Foundations

Published on February 2017 | Categories: Documents | Downloads: 52 | Comments: 0 | Views: 332
of 123
Download PDF   Embed   Report

Comments

Content

 

 

CIW Foundations (1D0-510)

CI W F ound unda ati tio ons (1 (1D0 D0--510)  Copyright © 2007 by PrepLogic, Inc. Product ID: 010656 Production Date: February 1, 2006 Number of Questions: 25

All rights reserved. No part of this document shall be stored in a retrieval system or transmitted by any means, electronic, mechanical, photocopying, recording, or otherwise, without written permission from the publisher. No patent liability is assumed with respect to the use of the information contained herein.

Warning and Disclaimer Every effort been made makeisthis document complete as accurate as possible, but has no warranty or to fitness implied. The as publisher andand authors assume no responsibility for errors or omissions. The information provided is on an "as is" basis. The authors and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages arising from the information contained in this document.

V olum olume e, Cor C orpo porr ate, and Educ E ducationa ationall Sal Sales PrepLogic offers favorable discounts on all products when ordered in quantity. For more information, please contact PrepLogic directly:

1-800-418-6789 [email protected] 

 

 

CIW Foundations (1D0-510)

 Abstract This Mega Guide is intended to help a candidate prepare for, and pass, the CIW Foundations exam (number 1D0-510). Passing this multiple-choice exam is all that is required to become certified at the CIW Associate level, and is a requirement for all upper-level certifications from CIW (CIW Professional, Master CIW Designer, Master CIW Administrator, Master CIW Web Site Manager, or Master CIW Enterprise Developer).

What to Know The CIW Foundations exam (1D0-510) is intended to demonstrate the test-takers ability to function as an entry-level information technology professional. The exam covers much more more information that simply the creation of Web pages. It is important for someone preparing for the exam to be aware of the objectives of the exam and be prepared to answer questions about network hardware, project management, TCP/IP protocols, design concepts, government regulations, and a wide variety of topics specific to the creation of Web sites. The CIW Foundations exam is also the prerequisite to take other CIW exams that cover a broad spectrum of information technology fields such server administration, programming, security, as well as Web design and as such the topics covered by the CIW Foundations exam are quite varied.

Tips The exam is a collection of topics from three different categories: Internet Business Foundations, Site Development Foundations, and Network Technology Foundations. There is some overlap between the topics within these three categories which can serve to reinforce your understanding of a topic from several points of view. Your preparation for the Site Development Foundations portion of the exam will be aided by additional time spent practicing the objectives for that portion of the exam. All that is needed is notepad (or your favorite text editor) and a Web browser to practice the topics in the Site Development Foundations.

 

 

CIW Foundations (1D0-510)

Table of Contents Abstractt....................................................................................................... Abstrac ................................................... ........................................................................................................ .................................................... 2   What to Know...................................................................................................... ................................................ ................................................................................................. ........................................... 2  Tips .................................................................................................... ............................................... ............................................................................................................ ............................................................. ...... 2 

 –    Domain Dom ain 1: I nte nterrne nett B Busine usiness ss Foundations  35% .............................................. ....................................................................................... ......................................... 10 10 1.1. Identify job roles in the Information Technology (IT) industry, including the responsibilities, tasks and skills they require.......................................................................................... ................................................ ......................................... 10 

IT industry job roles................................................................................................................................................ 10 

1.2. Identify the infrastructure required to access the Internet, including hardware and software components. components. ...................................................................................... ............................... ............................................................................. ...................... 12 12  Client and Server .................................................................................................................................................... 13  Hist Hi story ory of the the Int Inte ernet.................................. ................................................... ................................... ................................... ................................... .................................... ................................... ................... .. 13  I nt nte ernet in infrastruc frastructu ture re ............................................. .............................................................. .................................. ................................... .................................... ................................... ......................... ........ 14  Conne Con necti ction devices .................................................. ................................................................... ................................... ................................... ................................... ................................... ......................... ........ 14 

1.3. Define important Internet communications protocols and their roles in delivering basic Internet services. ................................................................................................... ................................................. .................................................. 16  Rem Re mote ote ac acce cessprotoco protocols ls.................................... ..................................................... ................................... ................................... ................................... .................................... ............................... ............. 16  I nt nte ernet service p proto rotoco colls ............................................. ............................................................... ................................... ................................... .................................... ................................... ................... .. 16 

1.4. Identify the basic principles of the Domain Name System (DNS). ................................................ ...................................................... ...... 17  Domain Name Syste stem(DNS)............................. .............................................. ................................... ................................... ................................... .................................... ............................... ............. 17  I nt nte ernet do dom main na nam ming.................................. ................................................... ................................... ................................... ................................... .................................... .................................. ................ 17  Hie Hi erarchical DNS naming stru struct ctu ure................................... ..................................................... ................................... ................................... ................................... ............................... .............. 17  Domain na nam me server ....................................... ........................................................ ................................... ................................... ................................... .................................... .................................. ................ 18  Shared ared dom domains .................................. .................................................... ................................... ................................... ................................... ................................... ................................... ............................ ........... 18 

1.5. Identify the functions of Web browsers, and use them to access the World Wide Web and other computer resources.................................................................................... ................................................... ................................ 18  Uniform Reso sou urce Ide Identifie tifiers (URL (URLs) s)................ ................................. ................................... ................................... ................................... ................................... ............................... .............. 18  Securi curin ng I nternet com communication nications s .................................. .................................................... ................................... ................................... ................................... .................................. ................. 19  Use a Web browse browser to dow download nload fil files ................................... ..................................................... ................................... ................................... ................................... ............................ ........... 19  I nt ntran rane et, extrane tranet, I nternet................................. .................................................. ................................... ................................... ................................... .................................... ............................... ............. 19  Browse Brow ser plug-i plug-ins ns................................. ................................................... ................................... ................................... ................................... ................................... ................................... ............................ ........... 20 

1.6. Use e-mail clients to send simple messages and files to other Internet Internet users. ...................................... ......................... ............. 20   Types of Email ... ...... ...... ..... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... .... 20 

 

 

CIW Foundations (1D0-510) Sending and and Rece Receiving Email ................. .................................. .................................. .................................. ................................... .................................... .................................... ......................... ....... 20  EE-m mail signat signature ures................................... ..................................................... ................................... ................................... ................................... ................................... ................................... ......................... ........ 21  EE-m mail at atta tach chm ments nts................................... .................................................... ................................... .................................... ................................... ................................... ................................... ...................... ..... 21  EE-m mail for Business................................... .................................................... ................................... .................................... ................................... ................................... ................................... ...................... ..... 21  EE-m mail I ssues................................. ................................................... ................................... ................................... ................................... ................................... ................................... .................................. ................. 22 

1.7. Define and use additional networking networking and Internet Internet services. ................................................... ................................................................ ............. 22 22  1.8. Demonstrate Demonstrate ways to communicate communicate effectively using Internet technology. technology. .......................................... 25  1.9. Identify and configure user customization features in Web browsers, including:: preferences, including preferences, caching, cookies. ..................................................................................................... ................................................... .................................................. 26  Security ................................................................................................................................................................... 27   Tro  Tr ouble les shootin ing g connection ion pro rob blem lems.... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... .... 28 

1.10. Identify security issues related to Internet clients (e.g., Web browsers, e-mail, instant messaging) in the workplace, including: certificates, malware, illicit servers and viruses. ............................................................................................................................. .................................................................................... ......................................... 29  Auth Au the enticati tication................. .................................. ................................... ................................... ................................... ................................... ................................... ................................... ............................... .............. 29  Encryption .............................................................................................................................................................. 29  Firewall .................................................................................................................................................................. 30  Malw Mal ware................................... .................................................... .................................. ................................... ................................... ................................... .................................... ................................... ...................... ..... 30  Protection ............................................................................................................................................................... 31 

1.11. Use different types t ypes of Web search engines effectively. effectively. ...................................................................... ................................................ ...................... 31 31  Pop opular ular Searche arches................................... ..................................................... ................................... ................................... ................................... ................................... ................................... ......................... ........ 32  Boolean operators .................................................................................................................................................. 33  Search Strat Strate egies gies ................................... ..................................................... ................................... ................................... ................................... ................................... ................................... ......................... ........ 33 

1.12. Identify and use principles of Personal Information Management (PIM), including:: common applications............................................................................................................ including ....................................................... .......................................................... ...... 34  Wireless reless App Appli lica cation tion Prot Protoc ocol ol (W (WAP) AP) ............................................... ................................................................ ................................... ................................... .................................. ................. 34 

1.13. Efficiently transmit text and binary files using popular Internet services. .......................................... 34  1.14. Identify security-related security-related ethical and legal issues faced by IT professionals. professionals. ...................................... ................................ ...... 35  Privacy Issues ......................................................................................................................................................... 35  Copyright Issues ..................................................................................................................................................... 35  Other Issues ............................................................................................................................................................ 35 

1.15. Relate project management concepts and terms to the IT profession. ................................................ 36  Proje roject Manage Management Ski Skills ll s................................... .................................................... ................................... ................................... ................................... .................................... ............................ .......... 36 

 

 

CIW Foundations (1D0-510) Proje roject Man M anag age ement Pha has ses .......................... ........................................... ................................... ................................... ................................... .................................... .................................. ................ 37 

1.16. Recognize Recognize essential database concepts. ............................................................................................... ...................................................... ......................................... 38  Datab Data bas ase e Termino nollog ogy y................................. .................................................. ................................... ................................... ................................... .................................... ................................... ................... .. 38  Rellat Re atiion onal al Datab Databas ase es................................... .................................................... ................................... ................................... ................................... .................................... ................................... ................... .. 39  Relationships .......................................................................................................................................................... 40  Connecting Databases to Internet Servers ............................................................................................................. 40  Domain 2: Site Development Foundations –  35% .............................................. ....................................................................................... ......................................... 41 41 

2.1. Demonstrate knowledge knowledge required to create a Web page. ................................................................ ...................................................................... ...... 41  Hist Hi story ory of markup arkup langua languag ges................................... .................................................... .................................. ................................... .................................... .................................... ......................... ....... 41  Versions of HTML .................................................................................................................................................. 41  HTML......................................................................................................................................................................

42 

Docum Docu ment Structu tructure re Tags Tags .................................. ................................................... ................................... ................................... ................................... .................................... ............................... ............. 42  Docum Docu ment T Ty ype Declaration Declaration (DTD) ................................... ..................................................... ................................... ................................... ................................... ............................... .............. 43   Text and para rag gra rap ph formattin ing g tags.... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ....... ..... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... .... 43  List sts s.................................... ...................................................... ................................... .................................. ................................... ................................... ................................... .................................... ............................ .......... 44  Hyperlink Tags ....................................................................................................................................................... 44  I nt nte ernal Hype Hyperl rliinks (Bookm (Bookmarks) arks) ...................... ....................................... ................................... ................................... ................................... ................................... ............................... .............. 45  HTML HTM L tab tablles................................. ................................................... ................................... ................................... ................................... ................................... ................................... .................................. ................. 46  Comment Tags Tags................................. ................................................... ................................... ................................... ................................... ................................... ................................... ............................... .............. 47  Docum Docu ment Obj Object Model ...................... ....................................... .................................. ................................... ................................... ................................... .................................... ............................ .......... 47 

2.2. Add images and graphical formatting to HTML files. .................................................................... .......................................................................... ...... 47  Adding Ad dingim i mag age es to Web pa pag ges................................................. ................................................................... ................................... ................................... .................................... ............................ .......... 47  I mag age e map aps s................................... ..................................................... ................................... ................................... ................................... ................................... ................................... .................................. ................. 48  I mag age e map tags tags.................. ................................... ................................... ................................... ................................... ................................... ................................... ................................... ............................ ........... 48  <bod ody y> ba back ckg ground rounds an and d col color ................................... ..................................................... ................................... ................................... ................................... ................................... .................... .. 49  I mag age e file file form format ats s.................................. .................................................... ................................... ................................... ................................... ................................... ................................... ......................... ........ 49 

2.3. Identify and use design and color principles for Web pages. ................................................... ................................................................ ............. 50  Design De sign Con Considerations rations................................. .................................................. ................................... ................................... ................................... .................................... ................................... ................... .. 50 

2.4. Create a basic HTML form that accepts user input. .............................................................................. 50  F ormEl ormEle ements................................. ................................................... ................................... ................................... ................................... ................................... ................................... ............................... .............. 51 51  F ormP ormProcessing................................. ................................................... ................................... ................................... ................................... ................................... ................................... ............................ ........... 52 

2.5. Create HTML frames. ..................................................................................................................... ................................................................ ........................................................... ...... 52 

 

 

CIW Foundations (1D0-510) Wha hatt are HTML frames.................................. ................................................... ................................... ................................... ................................... .................................... .................................. ................ 52 

2.6. Define Extensible Markup Language (XML), and identify its features and appropriate use. .............. 53  Extensible Markup Markup Lan Langu guag age e (XML) (XML ) ...................... ....................................... ................................... ................................... ................................... ................................... ......................... ........ 53  Serverr-s sideL Lan angu guag age es................................. .................................................. ................................... ................................... ................................... .................................... ................................... ................... .. 54 

2.7. Identify essential Web site navigation issues, and ensure page/site accessibility. accessibility. ............................... 54 54  Web page page acce accessibility sibility................................. .................................................. ................................... ................................... ................................... .................................... ................................... ................... .. 54  Addre Ad dres ssing acce accessibili lity ty................. .................................. .................................. ................................... ................................... ................................... .................................... .................................. ................ 54 

2.8. Define and apply essential aspects aspects of the Cascading Style Sheets (CSS) standard. standard. ............................ 55  2.9. Use Extensible Hypertext Hypertext Markup Language (XHTML) to create Web pages. ................................... 56  Extensible HTML (XHTML) ................................................................................................................................... 56 

2.10. Identify technologies for enhancing the user's Web experience, including:: programming including programming languages, languages, multimedia multimedia technologies. technologies. .................................................................... ....................................................... ............. 57  Active Act ive Conte Content an and d Form F ormat ats s ............................................... ................................................................. ................................... ................................... .................................... ............................... ............. 58 

2.11. Use GUI-based GUI-based HTML editing software to create Web pages. ..................................................... ........................................................... ...... 58  Web site pub publi lish shing................................... .................................................... ................................... .................................... ................................... ................................... ................................... ...................... ..... 58 

2.12. Test and analyze Web site performance performance issues. .................................................................................. ................................ .................................................. 59  Veri Ve rify fy ac acce cessibility sibility................................. ................................................... ................................... ................................... ................................... ................................... ................................... ......................... ........ 59  Calculatedow down nloa oad d times.................................. ................................................... ................................... ................................... ................................... .................................... ............................... ............. 59 

2.13. Identify steps in the Web site planning and development process. ..................................................... ............................................... ...... 59   The  Th e Web sit ite e develo lop pment cycle.... ...... ...... ...... ...... ...... ...... ....... ..... ...... .... ...... ...... ...... ...... ...... ....... ..... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... 60 

2.14. Identify essential issues in developing and maintaining a Web site, including:: project management, including management, testing, legal issues. ............................................................................ ........................ .......................................................... ...... 61  2.15. Plan and deliver oral presentations of your Web site, during and after site development. development...................................................... ............................................................................................................ ............................................................................. ...................... 62  Obtain fe Obtain fee edbac ack k onyour your sitedesign................................... ..................................................... ................................... ................................... ................................... ............................... .............. 62  Commun unication ication forms.................................. ................................................... ................................... ................................... ................................... .................................... ................................... ................... .. 62 

2.16. Define electronic commerce (e-commerce) and related technologies and concepts necessary to develop a secure, useful interface (i.e., storefront). ........................................... 63 63   Tra  Tr aditio ition nal vs. Electro ron nic Com Commerc rce e.. ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... .... 63  Metho Met hod ds of e-commerce................................................ .................................................................. ................................... ................................... .................................... ................................... ................... .. 63  EE-co com mmerce techn chnologi ologies............................... ................................................ ................................... ................................... ................................... .................................... .................................. ................ 64  Secure cure transa transact ctiion ons s................................... .................................................... ................................... .................................... ................................... ................................... ................................... ...................... ..... 65  Global Environment................................................................................................................................................ 66 

 

 

CIW Foundations (1D0-510) 2.17. Demonstrate knowledge of languages commonly used to provide database connectivity connect ivity to Web sites. ................................................ ..................................................................................................... ............................................................................. ........................ 66  Serverr-s side lan angu guag age es.................................. ................................................... ................................... ................................... ................................... .................................... ................................... ................... .. 66  Cl Cliient-sidelan angu guag age es .................................. ................................................... ................................... ................................... ................................... .................................... ................................... ................... .. 67   The  Th e ro role le of Stru ruc ctured Query Lan Language in Web site ites.... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ....... ... 68 

  Databas Datab ase e conn connecti ctivity techno chnollog ogiies ................................... ..................................................... ................................... ................................... ................................... ............................... .............. 68 Multiple tier applications ....................................................................................................................................... 68  2.18. Identify the benefits and drawbacks of running your own Web server versus using a service provider...................................................................................................... ................................................. ................................................................... ............... 69  Confi Con fig guring you your own own host hosting ing soluti solution................................. ................................................... ................................... ................................... ................................... ............................ ........... 69  Using an I SP ................................. ................................................... ................................... ................................... ................................... ................................... ................................... .................................. ................. 69 69  Using an ASP ASP ................................... ..................................................... ................................... ................................... ................................... ................................... ................................... ............................... .............. 70 70 

2.19. Identify common strategies for managing an end user's experience and improving site creativity. creativity. ....................................................................................................................... ....................................................................................... ................................ 70  Branding ................................................................................................................................................................. 70 

2.20. Consider copyright and ethical issues when creating Web pages. ...................................................... 70  Domain Dom ain 3: N Ne etwork T echnolog chnology yF Foundations oundations –  30% ................................................. ................................................................................. ................................ 71 71  3.1. Demonstrate knowledge of basic data communications components, and demonstrate technical knowledge of the Internet. .................................................................. ................................................................................. ............... 71 71  Basiic netw Bas twork ork topolog topologiies................................... .................................................... ................................... ................................... ................................... .................................... ............................... ............. 71  OSI Refe feren rence ceModel ............................................ ............................................................. ................................... ................................... ................................... ................................... ............................ ........... 73  Memorize th this tab table........................... le............................................ .................................. ................................... ................................... ................................... ................................... ............................... .............. 73  Networking Protocols ............................................................................................................................................. 74  Protoco rotocoll terms ................................. ................................................... ................................... ................................... ................................... ................................... ................................... ............................... .............. 74 74  Protoco rotocols ls.................................. ................................................... .................................. ................................... ................................... ................................... .................................... ................................... ...................... ..... 75   TCP/IP  TC P/IP essentia ials ls .... ..... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... .... 76  Memorize th this tab table........................... le............................................ .................................. ................................... ................................... ................................... ................................... ............................... .............. 76   TCP/UD  TC P/UDP P Port Ports s.... ...... ..... ...... ...... ...... ....... ..... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ........ ........ ...... ...... ...... ...... ...... ...... ....... ..... ...... .... ...... ...... ...... ...... ...... ...... .... 76  Protoco rotocoll State tates................................. ................................................... ................................... ................................... ................................... ................................... ................................... ............................... .............. 77  Networks ................................................................................................................................................................. 77 

3.2. Identify the role of networking hardware, and configure common hardware for operation. operation. ..................................................................... ................ ............................................................................................................ ........................................................... .... 78  Netw Ne twork ork Compon one ents................................... .................................................... ................................... ................................... ................................... .................................... ................................... ................... .. 78   Tra  Tr ansmis iss sio ion n Media ia.... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ....... ..... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... .... 79 

 

 

CIW Foundations (1D0-510) LAN Sta Stand ndards................................. ................................................... ................................... ................................... ................................... ................................... ................................... ............................... .............. 79  WAN Stan Stand dards................................... ..................................................... ................................... ................................... ................................... ................................... ................................... ............................ ........... 80   T and E-Ca E-Carrie rrier System... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ....... ..... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... .... 80  Routing Rou ting.................................. .................................................... ................................... .................................. .................................. ................................... .................................... .................................... ......................... ....... 80 80  Routing Rou ting Protoco rotocolls.................................. .................................................... ................................... ................................... ................................... ................................... ................................... ......................... ........ 81 81 

3.3. Identify the relationship between IP addresses and domain names, including:: assignment of IP addresses within a subnet. ............................................................................... 81  including IP Addressing ......................................................................................................................................................... 81  Address Form......................................................................................................................................................... 82  Public blic an and d Privat Pr ivate e Netw twork orks s................................... .................................................... .................................. ................................... .................................... .................................... ......................... ....... 82  Subnetting ............................................................................................................................................................... 82  Subn bne et Masks (net mas ask) k) ................................... .................................................... ................................... ................................... ................................... .................................... ............................... ............. 83  I nt nte ernet Address ressing................................... .................................................... ................................... .................................... ................................... ................................... ................................... ...................... ..... 83  I Pv4 vs. I Pv6................................. ................................................... ................................... ................................... ................................... ................................... ................................... .................................. ................. 83 83 

3.4. Identify the functions and components components of servers commonly used on the Internet. ............................ 84  I nt nte ernetw tworking orkingServe Server Ty Typ pes................................................ .................................................................. ................................... ................................... .................................... ............................ .......... 84 

3.5. Identify common Internet security and availability issues, including: user-levell and enterprise-level user-leve enterprise-level concerns. ..................................................................................................... ................................................... .................................................. 85  Netw Ne twork ork Attack Attack Type Types .............................................. ............................................................... .................................. ................................... .................................... ................................... ......................... ........ 85  OSI/RM OSI/ RM securi curity ty se services rvices................................... .................................................... ................................... ................................... ................................... .................................... ............................... ............. 87 

3.6. Identify common performance issues affecting Internet clients, including:: analysis, diagnosis. ................................................... including ....................................................................................................... ................................................................... ............... 89   TCP/IP  TC P/IP works rkstatio ion n configu igura rattion ion ... ...... ...... ...... ...... ...... ...... ....... ..... .... ...... ...... ...... ...... ...... ...... ....... ..... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... .... 89  Diag Diagn nos ostic tic too toolls.................................. .................................................... ................................... ................................... ................................... ................................... ................................... ............................ ........... 89 

3.7. Perform basic hardware hardware and system maintenance maintenance for network-aware network-aware systems. .................................. 90  Computer system maintenance ............................................................................................................................... 90  Compute puter sys syste temcompone ponent nts s.......... .............. ......... .......... ......... ......... ......... ......... .......... ......... ......... ......... ......... ......... ......... .......... ......... ......... ......... ......... ......... ......... ......... ......... ......... ......... .......... ..... 90 90 

3.8. Manage fundamental fundamental elements of modern network-based client operating system systems. s. .......................... 92  Software Licensing.................................................................................................................................................. 92  Partitions and logical drives .................................................................................................................................. 92  F ile il e systemman anag age ement tools tools........................ ......................................... ................................... ................................... ................................... ................................... .................................. ................. 93  Rem Re moteman anag age ement and and troubl troubleshoot shootiing......... .............. ......... ......... .......... ......... ......... ......... ......... ......... ......... .......... ......... ......... ......... ......... ......... ......... ......... ......... .......... ......... ......... ..... 94 

3.9. Configure and troubleshoot wireless networks. .................................................................................... .............................................................. ...................... 94 94 

 

 

CIW Foundations (1D0-510) Wireless relessNetw Network Te Tech chno nologie logies s................................. ................................................... ................................... ................................... ................................... ................................... ....................... ..... 94   Tra  Tr ansmis iss sio ion n Types ... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ....... ..... .... ...... ...... ...... ...... ...... ...... ....... ..... ...... ...... .... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... ...... .... ...... ...... ...... ...... .... 95 

3.10. Manage career opportunities opportunities in the IT industry. ........................................................................... ....................... .......................................................... ...... 95  Prepare repare fo forr you ourr caree career .................................. ................................................... ................................... ................................... ................................... .................................... .................................. ................ 95 

Pr Prac acti tice ce Que Ques stions tions.......................................................................................................... .......................................................................................................................................... ................................ 9 96 6 

 

 

CIW Foundations (1D0-510)

Domain 1: Internet Business Foundations –  35%  35% 1.1. Identify job roles in the Information Technology (IT) industry, including the responsibilities,, tasks and skills they require. responsibilities ► 

IT industry job roles

► 

Web site designer

► 

Web architect

► 

Web application developer

► 

Web site analyst

► 

Web site manager

► 

Database administrator

► 

Server administrator

► 

Network engineer

► 

Security manager

► 

PC technician

► 

Help desk technician

IT industry job roles The responsibilities, tasks and common duties of the variety of job roles that exist in the Information Technology industry should be recognized by those who w will ill take the CIW Foundations exam. Often these  job roles will will be mentioned, mentioned, by name, name, in employment employment postings; postings; just just as often you you may have have to read the details of a job listing to place the position within one of these roles.

Web si site te designe signerr The user interface and the overall visual appearance of the site are created by the Web site designer.

Web architect The Web architect creates the plan for development and support of the Web site and often acts as the project manager in charge of site development, who will pull together the talents of many other individuals to create a finished product.

 

 

CIW Foundations (1D0-510)

Web application developer The Web application developer uses programming languages to create the server-side programming that makes a Web site dynamic. Some of the languages used by the Web application developer include C#, Java, PHP, Perl and Visual Basic Script.

Web si site te anal analyst yst During the creation of a Web site or after a site has been in use for some time, it is desirable to learn whether or not the site is performing as expected. The role of a Web site analyst is to report on, and make recommendations about, a site’s performance through Web analysis anal ysis tools, surveys and usability evaluations.  evaluations. 

Web si site te manager The Web site manager is commonly responsible for keeping the Web site running smoothly. By leading a team of Web professionals (sometimes performing all of the roles described above) the Web site manager is able to keep the site up to date, correct style or content errors and generally keep the site functioning as an extension of the business or organization.

Database adm administr nistrator ator Most dynamic Web sites retrieve or store information in a database. Almost any popular Web site that you could name is actually a user interface for a complex database. The database administrator is responsible for the design, maintenance and security of the information kept in the database.

Server admini nistrator strator The server administrator is responsible for the Web site infrastructure. If the server computer which runs, stores and manages the Web site crashes or becomes otherwise unavailable, the Web site itself also becomes unavailable. The server administrator is is responsible for keeping such ―downtime‖ to a minimum, a minimum, and ideally to none at all. The server administrator is responsible for configuring the Web server in the most reliable, secure, easily restored way possibly including uninterruptible power, redundant or mirrored servers and tape backup of the Web site and database servers.

Networ Netw ork k engi ngine nee er Even a well designed Web site running on properly maintained servers is useless unless it is placed on a network with access to the Internet (or a local network in the case of an intranet). The network engineer must design and support the devices and transmission media that allow communication between the Web site and visitors who use it.

 

 

CIW Foundations (1D0-510)

Security manager Often, the information being displayed or gathered by a Web site should be suitably secured from just anyone accessing the site. For example, when a purchase is made from an e-commerce Web site using a credit card, special precautions must be taken to safeguard the credit card number and associated personal information. This and other security requirements are the job of a security manager.

PC technician Building, configuring, installing and repairing computer hardware is the job performed by a PC technician. The PC technician is often also responsible for installing and maintaining the operating system and other software used on a computer. A PC technician should be knowledgeable about computer components, troubleshooting procedures and software configuration.

Help desk technician The help desk technician is often the first line of support for a computer user. When a user experiences difficulty in accessing a Web site, they will often communicate with a help desk technician to determine the problem and how it can be corrected.

1.2. Identify the infrastructure required to access the Internet, including hardware and software components components.. An IT professional certified as a CIW Associate will need to understand the software and hardware components required to access the Internet. ► 

Client

► 

Server

► 

History of the Internet

► 

Internet infrastructure

► 

Connection devices

► 

Consumer Internet connections

 

 

CIW Foundations (1D0-510)

Client and Server Most information systems make use of the client/server model which describes a process where the server offers a file, application or service which is requested by a workstation (the client). Modern networks commonly include several servers and hundreds or thousands of clients. Common examples of the client/server model include print servers, file servers, authentication servers, Web servers and e-mail servers to which multiple clients connect in order to make use of the offered services.

History of the Internet The Internet, of course, is not a single network, but a vast collection of separate networks that share resources by using common protocols. The origin of the Internet was in 1969 when the Advanced Research Projects Agency Network (ARPANET) was funded by the U.S. Department of Defense. After the U.S. Department of Defense ended ARPANET the National Science Foundation took over the equipment and sites involved and formed NSFnet. Eventually NSFnet was expanded to include sites belonging to businesses, government and military installations, and universities. This large connection of separate networks became our modern Intranet. All of these separate networks are able to communicate because they use common protocols. Protocols can be best described as rules for communication. The protocol used to communicate on the Internet Internet is the Transmission Control Protocol/Internet Protocol (TCP/IP) which includes the ability to provide an identifier or address for every server or client on the Internet. The current version of TCP/IP is known as version 4 (IPv4) and uses a 32 bit address format of 4 numbers separated by a period such as 63.146.189.101. A common name for this version of TCP/IP addressing is the ―dotted quad‖.  quad‖.  A newer version of TCP/IP is planned which uses a 128 bit address format allowing for a far greater number of addresses, as well as more sophisticated address management and routing methods. IPv6 will use hexadecimal numbers (using digits of 0 through F rather than 0 through 9) for addressing, like this: FEBC:A574:382B:23C1:AA49:4592:4E66:9982

 

 

CIW Foundations (1D0-510)

Internet infrastructure The Internet client infrastructure requires 6 elements in order to connect to (or make typical use of) the Internet: ► 

An access device such as a computer, Internet-enabled mobile phone, or PDA.

► 

An operating system

► 

TCP/IP for communication on the Internet

► 

Client software such as a Web browser, chat client, or e-mail application

► 

A physical Internet connection

► 

A valid Internet address.

The TCP/IP address is typically associated with a name such as  as  www.preplogic.com  www.preplogic.com  so that we can use the Internet without memorizing thousands of numeric addresses.

Connection devices One of the 6 elements needed for an Internet connection is the physical device that provides the connection. Many people access to the Internet using a dialup connection. A dialup connection is created by a modem which is used to translate the digital signals used by the computer to the analog sounds that are carried by regular telephone lines. The need to carry analog sounds –  sounds –  such  such as speech –  speech –  on  on a regular phone line restricts the speed at which digital information can be carried on that kind of connection. Faster Internet connections are supported by other connection co nnection devices that are considered to be b e ―direct‖ connections. They can communicate using digital techniques that do not require the translation of signals to sound, and are therefore much faster.

 

 

CIW Foundations (1D0-510) Examples of direct connection types include: Connection Type

Description

Speed

ISDN

A telephone service that provides digital data transmission over existing copper telephone wiring.

264 Kbps (thousands of bits per second) channels 512 Kbps to 32 Mbps (million bits per second)

DSL

The Digital Subscriber Loop is a technology for delivering high-bandwidth digital information using ordinary copper telephone lines. There are several variations of DSL. DSL. This is a common consumer Internet connection.

Cable modem

A high-speed digital connection using the coaxial cable and infrastructure provided by cable television providers. This is also a common consumer Internet connection.

512 Kbps to 52 Mbps

T1

Dedicated high-speed telephone connection

1.544 Mbps

which can be configured to carry voice or data. E1

A digital transmission link used in Europe.

2.048 Mbps

E3

A digital transmission link used in Europe.

34.368 Mbps

T3

Recently renamed to DS-3. This is the equivalent of 28 T1 lines.

44.736 Mbps

Wireless

A network connection using radio waves rather than a network cable. Wireless connections are becoming increasingly popular as a method of consumer Internet connection.

Various, from 2 Mbps to

LAN

Local Area Network using the or optic to fiber connections employed bycopper an organization connect servers, clients and other network devices. Commonly the LAN is not the connection to the Internet, but makes use of a router to connect to the Internet.

10 Mbps, Mbps to 100 1000Mbps

Fiber-optic

This network connection uses light rather than electrons to transmit data. Fiber-optic connections are becoming increasingly popular as a method of consumer Internet connection.

Up to 100 Gbps (Gigabit or 1,000 megabits)

 

 

CIW Foundations (1D0-510)

1.3. Define important Internet communications protocols and their roles in delivering basic Internet services. ► 

Remote access protocols

► 

Internet service protocols

Remote access protocols You may recall our definition of a protocol as a set of rules for communication. A connection to the Internet is, in part, accomplished by the use of a variety of protocols, for a variety of purposes. Specifically, these protocols are for the establishment and maintenance of a connection to the internet. These remote access protocols include the Point-to-Point Protocol (PPP), commonly used to connect via a telephone modem to an Internet Service Provider (ISP); and a similar protocol to establish a connection using an existing Ethernet connection, called Point-to-Point Protocol over Ethernet (PPPoE). The PPPoE is often used when you connect to your Internet access device using a network cable instead of a serial or modem cable.

Internet service protocols The concept of the protocol extends beyond just the connection to the IInternet. nternet. The activities that you take part in on the Internet have their rules for communication also. For example the way in which which a Web server responds to a request for a Web page is called the Hypertext Transfer Protocol or HTTP. You might recognize this as part of the information that is displayed in your browser address bar, such as: http://www.testprep.com.  There are a variety of other such protocols with which you should be familiar –  familiar  –  FTP  FTP for file transfer, SMTP for simple mail transfer, POP for the post office protocol, IMAP for Internet Message Access and HTTPS for secure Web page requests.

 

 

CIW Foundations (1D0-510)

1.4. Identify the basic principles of the Domain Name System (DNS). Every Web site must have a unique name and address. The Domain Name System (DNS) w works orks to match domain names with Web site addresses.

Domain Name System (DNS) ►  Resolves IP addresses into recognizable names ► 

Inter-changeable information o  192.112.12.2 =  = www.chromezebra.com 

Internet domain naming Domain Dom ain

T ype

.com

commercial or company sites

.edu

educational institutions, institutions , typically universities

.org

organizations; originally clubs, associations and nonprofit groups; currently, various types of organizations

.mil

U.S. military

.gov

U.S. civilian government

.net

network sites, including ISPs

.int

international organizations (rarely used)

Hierarchical DNS naming structure ► 

Domain names o  Read from right to left o  General to specific

 

 

CIW Foundations (1D0-510)

Domain name server This is a server that resolves domain names into IP addresses.

Shared domains A shared domain occurs when a company domain name is shared with another company. Example: If chromezebra shared its domain name with other companies, you might see othercompany.chromezebra.com

1.5. Identify the functions of Web browsers, and use them to access the World Wide Web and other computer resources.

Uniform Resource Identifiers (URLs) ► 

Includes: o  Protocol o  Internet resource (server or host name) o  Domain name

► 

Absolute URL o  Example: http://www.chromezebra.com/images/top.gif

► 

Relative URL o  Example: images/top.gif

 

 

CIW Foundations (1D0-510)

Securing Internet communications ► 

Configure the browser’s security settings  settings   o  Accept, reject or prompt before accepting: o  ActiveX controls o  Java applets

► 

Restrict o  Set safety levels accordingly

Use a Web browser to download dow nload files ► 

You can use a browser to: o  Save an entire Web page o  Save elements of a Web page o  Download executable files or other types of files from the Internet to a specific location on

your hard drive o  Copy selections to the Clipboard

Intranet, extranet, Internet ► 

Intranet o  An internal or in-house Web site used only by employees within a company

► 

Extranet o  An internal network designed to provide access to selected external users; these are not

available to the Internet public

 

 

CIW Foundations (1D0-510)

Browser plug-ins ► 

Programs designed to extend basic browser functionality o  Helper mini-programs that allow browsers to run various types of files o  Associated with a specific platform (Windows or Macintosh) and sometimes with a specific

browser o  Provide efficient integration of multimedia formats with the browser and computer

1.6. Use e-mail clients to send simple messages and files to other Internet users. In order to send and receive e-mail, the following must be in place: a unique IP address, an account name, a password, and a service provider or hosting company.

Types of Email ► 

Types of Email o  Browser-based o  Outlook Express, Netscape Mail

► 

Online Service o  AOL, CompuServe

► 

Web-based (IMAP) o  Yahoo, Hotmail, etc.

Sending and Receiving Email ► 

Requirements o  Email program

 

 

CIW Foundations (1D0-510) o  Incoming mail server and protocol (POP)

  POP3 account name (user name)



  POP3 account password



o  Need outgoing mail server and protocol

  SMTP



E-mail signatures ► 

Display at the bottom of an email message

► 

Identifies the sender and provides contact information

► 

Can be added automatically to outgoing messages

► 

Some companies require signatures to follow specific guidelines for content and structure

► 

Default Signature o  Only one can be the default signature at any given time

E-mail attachments ► 

Attaching Files o  Any kind of file can be attached to an email message o  Use attachments for sharing files and documents

► 

Receiving an attachment o  The email clients uses MIME to identify attached files by their file type o  Some attachments are blocked or removed by the browser security or antivirus program

► 

Company servers scan email attachments o  Company servers may block certain types of attachments, or all attachments, depending on the

company security policy

E-mail for Business ► 

Choose the response to email o  Reply o  Reply All o  Forward

► 

Communicate professionally

 

 

CIW Foundations (1D0-510) o  Use proper grammar o  Check spelling o  Keep messages clear and concise ► 

Remember e-mail is permanent

► 

Include e-mail threads o  Add information about what you are addressing from the original email.

► 

Out-of-office messages o  Automatic feature to tell senders that you are gone.

E-mail Issues ► 

Sexual harassment

► 

Offensive language

► 

Disclosure of confidential information

► 

Combating spam o  Use spam filters o  Block mail from IP addresses o  Use a blackhole list o  Require SMTP authentication o  Set up rules

► 

Storing email messages o  Make local copies o  Remove messages from the server

1.7. Define and use additional networking and Internet services. The Internet allows you to collect information in many ways. The following tools allow you to do a myriad of things online: ► 

Newsgroups o  Also called UseNet o  Allow posting of questions and information

 

 

CIW Foundations (1D0-510) o  Broken into many categories and subcategories o  Postings are for those who have used a product, not for manufacturer sales pitch o  Tree Structure

  Uses dot notation to separate categories



  Read left (broad category) to right (more specific category)



  Example: comp.lang.java



  Computer language java



► 

FTP o  Used to transfer files between two computers o  Upload or download files through the internet o  Public FTP servers allow anonymous logon and downloading of files only o  Corporate FTP servers usually require a user name and password o  Types

  Command-line FTP



  Built-in FTP browser client



  Specialized FTP client



o  Downloading Files

  Taking a file from a server and putting and putting it on the user’s computer  



  Use the get command



o  Uploading Files

  Transferring a file from the user’s computer to another computer  



  Use the put command



o  Secure versions of FTP

  Secure Copy (SCP)



  SSH File Transfer Protocol (S/FTP)



  SSL/TLS-enabled FTP (FTPS)



► 

Telnet –  Telnet  –  before  before the Internet o  Remote host connection

  Logs on to a server and access information as if you were sitting in front of the server



o  Provides a login shell (an environment that allows you to issue commands) o  Similar to a dial-up shell account

 

 

CIW Foundations (1D0-510) o  Establishes a text-based connection with another computer o  Requires a username and password

  Uses a generic user name and password to access public servers



o  SSH (Secure Shell)

  Secure form of Telnet



► 

Virtual Network Connection (VNC) o  Allows you to control a computer at a remote location as if you were sitting in front of it o  Consists of two components: the server and the viewer o  Provides a full GUI display and allows authenticated users to log on and see the same display

they would see if they were sitting in front of the computer o  The viewer and server do not need to be running the same operating system

► 

Instant Messaging o  Computer-based method of communication in which users can type and view messages sent to

one or more recipients and view the responses immediately o  Contacts must be online to receive messages o  Can send files, view photos, send Web links and talk to contacts o  Becoming very popular in the workplace o  Requires an instant messaging client and an account for instant messaging service o  IM Programs

  AOL, ICQ, Trillian, MSN



 

 

CIW Foundations (1D0-510) ► 

Peer-to-Peer o  Each computer has both client and server capabilities o  On the Internet, a P2P network allows a group of users to connect with each other and directly

share files among their hard drives o  P2P networks are inexpensive and allow users to share

bandwidth

o  Examples:

  Kazaa



  ITunes



► 

Lightweight Directory Access Protocol (LDAP) o  Directories contain contact information o  Used by corporations to organize names, addresses, etc. o  Simplified version of X.500 standard o  Supports TCP/IP o  Makes global directory service available to everyone o  Modern e-mail clients are capable of searching an

LDAP directory ► 

Concurrent Versioning System (CVS) o  Development tools for programmers o  Used on Linux or other UNIX-based systems o  Controls different versions of the pieces of a

program, as those pieces are developed o  Allows programmers to use the latest (debugged)

versions of their co-workers’ co-workers’ code while developing their own portions  portions  ► 

o  Allows a large program to be developed in a much shorter time frame

Blog o  Collection of personal thoughts on a Web site

1.8. Demonstrate ways to communicate effectively using Internet technology. ► 

Netiquette o  Don’t type in all caps  caps   o  Check spelling

 

 

CIW Foundations (1D0-510) o  Be careful about using acronyms ► 

Ethical issues o  These issues are the same as if you were communicating face-to-face. o  Remember that IM and chats are not secure o  Do not ask for personal info o  Do not send credit card or password info o  Do not represent yourself as someone else o  Adhere to copyright laws o  Pay for shareware if you keep it o  Do not plagiarize o  Do not libel others

► 

Avoid harassment o  Sending instant messages to those who do not want them o  Jokes in bad taste o  Forwarding everything

1.9. Identify and configure user customization features in Web browsers, including: preferences, caching, cookies. ► 

Configuring browser preferences o  Fonts o  Home page URL o  History folder cache time o  Controlling pop-up and pop-under windows o  Image loading

  Disabled: text only, reduces page load time



o  Cookies and Privacy

  Text file that collects visitor information



  Helps to customize return visits



  Privacy levels are modified to block or allow cookies



o  What is and is not allowed to be executed

 

 

CIW Foundations (1D0-510) o  Cookie warnings

Security Security from unauthorized breaches can be provided through a variety of methods. The following addresses some of those methods: ► 

Browser security o  Accept, reject or prompt before accepting:

  ActiveX controls



  Java applets



o  Restrict

  Set safety levels accordingly



► 

Proxy servers –  servers –  provide  provide added security o  Placed between corporate networks and the Internet o  Provide:

  Web document caching: speeds up access



  Corporate firewall access



o  Configure Browsers for use with Proxy

  Netscape Navigator: manually configure to work with a proxy server, or can use a



 proxy server’s URL to automatically configure itself  

  Internet Explorer: automatically scans the network for a proxy server; or uses a



configuration script; or can be configured manually

 

 

CIW Foundations (1D0-510)

Troubleshooting connection problems ► 

Client problems o  Poor rendering o  Slow connection o  No connection o  Inability to render images o  Slow browser and other system functions

► 

TCP/IP troubleshooting tools o  I pcon pconfi fig g

 



o  Ping

Displays system IP configurations

  Tests connectivity between a source system and a destination system



o  Tr  Tra acert

  Determines the path between a source system and a destination system



 

 

CIW Foundations (1D0-510)

1.10. Identify security issues related to Internet clients (e.g., Web browsers, email, instant messaging) in the workplace, including: certificates, malware, illicit servers and viruses.

Authentication Authentication verifies the identity of the person logging into a computer, web site, etc. The most common forms of authentication are usernames, passwords and digital certificates. ► 

User names and passwords o  Use to log on to private and public networks, including the Internet

► 

Digital certificates o  Attachments to electronic transmissions that supply a verifiable signature o  Digital signatures –  signatures –  electronic  electronic signatures that verify the identity of the message sender

  Non-repudiation Non-repudiation –   –  digital  digital signatures prove that a transaction or transmission took



place; such that neither the sender nor the receiver can later deny the action

Encryption Encryption is the scrambling of data using a mathematical algorithm (when you see algorithm, think calculation). There are three types of encryption: symmetric-key, symmetric-ke y, asymmetric-key and hash function. Note: the standard is 128-bit symmetric-key encryption. ► 

Symmetric-key (secret-key) encryption o  The same key is used to encrypt and decrypt messages

► 

Asymmetric-key (public-key) encryption o  Two keys are used to encrypt and decrypt messages: a public key and a private key o  Uses an RSA algorithm

► 

Hash (one-way) encryption o  Uses hashes to verify the integrity of transmitted messages o  Also called a message digest o  Uses the MD5 or SHA (160-bit –  (160-bit –  more  more secure than MD5) algorithm

 

 

CIW Foundations (1D0-510)

Firewall Firewalls are collections of hardware, software and corporate policies that prevent unauthorized access to, or from, private networks. ► 

Prevent unauthorized Internet users from accessing private networks

► 

Retain control of proprietary information

► 

Prevent unauthorized export of proprietary information

► 

Prevent access to external e-mail providers or external servers

Malware ► 

Virus o  Damages computers and networks, often alters files to damage or destroy data

► 

Worm o  Resides in active memory and replicates itself until an entire disk is full

► 

► 

Trojan horse o  Appears to be harmless (such as a computer game) but produces harmful results

Illicit server

o  Installs hidden services on systems

  Client code: allows remote access to a computer by an attacker



  Server code: infects destination computers and enables the attacker to control it



► 

Spyware (adware) o  An application secretly placed on a user’s system to covertly gather information and relay it to

outside parties, usually for advertising purposes o  Cookies are not spyware because:

 

 

CIW Foundations (1D0-510)

  The user is aware of their presence



  The user has the option to disable outside access to cookie information



o  Use spyware detection applications to detect and eliminate spyware

Protection ► 

Do not open e-mail or attachments from unknown senders

► 

Configure browser and e-mail security to highest levels

► 

Use antivirus software

► 

Keep antivirus software current

► 

Install system patches and updates

► 

Stay informed about the latest virus threats

► 

Make backup copies of important files

► 

Use a password-protected screen saver to eliminate prying eyes

1.11. Use different types of Web search engines effectively. ► 

Search Engine o  A powerful software program that makes it easy to find information on the Internet o  Large database that allows you to query indices

► 

Index o  An enormous catalog that is compiled by the search engine o  Many engines use ―robots‖ or ―spiders‖ to automatically a utomatically search the Web and inde index x Web sites

► 

Types of searches o  Directory search

  Search engine displays a list of categories and subcategories that you can browse to



find information or websites o  Keyword search

  Enter keywords in a search engine to find information about any subject you want to



investigate ► 

Register with search engines o  May be manual or automatic submission o  Once submitted:

 

 

CIW Foundations (1D0-510)

  Robots search your site for relevant keywords found in the <meta> tag



  Search engines that scan Web pages for <meta> tags are called meta search engines



o  Information portal

  Only finds Web sites based on manual submissions



  Information portals are more likely to contain high-quality content matches to any



given query o  Search engines

  Uses a robot or spider program to browse the Web, following hyperlinks, and indexes



the content that the robot finds

Popular Searches ► 

Yahoo o  One of the oldest and most basic information portals o  Yahoo was not intended to be a search engine; it was intended to provide multiple links

► 

relating to each topic AltaVista o  Originally designed to index the entire Internet o  Two search options are offered: general and advanced o  Ranks relevance to a site based on keywords entered by the user

► 

Google o  Ranks relevance to a site based on keywords entered by the user o  Also determines relevance based upon how many hyperlinks are made to a particular site

► 

Lycos o  One of the largest and most complete databases on the Internet o  Offers both directory and keyword searches

► 

Webcrawler o  A much smaller database than Lycos o  It is fast, simple and reliable o  Good for general searches

► 

Excite o  Allows keyword searches o  Also contains cross-referencing fields for conceptual searches

 

 

CIW Foundations (1D0-510)

Boolean operators Symbols or words used to narrow Internet search results by including or excluding certain words or phrases from the results ► 

Common operators: o  AND, OR, NOT, NEAR, FAR, BEFORE, ADJ (adjacent) o  Plus sign ( + ) o  Minus sign ( - ) o  Brackets ( [ ] ) o  Quotation mark s ( ― ‖ )  )  o  Asterisk ( * ) o  Period ( . )

► 

Boolean Operators Results: o  keyword1 AND keyword2

  results must include both keywords



o  keyword1 OR keyword2

  results must include at least one of the keywords



o  keyword1 NOT keyword2

  results must exclude keyword2



o  keyword1 + keyword2

  results must include both keywords



o  keyword1 - keyword2

  results must exclude keyword2



Search Strategies ► 

Check the default settings for each search engine

► 

Use keywords that are specific, and try to use nouns rather than verbs

► 

Combine keywords into phrases by using quotation marks to indicate exact wording

► 

Use all uppercase letters when typing Boolean operators

► 

Use all lowercase letters when typing keywords

 

 

CIW Foundations (1D0-510)

1.12. Identify and use principles of Personal Information Management (PIM), including: common applications. PIM software is used for a variety of organizational tasks: ►  ► 

Keeping track of appointments

► 

Storing contact information Providing email capabilities (some programs)

► 

Providing a centralized electronic calendar (some programs)

► 

Setting reminders and alarms

► 

Use with PDAs - Synchronize data between PDA and desktop computer

Wireless Application Protocol (WAP) ► 

Protocol used for wireless communication of hand-held devices

► 

Views Wireless Markup Language (WML)

► 

Advantages: Allows access to the Internet from anywhere

► 

Disadvantages: Device screens difficult to read, no e-mail attachment support

1.13. Efficiently transmit text and binary files using popular Internet services. ► 

Compression o  Downloaded files are usually compressed o  You must decompress to use the file

► 

File Types

 

o MIME types may need to be defined o  Some files may be blocked ► 

Common compression utilities include: o  Zip/unzip o  Bzip2/bunzip2 o  Bzip/bunzip o  Gzip/gunzip o  Compress/uncompress o  RAR/WinRAR

 

 

CIW Foundations (1D0-510)

1.14. Identify security-related ethical and legal issues faced by IT professionals.

Privacy Issues ► 

Your computer activities are no longer private

► 

You may receive malware and spam

Organizations may monitor employee e-mail and restrict access to Internet sites ►  Network administrators may audit the contents of employee hard drives

► 

► 

Protect Yourself o  Do not click banner ads o  Do not sign up for unwanted mailing lists (sweepstakes, etc.) o  Conduct secure transactions o  Send only emails that anyone can read o  Be selective before posting to a message board/Usenet o  Use home computer for personal communications and Internet searches

Copyright Issues Copyright is defined by expression and originality. You need to know the laws governing copyright. ► 

Copyright laws extend to works of authorship on the Internet

► 

There is no international copyright

► 

You must obtain copyrights from the appropriate agency in your home country

► 

Court cases have set precedents that copyright-protected material cannot be used or distributed on the Internet without permission

Other Issues ► 

Licensing: o  To license copyright-protected material, you must obtain permission from the author

► 

Trademarks: o  To register a trademark, you must contact the appropriate agency in your home country

► 

Encryption policies: o  Determine the risk of transmitting or emailing unencrypted proprietary or sensitive data

 

 

CIW Foundations (1D0-510)

1.15. Relate project management concepts and terms to the IT profession.  Term  Te rm

Defin finit itio ion n

Project Management

Applying knowledge, skills and processes to specific activities in order to meet deadlines and achieve a desired result

Project

A sequence of tasks that must be accomplished within a certain time frame to achieve a desired result

Task

A unit of work during a project

Resource

A person, department or device needed to accomplish a task

Assignment

The appointment of a specific resource to a specific task

Scope

The goals and tasks of a project and the work required to complete them

Scope creep

Gradual increases in project scope that occur in small increments over time

Project Management Skills The following are skills that are essential for all project managers: ► 

Planning skills o  Identify project stakeholders o  Acquire the right staff for the project o  Develop and manage project teams

► 

Organizational skills o  Control how and when tasks are completed o  Prioritize tasks

► 

Communication skills o  Gather information o  Evaluate and communicate project condition

► 

Problem-solving skills o  Identify problems o  Propose solutions

 

 

CIW Foundations (1D0-510) o  Make decisions in a timely manner

Project Management Phases ► 

Initiating phase o 

Conduct needs analysis

o  Determine objectives, assumptions and constraints o  Create Statement Of Work (SOW) ► 

Planning phase o  Develop project schedule o  Assemble project team

► 

Executing phase o  Perform project tasks

► 

► 

Controlling phase (concurrent with executing phase) o  Monitor progress and take corrective action as needed

During the executing and controlling phases:

o  Schedule meetings with team members to monitor progress o  Schedule meetings with stakeholders and management around milestones to review project

status o  Avoid scope creep by managing requests and changes at regular intervals ► 

Closing phase o  Evaluate schedule, budget, scope, resources and assignments o  Formal acceptance of project deliverable

► 

During the closing phase: o  Test the product

  Client evaluates and accepts/rejects project deliverable



o  Evaluate performances

  Review performances of team members



o  Document lessons learned

  Review what went well, what did not and what could be done differently to improve



team performance

 

 

CIW Foundations (1D0-510)

1.16. Recognize essential database concepts. Search engines use large databases that contain information that can be searched. Before continuing it is important that you understand basic database concepts.

Database Terminology  Term  Te rm

Defin finit itio ion n

Database

An organized collection of information that pertains to a particular subject or purpose

Table

A collection of data about a specific topic, organized into columns and rows

Field

A category of information in a table (column)

Record

A collection of information consisting of one or more related fields about a specific entity (row)

Relational Database

A database that contains multiple tables related through common fields

Common field

A field, contained in two or more tables, that forms a relationship between the tables

Relationship

A connection between two or more tables based on a common field

Primary key

A field containing a value that uniquely identifies each record in a table

Foreign key

A field in a related table that refers to the primary key in another table

Query

Ask a question of the database

SQL

Standard interactive and programming language for accessing information from, and updating information in, relational databases

 

 

CIW Foundations (1D0-510)

Relational Databases ► 

Relating tables eliminates the duplication of data

► 

Tables are related through their common fields

► 

The common field is the primary key in one table and the foreign key in another table

 

 

CIW Foundations (1D0-510)

Relationships ► 

One-to-one relationship o  Each record in Table A can have only one matching record in Table B

► 

One-to-many relationship

 

o A record in Table Arecord can have manyAmatching in Table B, but a record in Table B has only one matching in Table (the mostrecords common table relationship) ► 

Many-to-many relationship o  One record in either Table A or B can relate to many matching records in the other table o  Established by creating multiple one-to-many relationships with a third table (junction table)

Connecting Databases to Internet Servers  ► 

Database Management System (DBMS) o  Program used to store, access and manipulate information 

  IBM   Oracle



  SQL Server



  Microsoft Access



  Sybase



► 

Open Database Connectivity (ODBC) o  Standard that allows an operating system to access databases.

► 

Alternative standards o  Java Database Connectivity (JDBC) o  Common Interface Gateway (CGI)

o  Connects the server to the database

 

 

CIW Foundations (1D0-510)

Domain 2: Site Development Foundations –  35%  35% 2.1. Demonstrate knowledge required to create a Web page.

History of markup languages SGML, or Standard Generalized Markup Language, was created by IBM and became a standard recognized by the International Organization for Standardization in 1986. SGML is a very capable yet very complex language used to describe the information within a document. HTML was designed by Tim Berners-Lee as a method of distributing documents across a computer network. HTML is similar to SGML in many ways, but it uses a much simpler set of elements than SGML, and as a result has become the standard for transferring information in Web documents. It is important to note that markup languages are quite different from programming languages. Markup languages define what information is for, and and how information should be presented. Markup languages are not used to perform calculations or any of the other duties of a programming language. Over time, HTML has been extended and modified so that it is now commonly used to provide formatting information for a web page and not just content or data. The way in which HTML changes the information in a document is by embedding special codes or elements called tags within a document.

Versions of HTML The type of Web design that is tested by the CIW v5 Foundations Exam 1D0-510 is very different from the type of Web pages that were created when HTML was first created. The first Web pages were scientific documents following a standardized layout with little need for colors, animations, sound or support of accessibility accessibilit y requirements. The primary purpose of these early Web documents was was to provide built-in links to other documents of a similar nature. This use of HTML was not satisfying to the Internet using public, who demanded a much more colorful, dynamic and entertaining kind of Web document. Many enhancements were made to HTML by individual interpreters –  interpreters  –  the  the programs that display Web pages –  pages  –  in   in an effort to appeal to a wider audience. audience. Web browsers and e-mail client software are the most common interpreters, and these programs are written by several companies with competing ideas of what HTML should do.

 

 

CIW Foundations (1D0-510)

HTML ► 

Hypertext Markup Language (HTML) o  Allows hyperlinks and describes visual layout o  HTML versions include HTML 3.2 and HTML 4.01

► 

HTML 4.0 ―Flavors‖  ―Flavors‖  o  4.01 Transitional -- allows deprecated tags and html formatting o  4.01 Strict -- requires all tags be container tags, does not allow deprecated tags, and requires

CSS for formatting o  4.01 Frameset -- for use with frames

Document Structure Tags Every XHTML document must have the following document structure components so that the appropriate interpreter can render the document as expected and validate its contents:

<!D !DOCT OCT Y PE PE> >- determines how the markup will be rendered. <html></html>- identifies that the document is written in HTML. This tag sets boundaries by marking the beginning and end of pages.

<head></head>- contains the document title, and sets the global settings which effect the entire document. Used by search engines to determine whether it meets the required criteria.

<link> - references a style sheet <title></title>- created within the <head>, and is displayed at the top of the browser window. <body></body>- contains the bulk of the document, text, headings, links, graphics, etc. What you see on the screen resides here.

 

 

CIW Foundations (1D0-510)

Document Type Declaration (DTD) Every XHTML page must contain this declaration. ► 

<!DOCTYPE> o  An SGML statement that describes the nature of your code

 

► 

o Placed at the top of the document

No DOCTYPE

o  Two problems may arise:

  Unable control how the code renders in the future



  Unable to use a markup validator



► 

Each version and flavor of XHTML has its own DOCTYPE

Error! 

Text and paragraph formatting tags ► 

Block-level markup elements o  <p/> creates a blank line below text o  <br/> moves to next line

► 

Text-level markup elements o  <bold> or <strong>

► 

o  <i> or <em>

Heading tags

o  Automatically places formatting on text o  Levels 1 (large) through 6 (small)

  <h1> </h1>, <h2> </h2>, <h3> </h3>, <h4> </h4>, <h5> </h5>, <h6> </h6>



o  Used in Transitional HTML/XHTML ► 

Indenting and centering text o  <div align=―center‖ /> <div align=―right‖ /> />   o  <p align=―center‖ />

<p align=―right‖ />

 

 

CIW Foundations (1D0-510) o  <blockquote />

Lists ► 

Ordered o  A numbered list o  Uses the <ol> element and requires a closing tag </ol>

► 

Unordered o  A bulleted list o  Uses the <ul> element and requires a closing tag </ul>

Hyperlink Tags Hyperlinks connect pages to other pages and files on the Internet. Internet. Clicking on a text or image link will take you to a new Web page. ► 

Create a hyperlink o  The <a> anchor tag creates hyperlinks o  A container tag that encompasses the text or image (or both) to be used as a link

 

 

CIW Foundations (1D0-510) o  ► 

<a href="URL"> linked text or image (or both) </a>

Image links o  <a href=―http://www.chromezebra.com‖> <img src=―elephant.jpg‖ /></a>  /></a>  

► 

Uniform Resource Locator (URL)

URL UR L

De Des scri cription ption

E xa xam mple ples s

Fully Qualified (Absolute)

http://www.someserver.com/somepage.html A URL that contains a full path to a resource, including http://someserver.com/pub/~james/somefile.ext the protocol. Also known as a c:\intetpub\wwwroot\ccyp\syb\syb.html hard link.

Partial

A URL that assumes the syb.html current document’s path. All Specifies a file in the current directory references are made from the document’s current directory.  directory.   ../css/stylesheet.css Specifies a file one directory up from the current page

pub/images/mybullet.gif Specifies a file in a subdirectory

Internal Hyperlinks (Bookmarks) ► 

Target links within the page

► 

Attribute o  name

► 

Form o  <a name=―top‖>  name=―top‖>  o  Defines the internal bookmark (place it where you want it to go) o  <a href = ―#top‖>  ―#top‖> 

  Defines the link



  Note the # sign



 

 

CIW Foundations (1D0-510)

HTML tables ► 

Control content placement

► 

Aligns images and text

► 

Organizes information

►  ► 

Presents data that lends itself to tabular format Offers many formatting options

► 

In XHTML, do not use to structure entire pages

► 

Column and Row Spanning o  Allows rows or columns to span the table

 

 

CIW Foundations (1D0-510)

Comment Tags Add hidden comments by using the comment tag: <! — comments comments here -->

Document Object Model ► 

Vendor-neutral, cross-platform application programming interface (API)

► 

Specifies objects in a document that can be referred to and manipulated through scripting languages

► 

Describes the elements or objects, within a document

► 

A W3C standard

► 

Accessing a browser's DOM o  Must use a scripting language o  JavaScript or VBScript

► 

Factors when choosing a DOM Compliant browser o  Stability and security o  Authentication features o  Availability

2.2. Add images and graphical formatting to HTML files.

Adding images to Web pages ► 

Image tag o  <img src=―mypic.jpg‖ />  /> 

► 

Aligning images relative to text o  <img src=―image.jpg‖ align=―top‖></img>  align=―top‖></img> 

o  Values = top, middle, bottom ► 

Text description of image (ALT) o  <img src=―image.jpg‖ alt=―pigs‖>  alt=―pigs‖>   o  Include the alt attribute with a corresponding value o  Required to validate as XHTML o  Allows browsers and screen-readers to read the image description to the viewer

 

 

CIW Foundations (1D0-510)

Image maps These images contain clickable regions that are defined d efined as ―hot spot‖ that hyperlink to other pages or page sections. Two types: client or server side

Image map tags ► 

<map> </map>

o  <map name=―mymap‖ id=―mymap‖>  id=―mymap‖>  o  Names the image map o  Id is required to validate as XHTML ► 

<area> o  Defines regions in the image o  Attributes

  Shape -- defines the shape of the regions





  Rect, circle, polygon   Coords --specifies the coordinates of the map



  Href -- specifies the hyperlink



► 

<usemap> o  Can be placed before or after MAP coding o  Indicates that the image placed in the Web page will use a map

► 

#mapname o  Indicates that the map resides within the same page

 

 

CIW Foundations (1D0-510)

<body> backgrounds and color ► 

Background color o  <body <body bgcolor=―#FF0000‖ >  > 

► 

Background image

 

► 

o <body background=―pigs.jpg‖ >  > 

Text color

o  <body text="colorNameOrCode"> ► 

Unvisited link color o  <body alink="colorNameOrCode">

► 

Visited link color o  <body vlink="colorNameOrCode">

Image file formats ► 

GIF (Graphics Interchange Format) o  GIF 87a and GIF 89a o  Supports transparency, interlacing and animation o  Line art, images with 256 colors or less

► 

JPEG (Joint Experts Group) o  Supports 16+ million colors o  Photographs

► 

PNG (Portable Network Graphics) o  New format o  Quick loading, supports all colors o  Supports transparency (not supported in IE)

 

 

CIW Foundations (1D0-510)

2.3. Identify and use design and color principles for Web pages.

Design Considerations ► 

Popular color combinations o  Consider existing sites o  Cultural and audience concerns

► 

Culture and Audience o  Colors o  Professionalism

► 

Page layout o  Layout guidelines o  Document structure, the <div> tag and style sheets o  Relative path names o  White space, the <img> tag and XHTML

2.4. Create a basic HTML form that accepts user input. Web forms are used to obtain information from users. Input can include the user’s name, address or credit credit card number.

 

 

CIW Foundations (1D0-510)

Form Elements Text box –  box –  single  single line of text area –  specify  specify columns and rows of input area ►  Text area –  ► 

► 

Check box –  box –  allows  allows users to choose more than one item

► 

Radio button –  button –  forces  forces users to choose only one item

► 

Select list –  list –  drop  drop down menu of items

► 

Submit button –  button –  submits  submits the form to the server for processing

► 

Reset button –  button –  clears  clears the form

 

 

CIW Foundations (1D0-510)

Form Processing ► 

Scripts o  Sends, receives and processes data from a browser

► 

Common Gateway Interface (CGI)

 

o Server-side script o  Resides on the server o  Receives and processes the data ► 

Other types of scripting o  Client-side script o  Resides on the client o  Sends and formats the data

2.5. Create HTML frames.

What are HTML frames Frames are often used to contain items that visitors should always see (copyright notices navigation information, and so on). By placing this information in a static frame, it can always be there as the user scrolls through other information in another (dynamic) frame. The <FRAMESET> tag is used to define frames in the browser. Using it, you can define the number of columns and rows the frames will occupy. Beneath this, you add the <FRAME> tag to define the content in each frame. ► 

Frames are separate panes o  Each has its own URL

► 

Frameset Document o  Contains: <frameset>, <frame>, <noframes>

► 

Combines Static and Dynamic Information o  Static Frames

  Frames content remains the same



o  Dynamic Frames

  Changes in response to choices made in the static frame



  Non-printable frame



  Provides security



 

 

CIW Foundations (1D0-510) ► 

Noframes tag o  Used to display text or images in browsers that do not support frames o  Place right before the ending frameset tag

► 

Base Targets o  Automatically sets a default target for all links o  <base href=―url‖ target=―one‖>  target=―one‖>  o  Placed into the <head> section

► 

Inline Frame (floating frame) o  Inserts an HTML or XHTML document inside another o  <iframe> o  Browser reads the <iframe> tag o  Then requests the embedded file from the server

2.6. Define Extensible Markup Language (XML), and identify its features and appropriate use.

Extensible Markup Language (XML)

► 

XML documents have a tree structure

► 

Describes the function and context of the information

► 

Contains a Document Type Definition (DTD) o  Defines the syntax, structure and vocabulary

► 

Must be well-formed o  Contains a DTD and a root element

► 

Must be valid o  Must declare a DTD

 

 

CIW Foundations (1D0-510)

Server-side Languages ► 

Code is executed by the Web server, not the Web browser

► 

Code executes because an interpreter has been installed and activated on the Web server

► 

Server-side Scripts

 

o Browser detection o  Database connectivity o  Cookie creation and identification o  Logon scripts o  Hit counters o  File uploading and downloading

2.7. Identify essential Web site navigation issues, and ensure page/site accessibility.

Web page accessibility An accessible Web page has user-friendly, and accessible, front-end and back-end server resources that process and store user input. The World Wide Web Consortium (WC3) estimates that up to 10 percent of people have disabilities, and as such companies with a web presence should give some consideration to accessibility issues.

Addressing accessibility ► 

Visual challenges o  Ensure text readability o  Text support for images o  Screen reader support

► 

Audio challenges o  Provide alternative audio support o  Provide alternative speech input o  Text support for audio elements

► 

Cognitive and technical challenges o  No flashing images or strobes o  Provide alternative navigation

 

 

CIW Foundations (1D0-510) o  Provide audio support o  Provide low resolution alternatives ► 

Site maps o  Text map of the site o  Improves accessibility

2.8. Define and apply essential aspects of the Cascading C ascading Style Sheets (CSS) standard.

► 

CSS o  Adds formatting and structure to your pages o  Simple text file that contains instructions o  Benefits

  The site pages are linked to the same style sheet



  Changes to the sheet affect all pages across the site



o  Strict flavors of HTML and XHTML require that you use style sheets ► 

CSS Versions o  CSS1: Addresses format o  CSS2: Addresses multimedia objects

► 

Style Types o  Linked style

  The <style> and <font> tags in the HTML/XHTML file will override style sheets



  <link rel=―stylesheet‖ type=―text/css‖ href=―mysheet.css‖/> 



o  Inline style

  The <span> tag



  Can span multiple elements:



 

 

CIW Foundations (1D0-510)

  <span style="background: red">CIW Associate </span>



o  Embedded style

  Uses the <style> tag within the <head> section



  The style will remain in force until overridden



  <style> h1 {color: magenta; font-size: 20pt} </style>



o  Imported style

  Like a linked style sheet, refers to a separate file



  Created using the @import 



type="text/ css"> @import url(import.css); </style>   <style type="text/css">



2.9. Use Extensible Hypertext Markup Language (XHTML) to create Web pages.

Extensible HTML (XHTML)

► 

Latest formulation of HTML

► 

Allows HTML to become XML compliant

► 

Extends HTML by allowing HTML to converge with XML

► 

Used to organize data on the page

► 

More flexible than HTML

► 

XHTML flavors o  Transitional -- allows formatting to be specified within the document and deprecated tags o  Strict -- requires CSS for formatting, and does not allow deprecated tags o  Frameset -- for use with frames

► 

XHTML Rules o  Requires the use of container or non-empty tags o  Empty tags will not validate o  Uses an alternative non-empty tag

 

 

CIW Foundations (1D0-510)

  Alternative notation for stand-alone non-empty tags



  Place the slash ( / ) after the element name (before the closing wicket), rather than



before the element name, as in a standard closing tag o  All tags are in lowercase o  Requires a DTD at the top of every page

2.10. Identify technologies for enhancing the user's Web experience, including: programming languages, multimedia technologies. Enhance the user’s Web experience by b y building the following into the We Web b site: ► 

Audience development techniques o  Flash, Java o  Company logos o  Strategies developed by sales and marketing

 

o Push and pull technologies o  Visitor tracking ► 

Portal o  A Web site that acts as a centralized access point for other Web sites o  Portal types:

  Vertical: dedicated to a specific interest



  Horizontal: links to various sites



o  Portal benefits:

  Direct users to the best sites





  Attract users to products   Improve brand name



► 

Wiki site o  Allows all visitors to collaborate in its construction o  Wiki software is installed on a Web server o  You can lock down certain pages and leave others open to editing

 

 

CIW Foundations (1D0-510)

Active Content and Formats ► 

Common file formats and MIME types o  HTML: text/html o  JPEG: image/jpeg o  Cascading Style Sheets (CSS): text/css o  MPEG: audio/mpeg o  MP3: audio/mp3

► 

Evaluating proprietary formats o  Difficulty/inconvenience

  Difficult for end users to obtain or use



o  Cost

  Some require purchasing software



o  Audience limitation 

access    Limits disabled person’s access 

2.11. Use GUI-based HTML editing software to create Web pages.

Web site publishing ► 

GUI HTML editors have built-in publishing tools

► 

FTP is the standard protocol for Web page publishing o  Stand-alone FTP clients o  FTP client provided by GUI HTML editor o  Post to test server (staging server)

  Verify that pages work and render as expected



  Verify that CGI script works as expected



  Locate and repair dead links



  Allow stakeholders to preview the site



► 

Test server configuration o  Identical to production server o  Use the identical Web server software and CGI scripts

 

 

CIW Foundations (1D0-510)

2.12. Test and analyze Web site performance issues.

Verify accessibility ► 

Use the following tools: o  Bobby (www.cast.org/bobby)  o  STEP508 (www.secti on508..gov)  www.section508

o  RetroAccess (www.retroaccess.com) 

► 

Improve accessibility o  Adhere to the XHTML 1.0 standard o  Use cascading style sheets

Calculate download times ► 

Check the size of the HTML file and all associated images, files or programs

► 

Determine the speed of your network connection

► 

Convert the connection speed and file size to common units of measure (e.g., bytes or bits)

► 

Divide file size by connection speed

► 

Calculate download time o  (File Size in bytes x 8) / by connection speed o  65KB file = 65x1000 = 65000bytes x 8 = 520000 bits o  Modem speed = 56Kbps = 56000bps o  Time = 520000/56000=9.3seconds

2.13. Identify steps in the Web site planning and development process. ► 

The Web site development cycle

► 

Development team members

► 

Web site requirements

► 

Determining the audience for the Web site

► 

Web site plan documentation

► 

Presenting the Web site plan

► 

Improving the Web site

 

 

CIW Foundations (1D0-510)

The Web site development cycle ► 

Create and document an initial Web site plan o  Create a site plan (rough outline of planned development) o  Determine audience and message

► 

o  Validate design issues

Obtain relevant input from stakeholders o  Relevant organization, employees or contributors o  The purpose of the Web site o  The services that the audience requires from the site o  Development timelines

► 

Communicate the Web site plan o  Documenting

  Create a storyboard





  Document decisions in meetings and follow up

o  Communicating

  Calling relevant parties to ensure that everyone is satisfied



  Present the plan



  Lead discussions



  Address technical and non-technical issues



► 

Develop the site o  Create Markup code o  Test code with browsers o  Approve the site

  Ensure that everyone is in agreement



  Obtain written approval



► 

Publish the site o  Requirements

  The IP address and/or DNS name of the site



  User name and authentication information



  The destination directory (i.e., folder) on the Web server



o  Space requirements

 

 

CIW Foundations (1D0-510)

  The protocol for uploading the site



► 

Manage the site o  Create new content o  Update dead links o  Remove old sites o  Remove unused pages o  Ensure connectivity o  Report access troubles o  Process feedback from customers and stakeholders

2.14. Identify essential issues in developing and maintaining a Web site, including: project management, testing, legal issues. ► 

Intellectual Property o  A unique product or idea created by an individual or organization o  Your responsibilities

   Never ―borrow‖ content without express, written consent  consent 



  Review copyright and trademark issues (e.g., trade secrets, licensing, infringement,



plagiarism)

  Understand copyright scope, reach and time limits



  Consider ethical issues of copyright, trademark and plagiarism



o  Avoid copyright infringement, trademark infringement and plagiarism by:

  Reviewing content





  Obtaining express, written consent   Creating reasonable deadlines



► 

Manage Hyperlinks o  Periodically check internal and external links o  Use automated link-checking software

 

 

CIW Foundations (1D0-510)

2.15. Plan and deliver oral presentations of your Web site, during and after site development.

Obtain feedback on your site design ► 

Comes from various sources

► 

Ways to obtain quality feedback o  Providing Web forms on the site that ask for customer input o  Conducting surveys in person o  Conducting surveys via e-mail

Communication forms ► 

Presentations o  Use oral presentations and presentation aids

  Presentation software



  Overhead projection



  Whiteboards



  Easel and poster paper



  Charts



  Published handouts



► 

Leading Discussions o  Make introductions o  Recall past business o  Create a list of action items, including timelines o  Monitor time o  Ensure proper discussion focus o  Handle heated discussions o  Distribute minutes

► 

Addressing technical and non-technical issues o  Regularly asking if anyone has questions o  Asking team members to summarize their understanding of decisions o  Asking a third party to deliver a summary of progress

 

 

CIW Foundations (1D0-510) o  Writing regular updates about the project

2.16. Define electronic commerce (e-commerce) and related technologies and concepts necessary necessary to develop a secure, useful interface (i.e., storefront).

Traditional vs. Electronic Commerce ► 

Similarities o  Both aim to deliver a valued product or service o  Both want to serve a large audience o  Both strive to quickly deliver products and services

► 

Differences o  E-commerce customers expect shorter fulfillment time o  E-commerce customers must understand Web-based technologies o  E-commerce provides a global audience o  E-commerce orders are processed without human interaction or travel to a store location o  E-commerce relies upon encryption for security

Methods of e-commerce ► 

Business to consumer (B2C) o  Targets consumers or end users, and sells products and/or services

  Amazon.com, small business sites



► 

Business to business (B2B) o  Helps organizations to manage relationships and transactions with other businesses

  B2BExchange



► 

Consumer to consumer o  Not a traditional B2C model

  eBay



 

 

CIW Foundations (1D0-510)

E-commerce technologies ► 

EFT (wire transfer) o  Ability to transfer funds using computers rather than paper o  Ensures: 

  Confidentiality of payment information   Integrity of payment information



  Merchant authentication



  Interoperability



► 

Automated Clearing House (ACH) o  Governed in the United States by the National Automated Clearing House Association o  Used in EFT

► 

Secure Electronic Transactions (SET) o  Uses digital certificates to secure financial transactions o  Public and private keys ensure encryption, data confidentiality and non-repudiation o  Designed to allow both simple and complex transactions

► 

Open Trading Protocol (OTP) o  Alternative to SET

  An open standard



  Used for B2C and B2B



  Often used with XML



o  Features

  Provides trading protocol options to control the way that the trade occurs



  Provides a record of a particular trade   Supports real and virtual delivery of goods and services (payment tracking)





 

 

CIW Foundations (1D0-510)

Secure transactions ► 

SSL/TSL o  Not a transaction method o  Used to secure transactions o  Services

  Authentication



  Data confidentiality



  Data integrity



► 

Digital certificates o  Enable host authentication before an SSL session begins

► 

Public Key Infrastructure (PKI) o  A collection of individuals, networks and machines o  Authoritatively confirm the identity of a person, host or organization

► 

The SSL/TLS handshake o  Negotiation between the client and server

  Negotiates the encryption key



  Server authenticates client



  Symmetric key is shared between the client and server



► 

Beginning an SSL/TLS session o  Encryption begins after authentication o  Issues:

  Different host name



  Certificate expired   Certificate date not yet valid





  Invalid certificate format



  Certificate presented by the server not signed by a recognized CA



  Incompatible encryption settings



 

 

CIW Foundations (1D0-510)

Global Environment The Internet opens up avenues to potential international customers. As the global market continues to expand, the following issues must be addressed: ► 

Currency and Trade o  Countries and Economic Blocks (European Union)

  Uses its own currency



o  Businesses and Organizations

  Automatically calculate exchange rates for the day of the transaction



  Calculate taxes and tariffs on goods



► 

International Shipping o  Issues

  Customs searches



  Costs incurred by customs



 



Delays caused by customs

o  All tariffs

o  Legal and regulatory issues ► 

Language Concerns o  Considerations

  The language(s) used by the target audience



  The characters necessary (e.g., alphanumeric, mathematical or currency symbols)



o  Character sets and languages

  Computers can use different character sets





  Unicode

2.17. Demonstrate knowledge of languages commonly used to provide database connectivity to Web sites.

Server-side languages PHP

An interpreted server-side scripting language for creating dynamic Web pages, embedded in HTML pages but usually executed on a Web server

 

 

CIW Foundations (1D0-510) Perl

Server-interpreted language

ASP

-side scripting solution Microsoft’s original server -side

C

A procedural language usually used to create stand-alone applications and operating systems (e.g., UNIX/Linux). Can also be used for CGI

C++

Object-oriented language, not procedural, links data to the processes that manipulate it, creates reusable objects that can then be manipulated throughout the program, platform dependent: Must be compiled to a specific architecture

Java

Object-oriented, platform-independent platform-indep endent Can run on any operating system that has the Java interpreter installed

VB

A compiled programming language developed by Microsoft Corporation Used for stand-alone applications and server-side Web applications Easier to use than C++ and Java

C#

Object-oriented, compiled, platform-dependent Used for Microsoft .NET program

SSI

An instruction inside of an XHTML/HTML page, directs the Web server to perform an action. An alternative to CGI

Client-side languages ► 

JavaScript o  Object-based

 

o Adds interactivity to Web pages o  Can also be used on the server side (Server-Side JavaScript, SSJS) ► 

Function o  Detect browsers o  Create cookies o  Create mouse rollovers

► 

VBScript o  Microsoft Microsoft’s ’s answer to JavaScript  JavaScript  o  Can be used on the client side or the server side

 

 

CIW Foundations (1D0-510) o  If used on the client side, only Internet Explorer can render the script

Common Gateway Interface (CGI) ► 

Helps Web pages pass information to and from databases

► 

Provides active content (e.g., hit counters)

► 

Provides dynamic content

The role of Structured Query Language in Web sites SQL is used to create and maintain databases. SQL retrieves the data in the form requested by the web page. ► 

Structured Query Language (SQL) o  Advanced powerful language for accessing databases

► 

Commands o  SELECT -- requests data from a particular table or table row o  FROM -- delimits the beginning search point in a table or table row

o  WHERE -- delimits the ending search point in a table or table row o  JOIN -- creates a new table from selected data o  SUM -- adds numerical information within records

Database connectivity technologies ► 

Connecting to a Database o  Requires that web server and database recognize each other

  Microsoft systems can use ODBC



  Other methods include PHP scripts



o  Provide read and/or write permissions to the database o  Provide scripts that have the correct permissions and execute privileges

Multiple tier applications ► 

Database Elements o  Data  

The database file, or multiple database files

 

 

CIW Foundations (1D0-510) o  Business logic  

The SQL coding necessary to create relationships with the data stored in the database

o  Presentation  

► 

The way that data and business logic are presented on the user screen

In n-tier, all three database elements are separated o  Tier 1 -- the Web browser is responsible for presenting information o  Tier 2 -- the Web server is responsible for the programming logic o  Tier 3 -- the database server is responsible for housing data and transferring it to the

Web server

2.18. Identify the benefits and drawbacks of running your own Web server versus using a service provider.

Configuring your own hosting solution ► 

Benefits o  Control over services o  More choices

► 

Drawbacks o  Purchase and house all hardware/software o  Configure and manage all

Using an ISP ► 

Benefits

 

 

CIW Foundations (1D0-510) o  No hardware or software purchase o  ISP configures server ► 

Drawbacks o  Fewer configuration choices o 

Only given basic services

Using an ASP ► 

Benefits o  No hardware or software purchase o  Provides complete services o  Creates custom solutions

► 

Drawbacks o  More costly than ISP o  Dependent on ASP’s management management and security

2.19. Identify common strategies for managing an end user's experience and improving site creativity.

Branding A Web page is often part of a larger marketing and sales strategy. It aids in creating and ensuring brand recognition (name recognition) and presenting a strong company message. A Web site allows a company to create a market, a mind share and a brand.

2.20. Consider copyright and ethical issues when creating Web pages. Ethical issues occur when outsourcing work. Ensure that when you provide Web development work to workers in remote locations that you require Non-Disclosure Agreements (NDAs) from each worker and get legal advice.

 

 

CIW Foundations (1D0-510)

Domain 3: Network Technology Foundations –  30%  30% 3.1. Demonstrate knowledge of basic data communications components, and demonstrate technical knowledge of the Internet. ► 

Basic network topologies

► 

OSI Reference Model

► 

TCP/IP essentials

► 

LAN and WAN definitions

► 

Internet infrastructure components

► 

Network Operations Center

Basic network topologies ► 

Bus Networks o  All components use the same cable o  Data is sent to everyone on the cable o  Advantages: relatively simple and inexpensive o  Disadvantages: a broken cable effects the entire network, when

one node fails, all fail, and isolating problems can be difficult ► 

Star Network o  Network nodes are connected through a central device o  When one node fails, the rest still function o  Advantages: network expansion and reconfiguration is simple, and

management and monitoring are centralized o  Disadvantage: if the central device (hub) fails, the network fails ► 

Ring Network o  No central connection point

 

 

CIW Foundations (1D0-510) o  Nodes connected to each other through ring o  Connect through a Multistation Access Unit (MAU) on the ring o  Advantages: All computers have access to data and perform well

with heavy traffic o  Disadvantages: Network expansion affects network operation ► 

Mesh Network o  The Internet is an example of mesh topology o  Devices are connected with multiple paths o  The best path can be chosen o  Advantages: if one connection fails, another connection sends the data o  Disadvantage: hardware requirements increase costs

 

 

CIW Foundations (1D0-510)

OSI Reference Model The ISO (International Standards Organization) created the OSI (Open Systems Interconnection) model to outline networking. They defined the functions that must take place between machines in order to have a network, and broke them into seven distinct parts, or layers.

. ► 

Purpose o  Reduces complexity o  Standardizes interfaces o  Facilitates modular engineering o  Ensures interoperability o  Accelerates evolution o  Simplifies teaching and learning

Memorize this table L ay aye er

Nam Name e

F unc uncti tion on

Proto Pr otoco cols ls

7

Application

File transfer, network management. Provides services to application processes that are outside of the OSI model.

SMTP, POP3, IMAP, HTTP, FTP, Telnet, NTP, SNMP

6

Presentation

Provides transformations on data so that it is presentable. Example: Converts ASCII text into binary code

 

 

CIW Foundations (1D0-510) 5

Session

Establishes, manages and terminates sessions (connections) between applications. Adds traffic flow information.

4

Transport

Provides reliable transport of data between end points. Uses error detection-and-recovery and information flow control. Organizes data into datagrams (packets), provides reliable addressing and determines the proper path –  path  –   routing.

3

Network

2

Data Link

Provides reliable transit of data across a physical link. Prepares data to be placed on the transmission media (cable).

1

Physical

Transmits and receives bits. Defines electrical and procedural specifications for activating and maintaining the physical link between end systems.

TCP, SPX

IP, IPX

Ethernet, Token Ring

Networking Protocols The following protocols address the OSI/RM architecture protocols. Note: TCP/IP uses more protocols than the OSI/RM.

Protocol terms ► 

Connection-Oriented (stateful) o  Requires a connection at both ends before sending a packet across the network

► 

Connectionless (stateless) o  Packet is sent without establishing a connection first

► 

Routable o  TCP/IP and IPX/SPX o  Travels through a router

► 

Non-routable o  NetBEUI, NetBIOS, SNA, LAT, DLC o  Uses predefined routes (static)

 

 

CIW Foundations (1D0-510)

Protocols ► 

Transmission Control Protocol/Internet Protocol (TCP/IP) -- routable o  Default collection of protocols for the Internet o  TCP

  Connection-oriented (stateful)



  Ensures reliable communication



o  IP

  Connectionless (stateless)



  Provides addresses



o  User Datagram Protocol (UDP)

  Connectionless (stateless)



► 

IPX/SPX -- routable o  Created by Novell o  IPX

  Connectionless protocol



  Responsible for addressing and forwarding packets



  Operates at the network layer



o  SPX

  Connection-oriented protocol



  Provides reliability



  Operates at the transport layer



► 

NetBEUI –  NetBEUI   non-routable protocol  –  non-routable

► 

NetBIOS

o  Used for Microsoft peer-to-peer networks o  Mainly used as a programming interface

► 

AppleTalk o  Macintosh protocol divides networks into zones

 

 

CIW Foundations (1D0-510)

TCP/IP essentials TCP/IP (Internet Protocol Suite) came before an OSI model. All of the functions of networking are performed, but in a 4-layer model and not the 7 layers of OSI. To a great degree, the layers match up as shown below:

Memorize this table OSI

T CP/I P

Application Presentation

Application

Pro Proto toc cols HTTP, FTP, TFTP, TELNET, NNTP, SMTP, SNMP, DNS, BOOTP, DHCP

Session Transport

Transport

TCP, UDP

Network

Internet

IP, ICMP, IGMP, ARP, RARP

Data Link

Network Access

Ethernet, WAN, LAN

Physical

TCP/UDP Ports Some applications require a connection to be established between two computers before they can communicate, while others do not. For example, to retrieve a file from a server, a connection must be established. To send email that arrives several minutes later, a connection need not be established. Applications requiring a connection use TCP (Transport Control Protocol), while those that do no use its counterpart, UDP (User Datagram Protocol). Port numbers are used by TCP/UDP to listen for and respond to requests for communications. Common port assignments are as follows: ►  Ports o  Contained in packet information o  Used to direct the information to the correct destination o  FTP = 21 o  HTTP = 80 o  DNS = 53 o  SMTP = 25 o  Well-known ports

 

 

CIW Foundations (1D0-510)

  0 –  1023  1023



o  Registered Ports

  1024 1024 –   –  49151  49151



o  Dynamic

 



49152 - 65535

Protocol States Before a protocol becomes a standard, it must go through four states. ► 

Experimental –  Experimental  not intended for operation except in experiment  –  not

► 

Proposed –  Proposed  testing and research stage  –  testing

► 

Draft –  Draft  test results are analyzed, feedback is requested  –  test

► 

Standard –  Standard  –  becomes  becomes a standard

► 

Other states o  Historic Historic –   –  protocols  protocols replaced by more recent ones o  Informational Informational –   –  protocols  protocols developed outside of the IETF (usually by vendors)

Networks Collections of computers designed for communication. ► 

Local Area Network (LAN) o  A group of computers connected within a confined geographic area o  Commonly used for intraoffice communication

► 

► 

Wide Area Network (WAN) o  A group of computers connected over an expansive geographic area Network Access Points (NAP) o  Junction between high speed networks o  Joins LANs and WANs together o  Uses routers or switches o  Internet backbones

 

 

CIW Foundations (1D0-510)

3.2. Identify the role of networking hardware, and configure common hardware for operation.

Network Components These are the hardware components required to connect the network. ► 

Network Interface Card (NIC) o  Interface between the computer and the network

► 

Repeaters o  Low level devices that amplify a signal, allowing it to travel farther o  Operate at the physical layer

► 

Hub o  Central component in a star network o  Operates at the physical layer

► 

Bridge o  Device that filters frames based on physical addresses (MAC) o  Reduces network traffic by dividing the LAN into segments o  Operates at the data link layer

► 

Routers o  Forwards messages based on logical addresses(IP) o  Used to connect LAN segments to WANs o  Uses routing tables to track routes to other networks

► 

o  Operates at the network layer

Switches

o  Direct the flow of information from one node to another o  Operates at layer 2, data link layer o  Benefits:

  Simple installation



  Higher speeds



  Bandwidth control



  Creates logical computer groupings (VLAN)



 

 

CIW Foundations (1D0-510)

  More default security



► 

Gateways (protocol converters) o  Operates at any layer o  Connects networks running different protocols

► 

Channel Service/Data Service Unit (CSU/DSU) o  Terminates physical connections o  Used with T1 lines

► 

Modems o  Device that translates analog (phone) signals into

digital (computer) signals ► 

Patch Panels o  Centralized connection point between cables from other locations can be connected to each

other ► 

Firewall o  Secure computer placed between a trusted and untrusted network o  Acts as a barrier against malicious activity

Transmission Media

LAN Standards IEEE 802.2

Divides the OSI Data Link layer into two sublayers: LLC

 

 

CIW Foundations (1D0-510)

and MAC Ethernet/IEEE 802.3

All Ethernet LANs

IEEE 802.3u

Fast Ethernet

IEEE 802.3z and 802.3ab

Gigabit Ethernet

IEEE 802.5

Token Ring

IEEE 802.12

100VG-AnyLAN, Supports access method called demand priority

WAN Standards X.25

Original packet-switching packet-switchi ng from ARPANET. Uses fast packet switching on the Internet.

Frame relay

Uses fiber-optic and digital cabling, variable length packets, Permanent Virtual Circuits (PVC) and logical end-to-end connections. Operates at 64Kbps –  64Kbps –  1.544  1.544 Mbps

ATM

Use both LAN and WAN, fixed-length packets, and operates at 155 –  155 –  622  622 Mbps

T and E-Carrier System The T-carrier system is the digital transmission format for North America and the E-carrier system is the European equivalent.

Routing IP requires routing. This is when a path is chosen by a router to move packets between networks. There are two types of routing and several protocols.

 

 

CIW Foundations (1D0-510) ► 

Direct Routing o  Sends information to hosts within the same physical network

► 

Indirect Routing o  Packets move between outside networks, requiring a router

Routing Protocols ► 

Interior Protocols o  Used within a company network

  RIP



o  Protocol that maintains the best closest route to a destination

  OSPF



o  Protocol that uses bandwidth, connections and security to determine the best route to a

destination ► 

Exterior Protocols o  Used outside a company network o  EGP, BGP

3.3. Identify the relationship between IP addresses and domain names, including: assignment of IP addresses within a subnet. ► 

IP addressing

► 

Valid IP addresses

► 

Public and private IP addresses

► 

Subnet masking

► 

Classless Interdomain Routing (CIDR)

► 

Ipv6

IP Addressing IPv4 addresses are 32-bit binary numbers. Because numbers of such magnitude are difficult to work with, they are divided into four octets (eight bits) and converted co nverted to digital. Thus, the binary string ―01010101‖ ―01010 101‖ becomes 85. This is important because the limits on the size of the digital number are placed there by the

 

 

CIW Foundations (1D0-510) reality that it is just a representation of a binary number. The range must be from 0 (00000000) to 255 (11111111) per octet, making the lowest possible IP address:

Address Form ► 

Contains the network portion (N) and host portion (h)

► 

Consists of four 8-bit fields (octets) –  (octets) –  total  total 32 bits

► 

Uses dot notation o  125.25.2.0 o  First value (octet) determines the address class

Class ass

For orm m/P /Pur urpos pose e

Rang ange e

A

N.h.h.h

1 – 126 126

B

N.N.h.h

128 – 191 191

C

N.N.N.h

192 – 223 223

D

multicasting

224 –  224 –  239  239

E

future use

240 –  240 –  247  247

Loopback

troubleshooting

127

Broadcast

broadcasts to all

255

Reserved

private networks

10, 172, and 192

Public and Private Networks Public networks use public IP addresses assigned to them. You are required to have a public address to communicate on the Internet. Private addresses are used within a network.

Subnetting Subnetting your network is the process of taking the total number of hosts available to you, and dividing it into smaller networks. When you configure TCP/IP on a host, you must use the following: ► 

A unique IP address

 

 

CIW Foundations (1D0-510) ► 

A default gateway (router) address

► 

A subnet mask

Subnet Masks (net mask) ► 

32 bit address similar to IP

► 

Distinguishes network and host portion of IP address

► 

255 placed into the network portion of the address

► 

Class A 255.0.0.0

► 

Class B 255.255.0.0

► 

Class C 255.255.255.0

Internet Addressing ► 

Decimal Form: 125.25.2.0 o  Contains the network portion (N) and host portion (h) o  Composed of 4 decimal values divided by dot notation

► 

Binary Form: 01111101.00011001.00000010.00000000 o  Consists of four 8-bit fields (octets) = total 32 bits o  Each field represents a value

► 

ANDing o  Adding the subnet mask to the IP address in binary form

IPv4 vs. IPv6 Internet growth has produced a shortage of IPv4 addresses which has prompted a change in the addressing schema. This change, called Internet Internet Protocol v6, is contrasted with IPv4 below:

 

 

CIW Foundations (1D0-510) ► 

Shortcomings of IPv4 o  Limited address space o  Lack of security o  Speed problems o  Configuration problems ► 

Strengths of IPv6

o  More efficient and requires less administrative overhead than IPv4 o  Provides a practically unlimited number of IP addresses o  Less dependent on routers

3.4. Identify the functions and components of servers commonly used on the Internet.

Internetworking Server Types Server

Description

File and Print

File: stores data files and programs that can be shared by network users

DNS

A distributed database used on the Internet to translate host computer names into IP addresses and matches the IP address to the Internet URL.

Proxy

An intermediary between a network host and other hosts outside the network. Provides enhanced security, manages TCP/IP addresses, speeds Internet access by caching Web documents and replaces network IP address with another, contingent address.

FTP

Uploads and downloads files. It is faster than email and HTTP. Files of 2 MB or greater should be transferred by FTP

HTTP

Acts as delivery system by requesting documents from web servers.

Print: allows multiple users to send print jobs to the same physical printer

Uses the MIME (Multipurpose Internet Mail Extensions) protocol to identify files types, and encodes and decodes the files. Database

Presents relational databases and makes it possible for remote individuals to access the data. Uses SQL to create, maintain and query databases.

 

 

CIW Foundations (1D0-510) News

Uses Network News Transfer Protocol (NNTP) to post information online in a hierarchical form. Creates secure newsgroups by enabling user-specific password protection or by using an SSL session.

Certificate

Validates or certifies keys (calculated text strings used for security)

Directory

Identifies all resources on a network, and then makes them available to authenticated users. Enables a company to reuse information in its directory. Protocols: X.500: used to manage user and resource directories. Provides scalability, synchronization and replication. LDAP: TCP/IP protocol that allows communication on both intranets and the Internet.

Media

Provides streaming audio and video over a network. Uses UDP (connectionless protocol) ports and buffers to achieve the effect of a realtime connection.

Transaction

Guarantees that all required databases are updated when a transaction takes place.

Mail

Stores/forwards e-mail messages using protocols: SMTP –  SMTP –  sends  sends email; POP –  POP  receives email; IMAP –  IMAP –  stores  stores and forwards email.  –  receives

Mailing list

Forwards an e-mail message to every member on a distribution list

Catalog

Indexes databases, files and information and allow keyword, Boolean and other searches.

3.5. Identify common Internet security and availability issues, including: useruser level and enterprise-level concerns.

Network Attack Types ► 

Spoofing (masquerade) o  Host or program assumes an identity of a network device o  Victims assume they are communicating with legitimate source

► 

Man-in-the-middle (hijacking) o  Packet sniffing –  sniffing –  intercepts  intercepts data o  Connection hijacking –  hijacking –  completes  completes a connection

 

 

CIW Foundations (1D0-510) o  Replay Replay –   –  modifies  modifies a message to resend it to someone else ► 

Denial-of-service (DOS) o  A system is flooded with packets o  Result: system shuts down

► 

Distributed Denial-of-service (DDOS) o  Use multiple applications to flood the system o  Result: system server data connection down

► 

Brute force o  Attempts to break the authentication code to access the system (logon and passwords) o  Uses random values

► 

Dictionary o  Repeated attempts to guess a password o  Uses a file of words

► 

Back door o  Commands allow access to system

► 

Buffer overflow o  Occurs when a legitimate application exceeds the memory buffer allocated to the OS

► 

Trojan horse o  Hides a command within a common function to cause a breach in security

► 

Social engineering o  Convinces people to reveal sensitive information

► 

Virus o  Malicious program designed to damage computers, networks

o  Types

  Macros/script Macros/script –   –  in  in Microsoft Word or Excel



  File infecting –  infecting –  attaches  attaches to executable files



  Boot sector –  sector –  copies  copies to boot sector, resides in memory



  Stealth Stealth –   –   redirects redirects hard drive requests from anti-virus software



  Polymorphic Polymorphic –   –  executes  executes differently every time it runs



  Retro Retro –   –  specifically   specifically attacks anti-virus software



► 

Worm

 

 

CIW Foundations (1D0-510) o  Similar to virus o  Replicates in order to use up system resources

OSI/RM security services ► 

Authentication o  Methods o  What you know –  know –  using   using passwords

  Strong passwords: upper, lower case letters, numbers, non-alphanumeric characters,



etc.

  No nicknames or personal info, no repeated letters or digits



o  What you have –  have –  using  using a physical key o  What you are –  are –  using   using fingerprints, signatures, etc. ► 

Encryption (see Domain 1) o  Symmetric

o  Asymmetric o  Hash function

► 

Virtual Private Network (VPN) o  Allows secure communication across long distances, usually for a company extranet o  Transmits data using encapsulation (tunneling)

  encryption occurs at the source and decryption occurs at the destination



► 

Remote Access Server (RAS) o  Uses dial-up modems to dial up, connect and log on to RAS o  Offers security through a callback feature

► 

Digital Certificates o  Provide authoritative identification o  Verify the sender's identity o  Generated and authenticated by a certificate server o  A third party verifies the legitimacy of the certificate

► 

PKI Certificate Authority servers o  Are repositories for managing digital certificates o  Enable the secure creation and management of digital certificates

 

 

CIW Foundations (1D0-510) o  Provide the ability to revoke an invalid key ► 

Firewalls –  Firewalls  –  acts  acts as a choke point o  Secure computer system placed between a trusted and untrusted network (Internet) o  Filters packets, detects intrusions, provides enhanced password authentication

 

o Types

  Packet filtering –  filtering –  inspects  inspects each packet for predefined content



firewall –  resides  resides inside inside your company’s internal network     Internal firewall – 



Proxy –   replaces the network IP address with a single IP address   Proxy  –  replaces



gateway –  Acts  Acts as a proxy between the Internet and your internal systems   Circuit-level gateway – 



gateway –  Same  Same as a circuit-level gateway but at the   Application-level gateway – 



application level ► 

Network Access Translation o  The practice of hiding internal IP addresses from the external network

► 

Security Zones o  DMZ

  A mini-network that resides between a company's internal network and the external



network o  Intranet

  A security zone available only to authorized organization employees



o  Extranet

  A private network that allows selected access to outsiders only after they provide



authentication information o  VLAN

  A logical grouping of hosts, generally not implemented by a firewall



► 

Firewall topologies o  Packet filter o  Dual-homed bastion host

  Computer with two NICs with IP forwarding disabled



o  Triple-homed bastion host

  Separates the Internet, intranet with the demilitarized zone



 

 

CIW Foundations (1D0-510)

o  Screened subnet (back-to-back firewalls)

  Uses external and internal routers



3.6. Identify common performance issues affecting Internet clients, including: analysis, diagnosis. TCP/IP workstation configuration ► 

Requirements o  IP address, subnet mask, default gateway, the router’s address  address  

► 

TCP/IP Services o  Domain Name System (DNS)

  Resolves names to IP addresses



o  Windows Internet Naming Service (WINS)

  Legacy name resolution



  Provides a NETBIOS name and receives an IP address



► 

Dynamic Host Configuration Protocol (DHCP) o  Automated IP address assignment from a server

► 

Automatic Private IP Addressing (APIPA) o  Creates a private address when an address from a DHCP server is unavailable

Diagnostic tools ► 

Ping: determines connectivity between source and destination

► 

Tracert or Traceroute: determines the path between source and destination

 

 

CIW Foundations (1D0-510) ► 

Netstat: displays the contents of network data structures

► 

Ipconfig (WinNT, 2K or XP) winipcfg (Win 95, 98, Me) o  Displays the physical address, the IP address, subnet mask and default gateway

► 

Network Analyzers: Captures data as it moves through the network

3.7. Perform basic hardware and system maintenance for network-aware systems.

Computer system maintenance ► 

Fix hardware problems o  Components are plugged in o  Components are turned on o  Components are connected properly in order to operate (such as connecting the keyboard to

the computer) ► 

Periodically clean hardware components o  CD-ROMs

  Keep the drives closed when they are not in use



  Check all media for foreign matter before inserting into the drive



  Handle disks only by the edges



  Avoid scratching the disc surface



  Never directly touch or try to manually clean the laser



  Brush away and vacuum accumulated dust



  Manually eject a stuck disc by inserting a wire into the small hole on the face of the



drive, then pressing hard until the disc is ejected ►  Establish a preventive maintenance plan

Computer system components ► 

Mainboard o  Main circuit board in a computer o  Must be securely fastened to system chassis o  Should never touch anything metal, except through proper connections

► 

Interrupt Requests (IRQs)

 

 

CIW Foundations (1D0-510) o  Hardware lines used to identify when a device wants to communicate with the processor ► 

I/O address o  Memory location that allows the system processor and system devices to communicate

► 

► 

Direct Memory Access (DMA) o  Allows a device to access system memory directly, bypassing the processor

Common Interfaces –  Interfaces –  used  used to communicate between storage devices and mainboard o  IDE/EIDE

  IDE is also known as Advanced Technology Attachment (ATA)



  IDE/EIDE interface cables are long, thin and gray in appearance



  EIDE (ATA-2) is an enhanced version of IDE that provides higher drive capacities



o  SATA

  Provides faster speeds than standard ATA



o  SCSI 

  Multiple devices can be connected to a single controller in a daisy chain configuration   SCSI daisy chain must be terminated at both ends, and only at the ends



► 

NIC (transceiver) o  Network devices must have a network interface card (or

network adapter card) o  Makes the physical connection between the device and the

network cabling o  Converts the data from the computer into a format

appropriate for transmission over the network ► 

Peripheral Ports o  PS/2-style ports

  Mouse and keyboard



o  Serial ports:

  Communicate using serial asynchronous communication



  Used for serial communication devices



o  Parallel ports:

  Communicate using parallel communication



  Used for parallel communication devices



o  USB ports:

 

 

CIW Foundations (1D0-510)

  Communicate using serial communication



  Support as many as 127 peripheral devices in a daisy chain configuration



o  FireWire (IEEE 1394):

  A high-speed serial interface to which you can daisy chain as many as 63 peripheral



devices

  Good for devices that need to transfer large amounts of data



► 

CD-ROM o  An optical storage device from which data can be read only

► 

Writable CD-ROM o  Creates, or "burns," data and audio CDs

► 

DVD o  Optical storage device from which data can be read only o  Similar to CD-ROMs but have higher storage capacity

3.8. Manage fundamental elements of modern network-based client operating systems.

Software Licensing Purchasing software provides the rights to use the software, not the ownership. Read the license carefully to ensure that you are not infringing on copyright. In addition, if the software is unlicensed you will not have documentation, warranties, product support and may open system to viruses.

Partitions and logical drives Recovering from a disk failure or installing new operating system software, you will have to partition your disk and identify logical drives. ► 

Disk Partition o  Divide the disk storage space o  Primary partition

  The system’s boot drive, used for system startup  startup  



o  Extended partition

  The remaining drive space after you create the primary partition



► 

Logical Drives

 

 

CIW Foundations (1D0-510) o  Each partition must be assigned a logical drive identifier o  A primary partition is treated as a single logical drive o  An extended partition can be divided into multiple logical drives (drives D and E in figure)

► 

File system Types o  FAT, FAT32

  Not a secure format



o  NTFS (Windows)

  Allows permission bits to be set on system resources



  Protects files so that only certain users or groups of users can read them



o  Ext3 and ReiserFS (Linux)

File system management tools These tools will help maintain the hard drives. Maintaining your hard drive will result in more efficient performance. ► 

Disk Defragmenter o  Recombines the files in a contiguous cluster

  As files are created and deleted, a partition can become severely fragmented



  Fragmented files are no longer located in contiguous clusters



► 

Chkdsk Utility o  Create and display a status report for a disk based on its file system o  List and correct errors on the disk

► 

o  Display the status of the disk in the current drive

Disk Cleanup Utility

o  Recovers disk space by removing temporary files, unused applications, files in the Recycle

Bin, files downloaded as part of Web pages or files created when Chkdsk attempted to recover lost file fragments. o  Compresses files ► 

Backup and Restore o  Stores copies of folders and files to a source other than the computer's hard o  Ensure that data can be recovered if a hard drive fails

 

 

CIW Foundations (1D0-510)

Remote management and troubleshooting ► 

Telnet o  TCP/IP command that establishes a remote connection with a server

► 

► 

Secure Shell (SSH) o  Protocol and command interface that can gain secure access to a remote computer

Virtual Network Computing (VNC) o  Program that controls a remote computer o  Two components o  A server that listens to a specific port o  The viewer, which shows shows the remote system’s logon environment

► 

Remote Desktop o  Windows XP service used to gain access to a Windows session that is running on another

computer 

  Allows multiple users to have active sessions on a single computer   Allows you to switch from one user to another on the same computer



► 

Remote Assistance o  Windows XP service used to seek help from a remote user

3.9. Configure and troubleshoo t roubleshoott wireless networks.

Wireless Network Technologies Note: the difference between cabled and wireless networks is the medium. ► 

Wireless Access Point (WAP) o  Central access point o  Acts like a hub or switch

► 

WAP security features o  Wired Equivalency Privacy (WEP) o  Encryption in 64 –  64 –  256bit  256bit keys o  MAC address filtering o  Allows only certain MAC addresses to access the network

 

 

CIW Foundations (1D0-510)

Transmission Types ► 

Synchronous Transmission o  Devices share a transmission clock and rate

► 

Asynchronous Transmission o  No clock, not synchronized with another device

► 

Data transmission flow o  Simplex Simplex –   data travels in one direction only  –  data o  Half duplex (modems, walkie-talkies, Ethernet) –  Ethernet) –  travels  travels in 2 directions, one direction at a

time o  Full Duplex (Fast Ethernet) –  Ethernet) –  travels  travels in 2 directions at the same time ► 

Baseband Transmission o  Uses the entire bandwidth for a single channel (digital)

► 

Broadband Transmission o  Divides the media into multiple channels (analog)

► 

Logical Topologies o  Signal’s actual path over a network (think signal)  signal)  

► 

Physical Topologies o  The layout of the network’s device connections (think media  media 

3.10. Manage career opportunities in the IT industry.

Prepare for your career ► 

Conduct job searches

► 

Use usenets

► 

Create an electronic resume

► 

Research career types

 

 

CIW Foundations (1D0-510)

Practice Questions

 

Table of Contents Chapter 1 Internet Business Foundations........................................................... Foundations........................................................... 2 Answer Key   Explanations  

14 18

Chapter 2 Site Development Foundations....... Foundations.............. .............. .............. .............. ............... ............... .............. ......... 6 Answer Key   Explanations  

15 22

Chapter 3 Networking Technology Foundations........ Foundations............... .............. .............. .............. .............. ......... .. 10 Answer Key   Explanations  

16 26

 

Internet Inte rnet Busines Businesss Foun Foundati dations ons

Chapter 1

Internet Business Foundations 1.   Martin is charged wit with h getting the hospital' hospital'ss new IImaging maging Cente Centerr online. He needs to decide the type of Internet connection will work best. He must have connection speeds of at least 512Kbps and not require new wiring. What is the best choice for this environment? Select the best answer. 

  A.

Cable modem



  B.

Wireless



  C.

DSL



  D.

T1

Find the Answer Answer p.  p. 14  14

2.   Diane iiss tryin trying g to conn connect ect to a sit sitee on the In Interne ternett by using using the add address: ress: http://www.mysite.com. When she types it into the address bar, a page comes up telling her that the Web site can not be found. What could be wrong? Select the best answer. 

  A.

The domain domain nam namee ser server ver can cannot not res resolv olvee the addres addresss



  B.

Th Thee addr addres esss is a rela relati tive ve UR URL. L.



  C.

Th Thee defa defaul ultt ho home me pa page ge is mi missi ssing ng..



  D.

The top lev level el dom domain ain is una unavai vailab lable. le.

Find the Answer p.  14 Answer  p. 14

2

 

Internet Inte rnet Busines Businesss Foun Foundati dations ons

3.   When would a web designer crea create te a site that operates in an iintranet? ntranet? Select the best answer. 

  A.

Whe When n tthe he emp employ loyees ees nee need d tto o acce access ss a Web Web sit sitee d desi esigne gned d only only for employees that resides within the company.



  B.

Whe When n eemp mploy loyees ees nee need d tto o acce access ss the compan company y webs website ite fr from om hom home. e.



  C.

Whe When n emp employ loyees ees nee need d to print print doc docume uments nts..



  D.

Whe When n emp employ loyees ees nee need d to do res resear earch ch onl online ine..

Find the Answer Answer p.  p. 14  14

4.   Genna needs to troubl troubleshoot eshoot a software issue on a cl client's ient's computer computer that is located in another state. What is the best way to do this? Select the best answer.  

  A.   B.

Us Usee an FT FTP P serv server er.. Use a VN VNC C ser serve verr.



  C.

Us Usee an LD LDAP AP serv server er..



  D.

Use an Ins Instan tantt Mes Messag saging ing cli client ent..

Find the Answer p.  14 Answer  p. 14

5.   Mary is setting up a phone directory of all the comp company any employees. What should she use to launch the directory? Select the best answer. LDAP    A. 

  B.

CVS



  C.

P2P



  D.

VNC

Answer  p. 14 Find the Answer p.  14

3

 

Internet Inte rnet Busines Businesss Foun Foundati dations ons

6.   What could be done to speed up intern internet et access ffor or company employees? Select the best answer. 

  A.

In Inst stal alll a fi fire rewa wall ll..



  B.

Con Config figure ure the bro browse wserr to accept accept Act Active iveX X con contro trols. ls.

  C.   D.

In Inst stal alll a pr prox oxy y serv server er.. Di Disa sabl blee hi hist stor ory y cach cachin ing. g.

 

Find the Answer Answer p.  p. 14  14

7.   What encryption method uses a 1 160-bit 60-bit key? Select the best answer. 

  A.

As Asym ymme metr tric ic ke key y



  B.

Messa essage ge dig digest est



  C.

Di Digi gita tall ce cert rtif ific icat atee



  D.

Sym ymm met etrric ke key y

Answer p.  p. 14  14 Find the Answer

8.   XYZ's networ network k administr administrator ator has noticed a marked dec decrease rease in memory and and hard drive space. What could be happening? Select the best answer. 

  A.

The system system is und under er attack attack by a vir virus. us.



  B.

The system system is inu inunda ndated ted by spy spywar ware. e.



  C.

The system system's 's coo cookie kie fil files es are corrup corrupted ted..



  D.

Th Thee syst system em co cont ntai ains ns a wo worm rm..

Find the Answer Answer p.  p. 14  14

4

 

Internet Inte rnet Busines Businesss Foun Foundati dations ons

9.   Mary is search searching ing for purple purple shoes. Sh Shee types purpl purplee And shoes in the search box. The results are not what she expected. What should she do to get the correct results? Select the best answer. 

  A.

Ca Capi pita tali lize ze "and "and." ."



  B.

Ca Capi pita tali lize ze purp purple le..



  C.

Us Usee NOT NOT as the the Bo Bool olea ean n Op Oper erat ator or..



  D.

Us Usee OR as the the Bo Bool olea ean n Op Oper erat ator or..

Answer  p. 14 Find the Answer p.  14

5

 

Site Develop Development ment Foundati Foundations ons

Chapter 2

Site Development Foundations 1.   Why is it ne necessa cessary ry to pla place ce the <!D <!DOCTYP OCTYPE> E> tag at th thee top of an XH XHTML TML document? Select the best answer. 

  A.

Bec Becaus ausee it is the cur curren rentt web req requir uireme ement. nt.



  B.

Bec Becaus ausee it sup suppor ports ts the non non-HT -HTML ML in the page. page.



  C.

Bec Becaus ausee it all allows ows the use of a mar markup kup val valida idator tor..



  D.

Bec Becaus ausee it mak makes es the pag pagee acc access essibl iblee to all. all.

Answer  p. 15 Find the Answer p.  15

2.   Which of tthe he following is the corr correct ect code for specifying a triangle hot spot? Select the best answer. 

  A.

< area shape shape="rec ="rect" t" coor coords ds ="12,52,45 ="12,52,45,60" ,60" href="min href="mine.htm e.htm"> ">



  B.

< are areaa sha shape pe ="r ="rect ect"" coo coords rds="1 ="12,5 2,52,4 2,45,6 5,60,1 0,15,7 5,75" 5" hre href  f  ="mine.htm">



  C.

< are areaa sha shape pe ="p ="poly oly"" coo coord rdss ="1 ="12,5 2,52,4 2,45,6 5,60,1 0,15,7 5,75" 5" hr href  ef  ="mine.htm">



  D.

< area shape ="pol ="poly" y" coor coords ds ="12,52,45, ="12,52,45,60" 60" href ="mine.htm ="mine.htm"> ">

Find the Answer Answer p.  p. 15  15

6

 

Site Develop Development ment Foundati Foundations ons

3.   Marty creat created ed an in informational formational web page that is 12 pages long. He wants his readers to be able to read different sections without scrolling up and down the page. How can he best accomplish this? Select the best answer. 

  A.

Mak Makee eac each h sec sectio tion n hea headin ding g a lin link. k.



  B.

Make each secti section on headi heading ng a bookm bookmark ark and create create navigatio navigation n link linkss at the top of the page.



  C.

Mak Makee eac each h sec sectio tion n hea headin ding g a boo bookma kmark. rk.



  D.

Make each secti section on headi heading ng a link and create create navigatio navigation n links links at the top of the page.

Find the Answer Answer p.  p. 15  15

4.   Which table attribute w was as used in creating th thee image in the exhibit? Select the best answer. 

  A.

colspan



  B.

rowspan



  C.

alt



  D.

frameset

Answer p.  p. 15  15 Find the Answer

Exhibit(s):

7

 

Site Develop Development ment Foundati Foundations ons

5.   Zana wants to create a on one-question e-question exit survey. She needs to fin find d out if her Web site has been helpful. She also wants to insure that the survey-taker has only four choices and can only choose one. What form element will offer the most control over the responses? Select the best answer.



  A.   B.

Checkbox Radio button



  C. C.

Text box



  D.

Te Tex xt area rea bo box x



Answer  p. 15 Find the Answer p.  15

6.   The base target frame is placed... Select the best answer. 

  A.

Bet Betwee ween n the beg beginn inning ing and end ending ing hea head d tag tags. s.



  B.

Bet Betwee ween n the beg beginn inning ing and end ending ing bod body y tag tags. s.



  C.

Bet Betwee ween n the beg beginn inning ing and end ending ing fra frame me source source tag tags. s.



  D.

Bet Betwee ween n the beg beginn inning ing and end ending ing fra frames meset et tag tags. s.

Answer  p. 15 Find the Answer p.  15

8

 

Site Develop Development ment Foundati Foundations ons

7.   What is rrequired equired to be XML compliant? Select the best answer. 

  A.

The docume document nt must must be val valid, id, tra transi nsitio tional nal and con contai tain n a DTD statement.



  B.

The docume document nt must must be val valid, id, tra transi nsitio tional nal and con contai tain n a root root statement.



  C.

The docume document nt must must be val valid, id, wel well-f l-for ormed med and con contai tain naD DTD TD statement.



  D.

The document document must be valid valid,, wellwell-form formed ed and cont contain ain a function function statement.

Find the Answer Answer p.  p. 15  15

8.   Which tags will override linked style sheets? Select the best answer. 

  A.

st styl ylee an and d do doct ctyp ypee



  B.

Sty tyle le and font font..



  C.

st styl ylee an and d forma ormatt



  D.

st styl ylee an and d li list st

Answer  p. 15 Find the Answer p.  15

9.   Bob is a network administrator who wants to determ determine ine the network's co connection nnection speed. How can he determine this? Select the best answer. 

  A.

Div Divide ide the dow downlo nload ad tim timee by the net networ work k speed. speed.



  B.

Div Divide ide the fil filee siz sizee by the dow downlo nload ad tim time. e.



  C.

Div Divide ide the fil filee siz sizee by the mo modem dem spe speed. ed.



  D.

Div Divide ide the dow downlo nload ad tim timee by the mod modem em spe speed. ed.

Answer p.  p. 15  15 Find the Answer

9

 

Network Netw orking ing Technol Technology ogy Foun Foundati dations ons

Chapter 3

Networking Technology Foundations 1.   Jerry is set setting ting up a netw network ork at hom home. e. He has five co comput mputers ers and wan wants ts to share a printer. Which type of network design will work best? Select the best answer. 

  A.

Star



  B.

Bus



  C.

Mesh



  D.

Hybrid

Answer  p. 16 Find the Answer p.  16

2.   Which layer of the OS OSI/RM I/RM ensures th that at data is er error-free ror-free w when hen it reache reachess its destination? Select the best answer. 

  A. A.

Layer 7



  B. B.

Layer 6



  C. C.

Layer 5



  D. D.

Layer 4

Answer  p. 16 Find the Answer p.  16

10

 

Network Netw orking ing Technol Technology ogy Foun Foundati dations ons

3.   A route routerr operat operates es at the _____ _______________ __________ layer o off the OSI/RM. Select the best answer. 

  A.

Network 



  B. B.

Data link 

  C.   D.

Transp spo ort Physical

 

Find the Answer Answer p.  p. 16  16

4.   What is a pack packet? et? Select the best answer. 

  A.

A prot protocol ocol that enabl enables es infor informati mation on to be sent acro across ss a netw network. ork.



  B.

Ano Anothe therr nam namee for an e-m e-mail ail messag message. e.



  C.

A fix fixed ed pie piece ce of inf inform ormati ation on sen sentt acr across oss a networ network. k.



  D.

A pro protoc tocol ol that that sen sends ds e-m e-mail ail messag messages. es.

Find the Answer Answer p.  p. 16  16

5.   What is a subn subnet et mask? Select the best answer. 

  A.

A 2828-bit bit add addres resss tha thatt tra transl nslate atess IP addres addresses ses..

 

  B.   C.

An IP addres addresss con contai tainin ning g 255 in the hos hostt por portio tion. n. A 3232-bit bit add addres resss tha thatt tra transl nslate atess MAC add addres resses ses..



  D.

A 3232-bit bit add addres resss tha thatt tra transl nslate atess IP addres addresses ses..

Find the Answer p.  16 Answer  p. 16

11

 

Network Netw orking ing Technol Technology ogy Foun Foundati dations ons

6.   Which of tthe he following following is a Class B address? Select the best answer. 

  A.

NNNN NNNNNNNN NNNN.NNN .NNNNNNN NNNNN.NN N.NNNNNN NNNNNN.N NN.NNNNN NNNNNNNN NNNN



  B.

NNNN NNNNNNNN NNNN.NNN .NNNNNNN NNNNN.hh N.hhhhhhh hhhhhh.hhh h.hhhhhhhh hhhhh

  C.   D.

NNNN NNNNNNNN NNNN.hhh .hhhhhhh hhhhh.hhh h.hhhhhhh hhhhh..hh h..hhhhhhh hhhhhh h NNNN NNNNNNNN NNNN.NNN .NNNNNNN NNNNN.NN N.NNNNNN NNNNNN.h NN.hhhhhh hhhhhhh hh

 

Find the Answer Answer p.  p. 16  16

7.   Jerome is setti setting ng up a ffirewall irewall for the company. The computer that connects to the firewall contains two NICs. Which type of firewall will work best with the existing equipment? Select the best answer.  

  A.   B.

Du Dual al-h -hom omed ed ba bast stio ion n Pac ack ket fil ilte terr



  C.

Tr Trip iple le-h -hom omed ed ba bast stio ion n



  D.

Se Secu cure red d subn subnet et

Find the Answer Answer p.  p. 16  16

12

 

Site Developm Development ent Foundati Foundations ons

Answers: Chapter 1 1.  C

 

Review Question Question p.  p. 2  2

 

Detailed Explanat Explanation ion p.  p. 18  18

2.  A

 

Review Question Question p.  p. 2  2

 

Detailed Explanat Explanation ion p.  p. 18  18

 A

 

Review Question Question p.  p. 3  3

 

Detailed Explanat Explanation ion p.  p. 18  18

3. 4.  B

 

Review Question Question p.  p. 3  3

 

Detailed Explanat Explanation ion p.  p. 19  19

5.  A

 

Review Question Question p.  p. 3  3

 

Detailed Explanat Explanation ion p.  p. 19  19

6.  C

 

Review Question Question p.  p. 4  4

 

Detailed Explanat Explanation ion p.  p. 19  19

7.  B

 

Review Question Question p.  p. 4  4

 

Detailed Explanat Explanation ion p.  p. 20  20

8.  D

 

Review Question Question p.  p. 4  4

 

Detailed Explanat Explanation ion p.  p. 20  20

9.  A

 

Review Question Question p.  p. 5  5

 

Detailed Explanat Explanation ion p.  p. 20  20

14

 

Network Netw orking ing Technol Technology ogy Foun Foundati dations ons

Answers: Chapter 2 1.  C

 

Review Question Question p.  p. 6  6

 

Detailed Explanat Explanation ion p.  p. 22  22

2.  C

 

Review Question Question p.  p. 6  6

 

Detailed Explanat Explanation ion p.  p. 22  22

 

Review Question Question p.  p. 7  7

 

Detailed Explanat Explanation ion p.  p. 22  22

3.  B 4.  A

 

Review Question Question p.  p. 7  7

 

Detailed Explanat Explanation ion p.  p. 23  23

5.  B

 

Review Question Question p.  p. 8  8

 

Detailed Explanat Explanation ion p.  p. 23  23

6.  A

 

Review Question Question p.  p. 8  8

 

Detailed Explanat Explanation ion p.  p. 23  23

7.  C

 

Review Question Question p.  p. 9  9

 

Detailed Explanat Explanation ion p.  p. 24  24

8.  B

 

Review Question Question p.  p. 9  9

 

Detailed Explanat Explanation ion p.  p. 24  24

9.  C

 

Review Question Question p.  p. 9  9

 

Detailed Explanat Explanation ion p.  p. 25  25

15

 

Network Netw orking ing Technol Technology ogy Foun Foundati dations ons

Answers: Chapter 3 1.  B

 

Review Question Question p.  p. 10  10

 

Detailed Explanat Explanation ion p.  p. 26  26

2.  D

 

Review Question Question p.  p. 10  10

 

Detailed Explanat Explanation ion p.  p. 26  26

 

Review Question Question p.  p. 11  11

 

Detailed Explanat Explanation ion p.  p. 26  26

3.  A 4.  C

 

Review Question Question p.  p. 11  11

 

Detailed Explanat Explanation ion p.  p. 27  27

5.  D

 

Review Question Question p.  p. 11  11

 

Detailed Explanat Explanation ion p.  p. 27  27

6.  B

 

Review Question Question p.  p. 12  12

 

Detailed Explanat Explanation ion p.  p. 27  27

7.  A

 

Review Question Question p.  p. 12  12

 

Detailed Explanat Explanation ion p.  p. 28  28

16

 

Internet Inte rnet Business Business Foundati Foundations ons

18

Explanations: Chapter 1 Question p.  p. 2  2 1.   Review Question Answers: C

Explanation A.  Incorrect. Although this reaches the correct speed, cable would have to

be put in to accommodate everyone. Explanation B.  Incorrect. Wireless connections interfere with hospital equipment. Explanation C.  Correct. This provides the bandwidth and can be run through existing phone lines. Explanation D.  Incorrect. Although this would work with existing telephone lines, it is more than is required.  126-100 PrepLogic Question: Question: 126-100

Question p.  p. 2  2 2.   Review Question Answers: A

Explanation A.  Correct. A domain server must resolve the written name into an IP address in order to connect. Explanation B.  Incorrect. The address is an absolute URL containing the entire address. Explanation C.  Incorrect. The error that would be occur would be a 404 error code, saying the page is not available. Explanation D.  Incorrect. Top level domains are always available. More Information: DNS

PrepLogic Question: 126-101 Question:  126-101 Question p.  p. 3  3 3.   Review Question Answers: A

Explanation A.  Correct. Intranets serve up web pages behind the company firewall. Explanation B.  Incorrect. An extranet would accomplish this. Explanation C.  Incorrect. This is handled by the company network.

 

Internet Inte rnet Business Business Foundati Foundations ons

Explanation D.  Incorrect. An Internet connection is all that is needed. PrepLogic Question: Question: 126-102  126-102 Question p.  p. 3  3 4.   Review Question Answers: B

Explanation A.  Incorrect. That is only useful for transferring files. Explanation B.  Correct. This allows Genna to control and work with the other computer regardless of the distance. Explanation C.  Incorrect. This serves up contact information. Explanation D.  Incorrect. This allows her to converse but not fix. More Information: Network Services PrepLogic Question: 126-103 Question:  126-103 Question p.  p. 3  3 5.   Review Question Answers: A

Explanation A.  Correct. This is the Lightweight Directory Access Protocol that companies use to organize employee contact information. Explanation B.  Incorrect. This controls versions in software development. Explanation C.  Incorrect. This is a shared network type. Explanation D.  Incorrect. That allows connection to another computer. More Information: Internet Services PrepLogic Question: 126-104 Question:  126-104 Question p.  p. 4  4 6.   Review Question Answers: C

Explanation A.  Incorrect. Firewalls must evaluate each packet and results in slowing. Explanation B.  Incorrect. This is not a good idea from the standpoint of security.

19

 

Internet Inte rnet Business Business Foundati Foundations ons

Explanation C.  Correct. A proxy server will cache documents allowing quicker access to Web pages. Explanation D.  Incorrect. This will not effect performance, only limit the amount of  history information available. PrepLogic Question: Question: 126-105  126-105 Question p.  p. 4  4 7.   Review Question Answers: B

Explanation A.  Incorrect. This one uses an RSA algorithm that does not support 160-bit keys. Explanation B.  Correct. Yes this is the hash function and when using the SHA algorithm, it encrypts with 160-bits. Explanation C.  Incorrect. This authenticates, not encrypts. Explanation D.  Incorrect. This one uses the same key to encrypt and decrypt. More Information: Encryptio Encryption n Methods PrepLogic Question: 126-106 Question:  126-106 Question p.  p. 4  4 8.   Review Question Answers: D

Explanation A.  Incorrect. A virus infection would not impact memory allocation. Explanation B.  Incorrect. Spyware would not fill up a hard disk. Explanation C.  Incorrect. Cookie files are text files that collect information. Explanation D.  Correct. Worms use up system resources. PrepLogic Question: Question: 126-107  126-107 Question p.  p. 5  5 9.   Review Question Answers: A

Explanation A.  Correct. Boolean operators should always be capitalized.

20

 

Site Developm Development ent Foundati Foundations ons

Explanation B.  Incorrect. That will produce poorer results. Search terms should be in lowercase only. Explanation C.  Incorrect. This will exclude one criteria of the search. Explanation D.  Incorrect. This will exclude one criteria of the search. More Information: Boolean Operators PrepLogic Question: 126-108 Question:  126-108

21

 

Site Developm Development ent Foundati Foundations ons

Explanations: Chapter 2 Question p.  p. 6  6 1.   Review Question Answers: C

Explanation A.  Incorrect. This is not the case at this time. Explanation B.  Incorrect. That is not the purpose of the doctype tag. Explanation C.  Correct. Explanation D.  Incorrect. Accessibility requires more than this tag. More Information: Validating Web pages. PrepLogic Question: 126-109 Question:  126-109 Question p.  p. 6  6 2.   Review Question Answers: C

Explanation A.  Incorrect: This code contains a code for a rectangle. Explanation B.  Incorrect. This code contains the code for a rectangle and too many coordinates. Explanation C.  Correct. Shape is poly with 3 sets of coordinates. Explanation D.  Incorrect. The correct shape is specified but the number of coordinates is wrong. More Information: XHTML tags PrepLogic Question: 126-110 Question:  126-110 Question p.  p. 7  7 3.   Review Question Answers: B

Explanation A.  Incorrect: That only creates the link. Explanation B.  Correct. This will allow the navigation to link to the bookmark. Explanation C.  Incorrect. There needs to be a link to the bookmark.

22

 

Site Developm Development ent Foundati Foundations ons

Explanation D.  Incorrect. Links are not used to reference other links within a page More Information: XHTML tags PrepLogic Question: 126-111 Question:  126-111 Question p.  p. 7  7 4.   Review Question Answers: A

Explanation A.  Correct. This table contains a row that spans 3 columns. Explanation B.  Incorrect. This attribute spans rows, not columns. Explanation C.  Incorrect. This tag gives images names for screen readers. Explanation D.  Incorrect: This tag is used to create a frame. More Information: XHTML Tags PrepLogic Question: 126-112 Question:  126-112 Question p.  p. 8  8 5.   Review Question Answers: B

Explanation A.  Incorrect. This allows multiple choices. Explanation B.  Correct. This forces the reader into only one choice. Explanation C.  Incorrect. She cannot control what is placed into the text box. Explanation D.  Incorrect. This does not afford sufficient control over the information. More Information: XHTML Tags PrepLogic Question: 126-113 Question:  126-113 Question p.  p. 8  8 6.   Review Question Answers: A

Explanation A.  Correct. This tag resides in the head region of the document. Explanation B.  Incorrect. The base target frame is placed in the head region of the

23

 

Site Developm Development ent Foundati Foundations ons

document. Explanation C.  Incorrect. The base target frame is placed in the head region of the document. Explanation D.  Incorrect. The base target frame is placed in the head region of the document. More Information: XHTML Tags PrepLogic Question: 126-114 Question:  126-114 Question p.  p. 9  9 7.   Review Question Answers: C

Explanation A.  Incorrect. Transitional is a flavor of XHTML. Explanation B.  Incorrect. Form is imparted through the root statement, transitional is a flavor. Explanation C.  Correct. All these must be in place to be compliant. Explanation D.  Incorrect. The tree structure is not necessary. More Information: Extensiblee Markup Language Extensibl PrepLogic Question: 126-115 Question:  126-115 Question p.  p. 9  9 8.   Review Question Answers: B

Explanation A.  Incorrect. Explanation B.  Correct. Yes, placed in the body, they will override style sheet specifications. Explanation C.  Incorrect. Format is not a tag. Explanation D.  Incorrect. More Information: Style Sheets

24

 

Network Netw orking ing Technol Technology ogy Foun Foundati dations ons

PrepLogic Question: Question: 126-116  126-116 Question p.  p. 9  9 9.   Review Question Answers: C

Explanation A.  Incorrect. This is a wrong calculation. Explanation B.  Incorrect. This is a wrong calculation. Explanation C.  Correct. This calculation will provide the speed of the network. Explanation D.  Incorrect. This is a wrong calculation.  126-117 PrepLogic Question: Question: 126-117

25

 

Network Netw orking ing Technol Technology ogy Foun Foundati dations ons

Explanations: Chapter 3 Question p.  p. 10  10 1.   Review Question Answers: B

Explanation A.  Incorrect. This type of network requires a central hub. Explanation B.  Correct. A bus network is limited to 10 devices and is easy to set up. Explanation C.  Incorrect. This is designed for redundancy. It is not needed on a small network. Explanation D.  Incorrect. Hybrids exist when adding to an existing network. More Information: Network Topology PrepLogic Question: 126-118 Question:  126-118 Question p.  p. 10  10 2.   Review Question Answers: D

Explanation A.  Incorrect. This is the application layer which provides services to applications outside the OSI model. Explanation B.  Incorrect. This is the presentation layer that provides transformations on data so that it is presentable. Explanation C.  Incorrect. This is the session layer that establishes, manages, and terminates sessions. Explanation D.

 Correct. The data link layer is responsible for error checking. More Information: OSI/RM PrepLogic Question: 126-119 Question:  126-119 Question p.  p. 11  11 3.   Review Question Answers: A

Explanation A.  Correct. Routers operate at layer 3 in OSI/RM. Explanation B.  Incorrect. This works with Layer 2 switches.

26

 

Network Netw orking ing Technol Technology ogy Foun Foundati dations ons

27

Explanation C.  Incorrect. The transport layer does not support devices. Explanation D.  Incorrect. Hubs operate at this layer. More Information: OSI/RM PrepLogic Question: 126-120 Question:  126-120 Question p.  p. 11  11 4.   Review Question Answers: C

Explanation A.  Incorrect. A packet is not a protocol. Explanation B.  Incorrect. Explanation C.  Correct. Packets are moved across the network and transferred between devices. Explanation D.  Incorrect. A packet is not a protocol. More Information: Network Packets PrepLogic Question: 126-121 Question:  126-121 Question p.  p. 11  11 5.   Review Question Answers: D

Explanation A.  Incorrect. IP addresses are 32-bit. Explanation B.  Incorrect. The 255 is placed in the network portion. Explanation C.  Incorrect. Translates IP addresses not MAC. Explanation D.  Correct. More Information: Subnet Masking PrepLogic Question: 126-122 Question:  126-122 Question p.  p. 12  12 6.   Review Question Answers: B

 

Network Netw orking ing Technol Technology ogy Foun Foundati dations ons

Explanation A.  Incorrect. This class does not exist. Explanation B.  Correct. A class B has the form N.N.h.h Each value represents 8 bits. Explanation C.  Incorrect. This is class A. Explanation D.  Incorrect. This is class C. More Information: IP Addressi Addressing ng PrepLogic Question: 126-123 Question:  126-123 Question p.  p. 12  12 7.   Review Question Answers: A

Explanation A.  Correct. With IP forwarding disabled this makes the firewall setup of  choice. Explanation B.  Incorrect. This is a basic firewall configuration. Explanation C.  Incorrect. This type requires three NICs on separate devices. Explanation D.  Incorrect. Would require external and internal routers.  126-124 PrepLogic Question: Question: 126-124

28

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close