New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

1D0-510 Questions and Answers

Question # 6

Which of the following is required for a wireless network to run in infrastructure mode?

A.

A bridge

B.

A switch

C.

A wireless access point (WAP)

D.

Wireless Equivalency Privacy (WEP)

Full Access
Question # 7

The TCP/IP suite of protocols is the current universal standard for both local area networks and wide area networks. Which choice lists protocols that are included in the TCP/IP suite?

A.

TCP, IP and IPX

B.

TCP, IP and SPX

C.

TCP, IP and UDP

D.

TCP, IP and NWLINK

Full Access
Question # 8

Which technology could you use to add a pop-up dialog box to your Web site's home page?

A.

JavaScript

B.

Image map

C.

Document Object Model (DOM)

D.

Extensible Markup Language (XML)

Full Access
Question # 9

Chris and his Web development team are beginning a Web site project. What is the first step in this project?

A.

Create a site map.

B.

Submit the site URL to search engines.

C.

Develop markup code and test functionality.

D.

Document the site's purpose and intended audience.

Full Access
Question # 10

Which choice best defines Return On Investment (ROI)?

A.

Determining the cost of Web site development

B.

Determining the profit of a Web project relative to cost

C.

Determining the benefits of a Web site to its intended users

D.

Determining the IT department's costs in developing a project

Full Access
Question # 11

Brian is a systems administrator for his company. He performs many maintenance and troubleshooting tasks in a room that has multiple, redundant connections. This room is used to control the company's network resources. What is the term for this location?

A.

Local area network (LAN)

B.

Peer to-peer (P2P) network

C.

Network access point (NAP)

D.

Network operations center (NOC)

Full Access
Question # 12

Which of the following must you specify to uniquely identify each record in a database?

A.

Key word

B.

Primary key

C.

Common field

D.

One-to-one relationship

Full Access
Question # 13

Maria and her team are beginning to redesign a corporate Web site. The company owners want to keep the site's navigation icons at the top of each page, and enable linked pages to appear in another section of the same browser window. Which XHTML technique does Maria suggest?

A.

Pop-up JavaScript windows

B.

Frameset layout with upper and lower frames

C.

List elements <li> enclosed by <ol> container tags

D.

Navigation icons in the top row of a table page structure

Full Access
Question # 14

According to "netiquette" guidelines for effective and appropriate business communications, which practice should you avoid in your e-mail messages?

A.

Attaching documents

B.

Using a spelling checker

C.

Typing in all capital letters

D.

Including digital signatures

Full Access
Question # 15

A member of your Web team is gone on vacation. She made some changes to a Web page before leaving. You need information about the changes she made, but you cannot determine the changes without asking her. How can you resolve this problem in the future?

A.

Require team members to validate new code when making changes

B.

Require team members to update the Web site map before vacations

C.

Require team members to document changes with comment tags in code

D.

Require team members to provide evidence of efforts to ensure accessibility

Full Access
Question # 16

Susan is a freelance Web developer and needs to set up a home office. She currently has 10 customers and transfers approximately 20 megabytes (MB) of data per day. Which is the most efficient Internet connection for Susan's needs?

A.

T3 line

B.

Cable modem

C.

Ethernet cable

D.

Dial-up modem

Full Access
Question # 17

You received the following file attachments in e-mail messages from unknown sources. Which is the most likely to contain a computer virus?

A.

file.avi

B.

file.pdf

C.

file.exe

D.

file.wav

Full Access
Question # 18

Which protocol is used to receive e-mail on an incoming server, and allows you to browse and manage e-mail messages while they reside on the server, rather than downloading messages before reading them?

A.

Post Office Protocol (POP3)

B.

Simple Mail Transfer Protocol (SMTP)

C.

Internet Message Access Protocol (IMAP4)

D.

Transmission Control Protocol/Internet Protocol (TCP/IP)

Full Access
Question # 19

Which choice lists the elements that are necessary for a CGI session?

A.

Web browser, Web form, SSJS and database

B.

SSJS, CGI script, Web browser and database

C.

Web form, database, Web browser and Web server

D.

Web browser, CGI script, Web form and Web server

Full Access
Question # 20

Maria and her team are beginning to redesign a corporate Web site. The company owners want to keep the site's navigation icons at the top of each page, and enable linked pages to appear in another section of the same browser window. Which XHTML technique does Maria suggest?

A.

Pop-up JavaScript windows

B.

Frameset layout with upper and lower frames

C.

List elements <li> enclosed by <ol> container tags

D.

Navigation icons in the top row of a table page structure

Full Access
Question # 21

As an IT professional, you must always consider the Return on Investment (ROI) impact that IT projects have on your organization. You may be required to justify a project's benefits relative to its cost. What must you do to relate such information about IT projects to upper managers?

A.

Explain decisions in purely technical terms to ensure that the issues are properly understood.

B.

Make decisions without input from management so as not to confuse the managers or stakeholders.

C.

Consult only managers who have technical experience so that the project benefits will be fully understood.

D.

Put the information in terms that your managers can understand so that they can make informed decisions.

Full Access
Question # 22

Perl, .Net and PHP are all examples of:

A.

database technologies.

B.

client-side scripting technologies.

C.

server-side scripting technologies.

D.

application programming interfaces.

Full Access
Question # 23

You have been asked to determine the download time for pages on your site. One page consists of the XHTML document, several image files, and a Flash presentation. These elements equal 84 kilobytes (KB) total. How long will it take for this page to be downloaded by a user with an Internet connection speed of 33.6 kilobits per second (Kbps)?

A.

Approximately 5 seconds

B.

Approximately 15 seconds

C.

Approximately 20 seconds

D.

Approximately 55 seconds

Full Access
Question # 24

Which type of encryption uses a pair of keys, in which one key is used to encrypt information and the other key is used to decrypt that information?

A.

Hash encryption

B.

One-way encryption

C.

Symmetric encryption

D.

Asymmetric encryption

Full Access
Question # 25

Which user-configured security measure reduces unauthorized access on unattended workstations?

A.

Desktop firewall

B.

Digital certificates

C.

Strict browser safety levels

D.

Password-protected screen saver

Full Access