CIW EXAM QUESTIONS

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

What is the difference between a computer virus and a worm? A. A worm can replicate by itself, whereas a virus requires user action to replicate. B. A virus can replicate by itself, whereas a worm requires user action to replicate. C. A worm can deposit an illicit server, whereas a virus cannot. D. A virus can deposit an illicit server, whereas a worm cannot.

A. A worm can replicate by itself, whereas a virus requires user action to replicate.

A family member has just sent you an e-mail message that contains highly personal details about a family matter. The message was sent to your company e-mail address. The family member has requested that you respond with your ideas about how to resolve the situation. Which of the following is a reason for you to call your family member and discuss the matter over the phone instead? A. Because your employer has the right to read your e-mail B. Because an e-mail message about a personal family matter will violate netiquette guidelines C. Because it is illegal to use company e-mail for personal use D. Because e-mail is completely private but not personal enough

A. Because your employer has the right to read your e-mail

Digital signatures verify the integrity of the data, verify the identity of the sender, and: A. Enforce non-repudiation. B. Sign digital certificate requests. C. Create certificate requests. D. Provide data confidentiality.

A. Enforce non-repudiation.

The App-A-Day company offers software applications for various topics. When a customer purchases a desired application from the App-A-Day online store, he is directed to a page where he can download the application directly. When the customer is redirected and begins downloading the application, which specific standard protocol is most likely transferring the application? A. FTP B. HTTPS C. HTTP D. SMTP

A. FTP

A paradigm shift has occurred in the way that small businesses use software applications. Companies increasingly choose hosted solutions with a monthly subscription fee and outsourced system maintenance, instead of purchasing software and hardware that must be maintained by internal resources. This business model is commonly referred to as: A. Software as a Service B. scalability C. crowdsourcing D. grid computing

A. Software as a Service

Aisha is preparing to give a presentation to management about the development of cloud computing services that her company is planning to implement. Which of the following might her managers mention as a possible objection or drawback to using cloud services for the company? A. Speed B. Scalability C. Flexibility D. Cost

A. Speed

Selena needs to send a message to her manager providing all the details of a business proposal. The idea they have discussed is critical to the business. The project is considered urgent and confidential. Selena wants to get this outline to her manager as quickly as possible. What would be the most appropriate way Selena could use an SMS (text) message in relation to this proposal? A. To alert her manager that she has sent the proposal via e-mail so her manager can view the proposal as soon as possible B. To send the proposal as an attachment to the text message C. To send a useful summary of the proposal to her manager so that the manager has it available during a presentation D. To provide a detailed outline of the proposal so that her manager can refer to it as he Travels.

A. To alert her manager that she has sent the proposal via e-mail so her manager can view the proposal as soon as possible

Which of the following strategies is recommended when conducting keyword searches? A. Use nouns instead of verbs for keywords. B. Use verbs instead of nouns for keywords. C. Use as few keywords as possible. D. Include at least one preposition such as "the"or"an"in your list of keywords

A. Use nouns instead of verbs for keywords

Consider the following address: http://www.CIWcertified.com/certifications/web_foundations/iba.php Which part of the URL represents the server name on which this page resides? A. WWW B. /certifications/ C. CIWcertified D. CIWcertifed.com

A. WWW

You are the technology coordinator for a small multi-national corporation with offices in Los Angeles, New York, Tokyo, and London. You have been asked to coordinate a live and interactive meeting that will allow executives from each of the offices to meet virtually and share presentations. What is the best way to achieve this desired goal? A. Web conference B. Podcast C. Conference call D. Webcast

A. Web conference

You are configuring an e-mail client to connect to your e-mail account. Which of following is required to set up the e-mail account? A. ANDS server address B. APOP3 address C. An FTP address D. An HTTP address

B. APOP3 address

A friend just sent you a link to a Facebook page with information that you find very useful. You want to be able to recall the site in the future from your desktop computer, or from your mobile device while away from your desk. Which is the best approach? A. Memorize the URL so you can pull up the site in any browser such as Chrome, Firefox or Internet Explorer. B. Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks. C. Manually enter the Web address into any and all browsers on all of your devices. D. Pull up the message with the link any time you want to view the site.

B. Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.

Raoul has received a file attachment from a known individual. He has no reason to expect files from this individual. Which of the following is an effective security strategy for Raoul to take? A. Open the file attachment and use anti-virus software to scan it. B. Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it. C. Before opening the attachment, use anti-virus software to scan the system's hard disk. D. Make back-up copies of important files so that it is possible to recover them in case of an incident.

B. Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.

Irena is reviewing several promotional product videos from her company's marketing department before they are published on the company's Web site. The videos are in Real Media format, but they do not open in Irena's Windows Media Player. What should Irena do to view the videos? A. Upload the videos to the Web server to be viewed through Windows Media Player because they will not play from a local computer. B. Convert the video files to the WMV format because Real Media files will not play in Windows Media Player. C. Contact her company's Technical Support department and schedule service for her computer. D. Decompress the files before attempting to play them in Windows Media Player, because Real Media files are compressed for uploading/downloading.

B. Convert the video files to the WMV format because Real Media files will not play in Windows Media Player.

As a project manager, you have to balance three elements that compose the project triangle. Suppose your customer requests that you add some new requirements to the project when you are halfway through. If you agree to this request, how would it affect other aspects of the project? A. Cost of the project will decrease. B. Cost of the project will increase. C. Project scope will decrease. D. Time to complete project will be reduced.

B. Cost of the project will increase.

Consider the following address: http://www.CIWcertified .com/Certifications/Web_Foundations/iba.php Which of the following is the best classification for the address? A. Virtual domain name B. Deep URL C. Relative URL D. Fully qualified domain name

B. Deep URL

You are using an e-mail client that you are unfamiliar with. You need to send an e- mail with an attachment but you do not see a feature labeled "attachment" anywhere on the client. What icon should you look for that is commonly used to invoke the e- mail attachment option? A. Folder B. Paperclip C. Lock D. Checkmark

B. Paperclip

An end user cannot log in to a page that provides an c-learning course. The authentication window will not launch. Which of the following is most likely the cause of this problem? A. Pop-up blocking software has been enabled in the operating system. B. Pop-up blocking software has been enabled in the Web browser. C. The browser has recently had its browsing history cleared. D. The browser has recently had its cookie cache cleared.

B. Pop-up blocking software has been enabled in the Web browser.

You are a software developer who wants to start developing mobile apps for smartphones. You have the option to develop apps for an open-source operating system. Which of the following could persuade you to focus your development efforts on the open-source operating system? A. Open-source operating systems and development tools are free from software bugs and viruses. B. The operating system and associated development tools are free, provided you comply with the copyleft license. C. Source code for an open-source app is not viewable and cannot be modified. D. An open-source license will never be in the public domain.

B. The operating system and associated development tools are free, provided you comply with the copyleft license.

Which of the following is a legal and ethical practice? A. Downloading copyrighted artwork and using it as a background on your Web site. B. Trying shareware for free and paying for it only after you decide to keep using it. C. Copying someone else's written work found on the Internet and presenting it as your own, as long as it is for schoolwork. D. Downloading music and motion pictures as long as they are from a peer-to-peer network.

B. Trying shareware for free and paying for it only after you decide to keep using it.

Marcella is looking for a unique product online. She has found one on the XYZ Company's Web site, which is designed well and appears to be legitimate. As she navigates through the checkout process, she reaches the checkout page with this URL, which asks her to enter her credit card information: http://XYZ.com/gp/checkout.html/ref=chk_out_TLS12B_lb? ie=UTF8&docId=1000 7931. Why should Marcella cancel her online transaction instead of proceeding? A. Because the link contains abbreviations and is not completely readable, so Marcella is unsure of the server's name B. Because the site uses 128-bit encryption, which is illegal for companies that are located overseas C. Because the link does not use SSL/TLS encryption and therefore the information Marcella enters would not be secure D. Because the link uses SSL/TLS encryption, which Marcella knows is not compatible with the browser she is using

C. Because the link does not use SSL/TLS encryption and therefore the information Marcella enters would not be secure

Your Web browser is currently open and displaying a popular sports site. You decide that you want to browse to the CIW site without closing the browser. What is the most efficient way to accomplish this? A. By typing in the FTP address (ftp.CIWcertified.com) in the address bar of your Web browser B. By performing a search within the site currently displayed in your Web browser C. By typing the CIW site's URL (www.CIWcertified.com) in the address bar of your Web browser D. By performing a search on your computer for the term "CIW"

C. By typing the CIW site's URL (www.CIWcertified.com) in the address bar of your Web browser

Andrea works as an Administrative Assistant for a small business that uses a SaaS service for accounting, sales orders, and customer service information about the business's customers. This product is like Salesforce.com and its competitors. Andrea makes sure she saves accurate records about current projects and performs regular backups of the business data stored on the cloud-based service. Which of the following is the primary reason for this practice? A. Andrea is overly cautious because it is well known that cloud-based services are highly secure, highly reliable and always available. B. Data stored online through the cloud-based service is more at risk to security breaches than if it were stored locally. C. If there is an interruption in Internet access, the service and records would not be accessible. D. There is a limit on the number of users who are allowed to access the cloud-based service at any one time.

C. If there is an interruption in Internet access, the service and records would not be accessible.

You just received a joke that was c-mailed to you by a co-worker. You find the joke funny and consider forwarding it to another co-worker that you trust. Which human resources issue do you risk by forwarding the e-mail message? A. Reducing the effectiveness of spam filters B. Forgetting to include others who might find the joke funny C. Offending a recipient who receives the joke as a result from further forwarding D. Copyright infringement by not providing credit to the originator of the joke

C. Offending a recipient who receives the joke as a result from further forwarding

Michelle wants to search for a scuba regulator. She plans to use a keyword search engine. She does not want to see any results from the manufacturer named Scuba pro. Which of the following search strings should she use? A. Regulators <Scubapro B. Regulators >Scubapro C. Regulators !Scubapro D. Regulators Scubapro

C. Regulators !Scubapro

Roberto's company is releasing updates to a specific product. He needs to educate the company's sales managers, who are in various international locations, about the new product updates. Which of the following methods would be the most economical and efficient solution for Roberto to discuss the required information with the sales managers synchronously? A. Schedule an in-person sales meeting with them at the company headquarters so that the updates can be demonstrated, and any questions answered with the entire group present. B. Post the product update blueprints on the company's Web site and call each sales manager personally to discuss their individual questions or concerns offline. C. Schedule a Webinar with the sales managers so that the updates can be demonstrated and any questions answered with the entire group. D. Send the product update blueprints via e-mail to each of the sales managers and ask them to contact him with any questions.

C. Schedule a Webinar with the sales managers so that the updates can be demonstrated and any questions answered with the entire group.

Which of the following is used to help non-technical users collectively classify and find information on a site? A. Ajax B. Web feed C. Tagging D. A wiki

C. Tagging

You opened an e-mail attachment, and it launches a virus. The virus takes control of your system, and you are unable to run your anti-virus software. Which of the following is the best step for you to take next? A. Let the virus run its course. B. Plug in your backup drive to try to initiate an immediate backup of important files. C. Turn off your computer and reboot from a known, clean system disk. D. Call your local authorities to report an identity theft.

C. Turn off your computer and reboot from a known, clean system disk.

When using secure authentication, which of the following are required? A. A user name, a password and encryption of transmitted data B. A user name only C. Neither user name nor a password D. A user name and a password

D. A user name and a password

One of your co-workers calls you to ask if you sent her an e-mail message with an attachment. You recall that you sent several c-mails with attachments earlier that day. Which of the following is your best response to this question? A. Ask your co-worker to open the attachment and describe the contents. B. Ask your co-worker to forward the e-mail to you so you can open the attachment and check it. C. Ask your co-worker to forward the e-mail to your company's management. D. Ask your co-worker to read the e-mail message including the full name of the attachment and its extension.

D. Ask your co-worker to read the e-mail message including the full name of the attachment and its extension.

Which choice lists the required elements for HTTP to function? A. Client, Web page and DNS B. Browser, HTML and TCP/IP C. Server, HTML and DNS D. Client, server and TCP/IP

D. Client, server and TCP/IP

You are expecting a very important file from a co-worker in a remote office to be sent to you through e-mail. You finally call the co-worker and tell him that you have not received the file. He informs you that he sent the file yesterday but will send it again immediately. After some time, you still have not received his e-mail message You contact the Technical Support department and ask them for help. After some investigation, Technical Support finds the e-mail from your coworker with an attachment named salesnumbers.exe in the spam folder of your e-mail client. What is the most likely reason that the e-mail message was filtered out? A. The attachment's file size exceeds the size limits of the e-mail filter policy. B. The file name of the attached file exceeds the file name length of the filter policy. C. Messages from remote offices are blocked on internal e-mail. D. File attachments with an .exe extension may contain malicious code.

D. File attachments with an .exe extension may contain malicious code.

You have just checked the balance in your bank account by logging into your bank's Web site. Which protocol was most likely used for the transmission of your information? A. IMAPS B. FTPS C. POP D. HTTPS

D. HTTPS

Which organization is responsible for managing domain names so that each one is unique, and (once registered) cannot be used by an unauthorized individual or organization? A. W3C B. RFC C. IEFT D. ICANN

D. ICANN

Which is the preferred approach to communicate important action items in an e-mail message to a co-worker? A. Describe all action items at length in a detailed paragraph in the middle of the message. B. Write the action items using all capital letters. C. Include emoticons to ensure the recipient understands your humor. D. List the action items in a numbered or bulleted list for clarity.

D. List the action items in a numbered or bulleted list for clarity.

Proprietary information for your company's online business was released to a competitor. Which of the following preventative measures should your company take to ensure that its proprietary information is protected in the future? A. Destroy all proprietary information B. Restrict Internet access C. Uninstall any e-mail clients D. Monitor employees' messages

D. Monitor employees' messages

You attend an online university that offers seminars on APA Style through its Writing Center. You registered for the seminar and learned that the training will be provided over the Web. Although there is no opportunity to ask questions, you find the live lecture to be engaging. Which Web based meeting format was used? A. Webinar B. Web conference C. Blog D. Video conference

D. Video conference

Your child's high school has created a wiki for its social science classes to support blogs and collaborative projects. Your child also contributes photos of extracurricular events to the school's Facebook site. Which term collectively describes these types of Web usage? A. Mashup B. Web 1.0 C. Folksonomy D. Web 2.0

D. Web 2.0

You received an e-mail message on which several other individuals copied. You want to respond to this message in a way that will include everyone who was copied on the original message. You can accomplish this by using which action? A. Reply B. Send C. Forward D. Reply All

D. Reply All

Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a list of music preferences, including favorite songs. The music service then suggests additional songs she might enjoy. The music provider is an example of a cloud-computing application that uses a technology for collaborative filtering, which helps define the list of songs available to listeners. Which term describes this technology? A. Crowdsourcing B. Software as a Service C. Bit-torrent D. Grid computing

A. Crowdsourcing

You have just finished designing a Web site to support a charity organization's fund-raising efforts. You need to meet with the board members to get their feedback and address some questions before you implement the final design. The board members are dispersed throughout the country and want to avoid spending charity funds on traveling to this meeting. Which of the following solutions would best support the charity and provide you with an opportunity to discuss the design as a group? A. Plan a Web conference using a service such as WebEx or GoToMeeting that Supports screen sharing and phone conferencing. B. Plan a Webinar that reviews the layout of the site and request that board members submit their feedback by e-mail after the Webinar. C. Create an audio Webcast and distribute it to the board members over the Internet. D. Create a PowerPoint slideshow that contains pictures of your Web site design and create a survey to gather the board members' feedback.

A. Plan a Web conference using a service such as WebEx or GoToMeeting that Supports screen sharing and phone conferencing.

You accidentally dropped your mobile phone, which was submerged in water and no longer works. Upon replacing the phone with an upgraded unit, you must reconfigure many of the services. The instructions say that all you need to do is enter your e- mail address and the unit will configure the e- mail client for you. Even though you have tried this several times, it does not work. The mobile phone vendor says that because you are trying to sync your e-mail account with an enterprise mail server, you will need to configure the e-mail client manually. Which choice lists the information you will need to configure the e-mail client? A. E-mail address, SMTP, IMAP, DNS, username and password B. E-mail address, SMTP, POP3, username and password C. Company name, e-mail address, SMTP, POP3, IMAP and DNS D. Company name, SMTP, POP3, username and password

B. E-mail address, SMTP, POP3, username and password

Paul has just finished a very important sales meeting with a potential customer, and he needs to update his supervisor at the corporate office, which is in another country. Paul is debating whether to text or e-mail his supervisor about the meeting details. Which of the following would be the best practice for communicating with his supervisor? A. Post the details of the meeting on his favorite social media platform, where his supervisor is one of his followers. B. Send a brief text message update now, and then send the meeting details in an email message later. C. Send several text messages to convey all the details of the meeting most quickly. D. Send a brief text message to say the meeting has finished, because Paul knows his supervisor does not read e-mail.

B. Send a brief text message update now, and then send the meeting details in an email message later.

Xue's company has provided her with a desktop computer to use at work. She has configured her e- mail client on this work computer to include her personal e- mail account so that she can conveniently download messages and check her personal e-mail. Xue should be aware that: A. The company will block personal e-mail accounts. B. The company will have access to her personal e-mail messages. C. The company must permit her to receive personal e-mail messages. D. The company will ignore the e-mail messages to respect her privacy.

B. The company will have access to her personal e-mail messages.

Emelia and Lola have created a new software application that allows messaging site subscribers to analyze the message statistics in order to more easily assess and interact with followers. They have decided to license this software according to the GNU GPL Version 3. What does this license allow them to do with their software? A. They can sell this software, but only if they make the software code available on a public server. B. The software enters the public domain for free use and can be altered by other programmers, who must then make their changes freely available as well. C. The software enters the public domain for free use, but any changes made in the future can be kept secret, allowing them to profitably sell the modified software. D. They can only sell this software through a not-for-profit company

B. The software enters the public domain for free use and can be altered by other programmers, who must then make their changes freely available as well.

Which of the following strategies will help protect your computer against virus attacks? A. Perform regular backups of your hard drive. B. Update the definitions for your malware protection application frequently. C. Open e-mail attachments only from unknown senders. D. Configure security settings for your Web browser to the lowest possible level.

B. Update the definitions for your malware protection application frequently.

The official CIW Web site has an IP address of 72.44.192.233. Which technology allows Web users to enter the URL www.CIWcertified.com in the browser address bar to access the site, instead of having to remember and enter the IP address? A. HTTP B. SSL C. DNS D. NNTP

C. DNS

The App-A-Day company offers software applications for various topics. When a customer purchases a desired application from the App-A-Day online store, he is directed to a page where he can download the application directly. When the customer is redirected and begins downloading the application, which specific standard protocol is most likely transferring the application? A. SMTP B. HTTP C. FTP D. HTTPS

C. FTP

You received a text and a threatening voicemail from an angry customer who wants to immediately discuss the shortcomings of a recently released product. You are about to walk into a mandatory meeting with your top-level leadership team. Which of the following is your best course of action? A. Do not respond to the customer. B. Skip the meeting and call the customer. C. Request that the customer send his complaints by e-mail, knowing that any inappropriate communication will be well documented. D. Continue to send text messages to the customer hoping to smooth things over until you can call him on the phone after your meeting.

C. Request that the customer send his complaints by e-mail, knowing that any inappropriate communication will be well documented.

You have 20 remote employees flying in to attend a corporate meeting. The morning of travel day, the administrator tells you that the hotel reservations have changed. What is the best way to send each traveling employee a quick message with the new hotel information? A. Call each stakeholder and leave a message with the address of the hotel. B. Update the meeting agenda with the hotel information. C. Send a text message with the hotel information to the mobile phone of each traveler. D. Post an announcement to the company's Web site with the new hotel information.

C. Send a text message with the hotel information to the mobile phone of each traveler.

Your customer scheduled a meeting to discuss a project you are managing. Early testing indicates that there are currently quality problems with some of the more complex features. The customer stated that quality and budget are his two main concerns: The project must be developed within budget and must be very high quality. When you asked the customer if he would be willing to extend the deadline to meet his objectives, he stated this was not possible. What adjustment to the project triangle components can you suggest to meet your customer's needs? A. Suggest that the customer hire temporary contractors. B. Inform the customer that he must compromise one of the three elements of a project triangle: quality, budget or schedule. C. Suggest that the scope be limited to include only the most important features. D. Suggest that the customer use a Gantt chart to add time to the project.

C. Suggest that the scope be limited to include only the most important features.

Gabby suspects that an attacker has gained control of her system. Which of the following is the most appropriate action for her to take? A. Enable strong encryption on all files on the hard disk. B. Shut down the computer. C. Unplug the computer network cable and/or disable the computer's wireless NIC. D. Run anti-virus software on all disks associated with this system.

C. Unplug the computer network cable and/or disable the computer's wireless NIC.

To reduce the costs of maintaining servers with FTP access; your company is using P2P to facilitate sharing of information. Which strategy should your company use to protect the company's sensitive information while capitalizing on the benefits of P2P power? A. Limit P2P use to sharing music files. B. Restrict employees from using their computers in P2P communications. C. Use technologies that will control access and password-protect files. D. Restrict P2P use to sharing only with universities and research organizations.

C. Use technologies that will control access and password-protect files.

You have volunteered to give a presentation to the parents at your child's school about the dangers of the Internet. Which of the following would you include in your recommendations to parents? A. Direct parents to ask other users in the children's chat rooms to provide identification. B. To reduce fear, claim that the threat of predators has been reduced in recent times. C. Warn children to never provide personal information over the Internet. D. Remind the parents that the anonymity of chat rooms provides security.

C. Warn children to never provide personal information over the Internet.

You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance drafting business. You have a personal Web site and would like to share samples of your work for potential new customers to review. To which file format should you convert your drawings so that they are viewable regardless of the local operating system used by the individual viewing your site? A. DOC B. MP3 C. XML D. PDF

D. PDF

You are leading a team of new hires and need to train them on innovative strategies and technologies that will be used to develop an upcoming project. You send several e-mail messages with links to helpful resources. But you soon realize this is an inefficient way to organize and share this information. Which solution would provide a more efficient way to categorize and share this information? A. Collective intelligence B. Grid computing C. Ajax programming D. Social tagging

D. Social tagging

Melanie works in the sales department at XYZ Company. She decides that her company's marketing team has done a poor job representing the company's brand. Without direction or permission, she starts her own social networking account to help. This account's name is called XYZ Professional. To customize her page, she uses company logos and verbiage from the company Web site. She then begins communicating with customers and individuals interested in XYZ via this service. Which of the following would be the most appropriate response to Melanie's actions by the company? A. Sending Melanie a request from the company's Human Resources department to stop using company logos, yet allowing her to continue using this social networking account B. Providing a link to Melanie's page from the company's official social networking account C. Adding references to Melanie's social networking page in the company's internal newsletter D. Terminating Melanie's employment for copyright and trademark violation, with a cease-and desist letter asking for control of the account

D. Terminating Melanie's employment for copyright and trademark violation, with a cease-and desist letter asking for control of the account

You just started a small business and need to create a logo. Although you are technically savvy, your artistic creativity is limited. You decide to launch a contest to seek creative ideas for your logo. Using the Internet and social networking in this manner is known as: A. social engineering B. folksonomy C. outsourcing D. crowdsourcing

D. crowdsourcing


Kaugnay na mga set ng pag-aaral

SHRM - Employee and Labor Relations

View Set

Astronomy Chapter 11 - The Giant Planets

View Set

I've made my home next door to you, By: Ghalib

View Set

Anatomy Unit 2 BRS/Lippincotts: Head/Neck/Cranial Nerves

View Set

CS331 Exercise Questions, CS331 Exercise Questions Part 2

View Set

Modules 1-3: Assessment Techniques & General Survey, Eyes, Ears, Nose, Mouth, & Throat, Lungs, Chest wall, Thorax, Heart & Neck Vessels Peripheral Vascular and Lymphatics Head, & Neck ,

View Set