Summer Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

1D0-520 PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

1D0-520 PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: CIW v5 Site Designer
  • Last Update: Sep 12, 2025
  • Questions and Answers: 140
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

1D0-520 Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

1D0-520 Practice Exam Questions with Answers CIW v5 Site Designer Certification

Question # 6

Which of the following technologies can be used to create rollover images without the use of special plug-ins?

A.

SVG

B.

CSS

C.

Flash

D.

XHTML

Full Access
Question # 7

Which of the following is used in Secure XML to verify the origin of a message?

A.

Triple DES

B.

A digital signature

C.

Symmetric-key encryption

D.

An open encryption standard known as Gnu Privacy Guard

Full Access
Question # 8

Jason is attempting to gain unauthorized access to a corporate server by running a program that enters passwords from a long list of possible passwords. This type of attack is known as a:

A.

brute-force attack.

B.

forced-entry attack.

C.

buffer overflow attack.

D.

denial-of-service attack.

Full Access
Question # 9

Kylee is creating a Flash animation banner. The banner is advertising a company's change of ownership. In the banner, the old company logo needs to morph into the new logo. What is the best way for Kylee to do this?

A.

Create a shape tween between the old and the new logos.

B.

Create a motion tween between the old and the new logos.

C.

Convert the logos into symbols and create a shape tween between the old and the new logos.

D.

Convert the logos into symbols and create a motion tween between the old and the new logos.

Full Access
Question # 10

Kristi is developing a Web site for Roscoe Carnival Supplies. Roscoe's CEO has provided several JPG images that he wants to include on the home page of the site. As Kristi begins to design the page, she realizes that she cannot achieve the tight design she wants because many of the images have excess white space around them. What should Kristi do to solve the problem?

A.

Crop the image to reduce excess white space.

B.

Modify the image's height and/or width dimensions.

C.

Delete the layer with the most white space from the JPG file.

D.

Modify the image's resolution to reduce unneeded white space.

Full Access
Question # 11

You are creating a Web site that uses a gradient fill for all page backgrounds on a site. To ensure that you can see the gradient through the image background, you should:

A.

use TIF images with transparent backgrounds.

B.

use JPG images with transparent backgrounds.

C.

use GIF 89a images with transparent backgrounds.

D.

use GIF 89b images with transparent backgrounds.

Full Access
Question # 12

When you publish a Flash file, Flash generates the HTML code for inserting an object in a Web page. Which of the following code fragments indicates the correct attributes that identify a SWF file within the tag?

A.

B.

C.

D.

Full Access
Question # 13

Which of the following is one of the advantages that SWF (Flash) files bring to Web-based environments?

A.

SWF files are compressed, so files download quickly.

B.

SWF files use layers, so animation is linear and parallel.

C.

SWF files use vector images, so files can be easily modified.

D.

SWF files can stream images, so files can be uploaded quickly.

Full Access
Question # 14

Which of the following is the minimal requirement for an XML document?

A.

It must be delimited.

B.

It must be well-formed.

C.

It must be embedded within HTML code.

D.

It must be embedded within XHTML code.

Full Access
Question # 15

Which of the following is a benefit of imported style sheets?

A.

Imported style sheets override embedded styles.

B.

Imported style sheets work with all older browsers.

C.

Multiple style sheets can be applied using one style declaration.

D.

Imported style sheets are the only way to override the default style of a browser.

Full Access
Question # 16

Image slicing involves:

A.

selecting rectangular sections of a larger graphic to be divided into smaller images during export.

B.

creating an animated GIF file from a single large image file to decrease perceived download time.

C.

merging several small image files into a single large image file to simplify placement on the Web page.

D.

selecting sections of a single image and saving them as separate JPG files in a specially created folder.

Full Access
Question # 17

Susan is creating some additional images for her customer's Web site. One image will be used repeatedly on site pages. However, in order to support the site's topic-specific color scheme, she wants one shape in the image's background to be a different color on each page. What is the best way for Susan to accomplish this task?

A.

Create the image using layers for its different components.

B.

Create the image using series for its different components.

C.

Create the image using pages for its different components.

D.

Create the image using frames for its different components.

Full Access
Question # 18

Some of your site's users have called to complain that they do not understand the policy for shipping charges. Initially, the Web team created a pop-up window that appears at the point of purchase, designed to explain the shipping charge policy. Why did some of these users fail to get this message?

A.

Because antivirus software blocked the pop-ups

B.

Because newer browsers have automatic pop-up blockers

C.

Because firewalls blocked the client-side scripts that create pop-ups

D.

Because firewalls blocked the server-side scripts that create pop-ups

Full Access
Question # 19

Which of the following plug-ins would be used to view paper-based documents that cannot be easily re-created using XHTML?

A.

Microsoft Fax Viewer

B.

Word processor applications

C.

Scalable Vector Graphics (SVG)

D.

Portable Document Format (PDF)

Full Access
Question # 20

Which of the following techniques helps stop a denial-of-service (DOS) attack in which an attacker has sent multiple ICMP or TCP packets to crash a Web server on the Internet?

A.

Filtering traffic at the firewall

B.

Changing passwords on a regular basis

C.

Installing Apache server rather than Microsoft IIS

D.

Placing the database and the Web server on separate systems

Full Access
Question # 21

Which of the following is a standard use of cookies?

A.

Capturing keystrokes

B.

Scanning hard disk drives

C.

Storing password information

D.

Recording financial information

Full Access
Question # 22

Jared is creating an interactive Web site that is expected to respond to heavy traffic. He needs to request new hardware in order to build a staging server. What requirement of the staging server should he be aware of when ordering the new hardware?

A.

The staging server should have the same hardware and software configuration as the production server.

B.

The staging server should have a different operating system from that of the production server for flexibility during testing.

C.

The staging server should have a slower processor and less RAM than the production server because it is just a test server.

D.

The staging server should have more RAM and a faster processor than the production server because testing is more intensive than production use.

Full Access
Question # 23

You have been asked to create a page that retrieves information from a database. Which of the following is the first step in obtaining information from a database from a Web page?

A.

Conduct a database query.

B.

Create a connection to the database.

C.

Create a recordset to hold the query results.

D.

Put the results in a recordset to ensure that the database returns data properly.

Full Access
Question # 24

The best way to thwart a dictionary attack is by enforcing a:

A.

proxy server policy.

B.

strong password policy.

C.

restricted access policy.

D.

firewall configuration policy.

Full Access
Question # 25

You want to provide your visitors with Web pages that look good and perform well on many browsers and platforms. Accessibility and conformance to W3C standards are critical. Using a WYSIWYG editor, what would be the most appropriate positioning method and font choice for page elements on the site template?

A.

Table layout and relative font sizes

B.

Table layout and absolute font sizes

C.

CSS positioning and relative font sizes

D.

CSS positioning and absolute font sizes

Full Access
Question # 26

You have been asked to transfer print copy to a Web page. Which of the following is a commonly accepted rule concerning white space in this situation?

A.

A Web page should contain less than 10 percent white space at any time.

B.

A Web page should contain more than 10 percent white space, but no more than 20 percent.

C.

A Web page should contain approximately 50 percent less text than a printed page containing the same information.

D.

A Web page should contain approximately 20 percent less text than a printed page containing the same information.

Full Access
Question # 27

Which of the following would typically be found in the contents of an external style sheet?

A.

P [margin: 1in]

B.

P (margin: 1in)

C.

P { margin: 1in }

D.

Full Access
Question # 28

How many fonts are commonly used in Web page design?

A.

Two

B.

Four

C.

Six

D.

Eight

Full Access
Question # 29

You are working for a financial services company. The company has a Web site that allows its customers to review their statements online. Your Web site uses the Document Object Model (DOM), ActiveX, JavaScript and Java. Which of these technologies is most likely to cause customers problems with their browsers when they try to access information?

A.

Java

B.

ActiveX

C.

JavaScript

D.

Document Object Model (DOM)

Full Access
Question # 30

Marcus is designing a site and wants to use a ready-made template from a Web development application. One consequence of using predesigned templates is that:

A.

they infringe on copyrights.

B.

they interfere with the design process.

C.

they are unlikely to fulfill all design specifications.

D.

they contain business logic that cannot be modified.

Full Access
Question # 31

During a project meeting, Eric explains the need for a development server to host the company's new Web site during development. Eric's IT co-workers want to know who will have access to the development server. What should Eric tell them?

A.

The development server will be accessible to all members of the organization as well as the public.

B.

The development server will be accessible to the development team and to authorized members of the organization.

C.

The development server will be accessible to the public in order to collect public opinion on the development of the Web site.

D.

The development server will be accessible to all members of the organization in order to obtain their suggestions on the development of the Web site.

Full Access
Question # 32

Which Web development team member is responsible for developing a site's navigation?

A.

Web programmer

B.

Graphics designer

C.

Information architect

D.

Information Technology (IT) professional

Full Access
Question # 33

Manuel has been hired by XYZ Corporation to develop a Web site that will display information about the company's products and in-stock quantities to potential customers. The company currently has more than 1,000 products in its catalog. Which approach is best for providing Web site customers with the necessary information?

A.

Develop static XHTML pages that display the product information to the customers.

B.

Provide a link to a PDF catalog of the company's products that customers can download.

C.

Create an XML file of product information and display it using XSLT on one of the site pages.

D.

Create a server-side application that queries product data from the company's database and displays it on a Web page.

Full Access
Question # 34

Cookies can be used to:

A.

target users for marketing.

B.

spread viruses on a network.

C.

execute programs on a Web server.

D.

send personal information back to the Web server.

Full Access
Question # 35

Which of the following best describes the type of information that Web server log files can collect?

A.

Browser version, reviewed products, IP address

B.

Browser information, pages viewed, referrer sites

C.

Browser information, return visits, past purchases

D.

Credit card number used, favorite products, pages viewed

Full Access
Question # 36

Bi-directional text is a function of CSS2. What is the importance of this function?

A.

CSS2 determines the display of paged media.

B.

The need for the browser proprietary tag is eliminated.

C.

A Z-axis allows elements to be stacked on a page and displayed in either direction.

D.

Some languages, such as Arabic, can cause documents to render with mixed directionality.

Full Access
Question # 37

Kim is using a proprietary HTML application to create code for a Web page. Currently, the application is set to use HTML 4.01, according to a request from Kim's supervisor. Kim wants the code to be as XHTML-compliant as possible, in case of an upgrade. Which of the following should she do?

A.

Configure the application to use UTF-8.

B.

Insert embedded style sheets for all pages.

C.

Insert an XHTML 1.0 Transitional tag.

D.

Enable the application to insert ending tags for all code.

Full Access
Question # 38

Consider the following code:

$dbcon=mysql_connect("james.stangernet.com","example");

mysql_select_db("databaseone");

Which of the following describes the function of this code?

A.

It is selecting a table from the database.

B.

It is conducting a join for a new database.

C.

It is creating a connection to the database.

D.

It is selecting a database record and creating a new record.

Full Access
Question # 39

A recent trend in Web content is to allow computer systems to exchange information and share functionality with one another using well-defined protocols and compatible languages.This functionality is referred to as:

A.

Web portals.

B.

Web farming.

C.

Web sharing.

D.

Web services.

Full Access
Question # 40

Tom is making changes to his company's Web site. Because he likes the way the markup is styled, he copies the following into another section of the page:

This section is under construction

Why does the home page not validate properly?

A.

The

tag was not closed properly.

B.

Element attributes must be declared in the style sheet.

C.

A

tag can be used only once in each document's markup.

D.

An ID attribute can be applied to only one element in a document.

Full Access
Question # 41

Kara is using FrontPage 2003 to build a new Web site. She has just finished creating a template page that contains the layout, fonts and menu items for all other pages in the site, as well as an editable region for each page's individual content. Other members of Kara's design team are using Dreamweaver to also work on the site. What should Kara name this file?

A.

Ktem.dwt

B.

KTem.htm

C.

KarasTemplate.asp

D.

KarasTemplate.tem

Full Access
Question # 42

SVG files can be defined as:

A.

a bitmap photo format.

B.

a cross-platform image-rendering plug-in.

C.

a proprietary plug-in for displaying Flash files.

D.

a way to describe two-dimensional graphics in XML.

Full Access