Links | SAP News | SAP Sample Papers | SAP Interview Questions | SAP Training Institutes |




Copyright ©2003-2016 CoolInterview.com, All Rights Reserved.
Privacy Policy | Terms and Conditions



Cache = 0.796875 Seconds