Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

1D0-520 CIW v5 Site Designer Free Practice Exam Questions (2025 Updated)

Prepare effectively for your CIW 1D0-520 CIW v5 Site Designer certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 2 / 3
Total 140 questions

User feedback can be evaluated in many ways. Which of the following methods is more quantitative than direct user feedback, and will provide indirect feedback from the majority of users who do not respond?

A.

User surveys

B.

Site server logs

C.

Online e-mail links

D.

Opt-in bulk mail services

Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. This type of attack is known as a:

A.

brute-force attack.

B.

forced-entry attack.

C.

buffer overflow attack.

D.

denial-of-service attack.

You have created a design template using Dreamweaver MX 2004 and generated several child Web pages from this original template. What happens if you edit the original template?

A.

The Z-index of each child page increases.

B.

The change has no effect on the child pages.

C.

The layer number of each child page increases.

D.

The child pages reflect the change to the original.

Ben has reviewed surveys from a selected pool of potential site visitors. What should he do first with this valuable information?

A.

Design navigation schemes to direct visitors to promotional pages.

B.

Create a set of user behavior scenarios to use in a "bottom-up" approach to site design.

C.

Populate a database with information about prospective customers for a targeted e-mail campaign.

D.

Establish a page layout template that enables visitors to easily scan for content that interests them.

The structure of a Web site is similar to:

A.

a book.

B.

a Gantt chart.

C.

a table of contents.

D.

an organizational chart.

A company Web site sells auto parts using a red, white and blue color scheme. Serena, an employee, has been asked to add a message on the home page announcing the availability of new brake pads. How can Serena best incorporate her message so that it is most effective?

A.

Compress the text to fully explain the high quality of the new pads.

B.

Use a large, unusual font for a link that states "Look what's NEW!"

C.

Add text and an image of the brake pads in the center of the screen.

D.

Introduce new colors to make a scrolling message stand out at the bottom of the screen.

Which of the following is used in Secure XML to verify the origin of a message?

A.

Triple DES

B.

A digital signature

C.

Symmetric-key encryption

D.

An open encryption standard known as Gnu Privacy Guard

Consider the following code:

1942

Casablanca

Michael Curtiz

What kind of code is shown in the preceding example?

A.

XML

B.

HTML

C.

VBScript

D.

activescript

Which attribute should be used to assign inline styles to HTML?

A.

id

B.

style

C.

value

D.

class

Your company often uses bulk e-mail to announce new products. You have been asked to design an HTML page containing a product announcement that will be sent via e-mail. Which of the following can be used to reduce accusations that your company sends spam to users?

A.

Create a link at the bottom of the e-mail announcement that leads to an opt-out page.

B.

Send your message as an attachment to the product announcement e-mail message.

C.

Create an opt-out link at the bottom of the e-mail message, and include the company name and purpose of the letter in the Subject field.

D.

Send a separate e-mail announcement that asks users to forward the previous e-mail message to a salesperson in order to be removed from the company's

e-mail list.

Which of the following will best protect a server from Web server vulnerabilities that are exploited by hackers?

A.

Using strong passwords

B.

Installing updates (for example, service packs)

C.

Using the POST method instead of the GET method for a Web form

D.

Using the GET method instead of the POST method for a Web form

Kylee is creating a Flash animation banner. The banner is advertising a company's change of ownership. In the banner, the old company logo needs to morph into the new logo. What is the best way for Kylee to do this?

A.

Create a shape tween between the old and the new logos.

B.

Create a motion tween between the old and the new logos.

C.

Convert the logos into symbols and create a shape tween between the old and the new logos.

D.

Convert the logos into symbols and create a motion tween between the old and the new logos.

Which of the following technologies can be used to create rollover images without the use of special plug-ins?

A.

SVG

B.

CSS

C.

Flash

D.

XHTML

What is the process for following every link on your site to ensure that it goes to the correct location?

A.

Site validation

B.

Site optimization

C.

Manual link checking

D.

Manual link optimization

Cookies can be used to:

A.

target users for marketing.

B.

spread viruses on a network.

C.

execute programs on a Web server.

D.

send personal information back to the Web server.

Why is it important to evaluate your choice of layout elements available to use on your Web site?

A.

To help focus the development process

B.

To impress users with graphics on every page

C.

To increase the amount of content that can fit on pages

D.

To implement the latest technologies and outsell the competitors

Which of the following is an acceptable way to insert a background image using a style sheet?

A.

B.

background-image: url(background.tiff);

C.

background-image: url(background.jpg);

D.

background-position: background.jpg bottom right;

Which of the following file types does not require a plug-in to be installed in the browser?

A.

ASP

B.

PDF

C.

SVG

D.

SWF

During a project meeting, Eric explains the need for a development server to host the company's new Web site during development. Eric's IT co-workers want to know who will have access to the development server. What should Eric tell them?

A.

The development server will be accessible to all members of the organization as well as the public.

B.

The development server will be accessible to the development team and to authorized members of the organization.

C.

The development server will be accessible to the public in order to collect public opinion on the development of the Web site.

D.

The development server will be accessible to all members of the organization in order to obtain their suggestions on the development of the Web site.

You have decided that using a pop-up window is appropriate in a particular situation. Which of the following can you use to ensure that the window is displayed in the proper location?

A.

CSS and XHTML

B.

XHTML and pseudo-code

C.

JavaScript and pseudo-code

D.

JavaScript and the Document Object Model (DOM)

Page: 2 / 3
Total 140 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved