100% Verified Questions & Correct Solutions
WEB WOC Seminars Exam 2026 – Practice Test
1. In the TCP/IP model, which layer is responsible for logical addressing and routing?
A. Application
B. Transport
C. Internet
D. Network Access
Answer: C ✓
2. A network that spans a large physical distance, like between cities, is typically called a:
A. PAN
B. LAN
C. MAN
D. WAN
Answer: D ✓
3. Which protocol is used to securely transfer files over a network?
A. HTTP
B. FTP
C. SFTP
D. SNMP
Answer: C ✓
4. In project management, the "Triple Constraint" traditionally includes Scope, Time, and
what else?
A. Risk
B. Cost
C. Quality
D. Resources
Answer: B ✓
5. The primary purpose of a SWOT analysis is to:
A. Assign tasks to team members.
B. Track project milestones.
C. Evaluate a project's budget.
,D. Assess strategic positions.
Answer: D ✓
6. What does the "S" in the SMART acronym for goal setting stand for?
A. Specific
B. Simple
C. Strategic
D. Scheduled
Answer: A ✓
7. In cloud computing, the "Platform as a Service" model provides:
A. Virtual machines and operating systems.
B. Just the underlying infrastructure.
C. A software environment for developing applications.
D. A fully managed end-user application.
Answer: C ✓
8. Which data type in a database is best suited for storing a 'Yes' or 'No' value?
A. Integer
B. Varchar
C. Boolean
D. Text
Answer: C ✓
9. The PRIMARY KEY constraint in a database table ensures:
A. Referential Integrity
B. Entity Integrity
C. Domain Integrity
D. User-Defined Integrity
Answer: B ✓
10. Which programming language is most closely associated with adding interactivity to web
pages?
A. HTML
B. CSS
C. Java
D. JavaScript
Answer: D ✓
,11. A function in programming is primarily used to:
A. Store data.
B. Perform a specific task.
C. Style a webpage.
D. Define a database schema.
Answer: B ✓
12. Which of the following is a core principle of Lean methodology?
A. Comprehensive documentation
B. Eliminating waste
C. Fixed scope contracts
D. Extensive upfront planning
Answer: B ✓
13. In cybersecurity, a "zero-day" vulnerability is:
A. A bug that is fixed immediately.
B. An unknown flaw for which no patch is available.
C. A low-severity issue.
D. A vulnerability in software that is zero years old.
Answer: B ✓
14. Multi-factor authentication (MFA) is effective because it requires:
A. Two different passwords.
B. Something you know, and something you have or are.
C. A longer username.
D. Biometrics only.
Answer: B ✓
15. The primary goal of ITIL's Change Management process is to:
A. Implement all changes as quickly as possible.
B. Ensure standardized methods for handling changes.
C. Eliminate all IT changes.
D. Allow users to make changes without approval.
Answer: B ✓
16. An SLA (Service Level Agreement) defines the agreed-upon level of service between:
A. Two departments within a company.
B. A company and its competitors.
C. A service provider and a customer.
, D. A manager and an employee.
Answer: C ✓
17. In a relational database, a foreign key is used to:
A. Uniquely identify a record in its own table.
B. Create a link between two tables.
C. Encrypt sensitive data.
D. Speed up query performance.
Answer: B ✓
18. The "C" in the CIA triad of information security stands for:
A. Confidentiality
B. Compliance
C. Concurrency
D. Control
Answer: A ✓
19. A phishing attack typically relies on:
A. Overwhelming a network with traffic.
B. Social engineering and deceptive communication.
C. Physical theft of hardware.
D. Exploiting unpatched software automatically.
Answer: B ✓
20. What is the main purpose of a VPN (Virtual Private Network)?
A. To increase internet speed.
B. To create a secure, encrypted connection over a public network.
C. To block all incoming traffic.
D. To host public websites.
Answer: B ✓
21. Which protocol is used to automatically assign IP addresses to devices on a network?
A. DNS
B. DHCP
C. FTP
D. HTTP
Answer: B ✓
22. The command ping is used primarily to:
A. Test the connectivity between two network devices.