CERTIFICATION REVIEW

Ace your homework & exams now with Quizwiz!

You received an e-mail message on which several other individuals were copied. You want to respond to this message in a way that will include everyone who was copied on the original message. You can accomplish this by using which action?

Reply All

You received a text and a threatening voicemail from an angry customer who wants to immediately discuss the shortcomings of a recently released product. You are about to walk into a mandatory meeting with your top-level leadership team. Which of the following is your best course of action?

Request that the customer send his complaints by e-mail, knowing that any inappropriate communication will be well documented.

To reduce the costs of maintaining servers with FTP access; your company is using P2P to facilitate sharing of information. Which strategy should your company use to protect the company's sensitive information while capitalizing on the benefits of P2P power?

Restrict employees from using their computers in P2P communications.

When using cloud-based services to host company data, a company's disaster recovery plan should include strategies for:

creating redundancy and ensuring there is an exclusive contract with the cloud service provider.

You just started a small business and need to create a logo. Although you are technically savvy, your artistic creativity is limited. You decide to launch a contest to seek creative ideas for your logo. Using the Internet and social networking in this manner is known as:

crowd sourcing

Which line of code instructs the browser to look for a directory named my site that begins one level higher than the page you are currently viewing?

http://www.mysite.com/index.html

The Windows Device Manager is a tool that enables you to perform a variety of tasks, including:

Change a resource assignment.

Which of the following is generally a component of a BYOD policy?

Scope of control

A friend just sent you a link to a Facebook page with information that you find very useful. You want to be able to recall the site in the future from your desktop computer, or from your mobile device while away from your desk. Which is the best approach?

Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.

One of your co-workers calls you to ask if you sent her an e-mail message with an attachment. You recall that you sent several c-mails with attachments earlier that day.Which of the following is your best response to this question?

Ask your co-worker to read the e-mail message including the full name of the attachment and its extension.

Henry is the network manager at XYY Corporation, a large manufacturing company that competes in the global market. The company's computing environment is extremely complex and includes several proprietary software systems, all of which require custom configuration of network devices to operate correctly. The company's executive management team believes that they can benefit by switching the company over to any cloud-based service. Henry disagrees. What is a disadvantage of cloud-based services that Henry can cite to support his position?

Cloud-based services are typically more limited in offerings and configurations than the company currently supports in-house.

You have been asked to design and develop a Web site for a retirement community. What can you do to help make the site accessible to the elderly?

Comply with WAI's Web Content Accessibility Guidelines.

Configuring a wireless network involves several steps. Which of the following is a task that should be performed to configure and connect to a wireless network?

Configure the wireless AP's SSID, encryption level and shared key.

Irena is reviewing several promotional product videos from her companys marketing department before they are published on the companys Web site. The videos are inRealMedia format, but they do not open in Irenas Windows Media Player. What should Irena do in order to view the videos?

Convert the video files to the WMV format, because RealMedia files will not play in Windows Media Player.

As a project manager, you have to balance three elements that compose the project triangle. Suppose your customer requests that you add some new requirements to the project when you are halfway through. If you agree to this request, how would it affect other aspects of the project?

Cost of the project will increase.

When using cloud-based services to host company data, a company's disaster recovery plan should include strategies for:

Creating redundancy and using multiple cloud service providers.

Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a list of music preferences, including favorite songs. The music service then suggests additional songs she might enjoy. The music provider is an example of a cloud-computing application that uses a technology for collaborative filtering, which helps define the list of songs available to listeners. Which term describes this technology?

Crowdsourcing

The official CIW Web site has an IP address of 72.44.192.233. Which technology allows Web users to enter the URL www.ClWcert/u/ecl,com in the browser address bar to access the site, instead of having to remember and enter the IP address?

DNS

Acme Company has been receiving complaints from its suppliers saying that its extra net site does not render correctly in all their employees' browsers. The suppliers are asking that the extra net site be fixed so that everyone can access it, regardless of browser type. When examining this problem, the Acme Web Development team finds that many developers worked on the site and each used code that he or she was comfortable with. To resolve this problem, what can the Acme developers do?

Edit the code so that it follows a single W3C scripting language standard.

The App-A-Day company offers software applications for various topics. When a customer purchases a desired application from the App-A-Day online store, he is directed to a page where he can download the application directly. When the customer is redirected and begins downloading the application, which specific standard protocol is most likely transferring the application?

FTP

SuperBank is considering a cloud service from Local Data Center, Inc., to support the bank's expanding needs. SuperBank's managers are concerned about security. What can SuperBank request to protect its data from security threats?

For SuperBank to perform background checks on the staff at Local Data Center, Inc.

Which of the following is a security threat commonly associated with cloud-based services?

Hypervisor vulnerabilities

Mobile computing has become a common necessity for both personal and business transactions. Which device has features similar to a smartphone but usually does not have telephone capabilities?

Laptop

When developing a Web site, which of the following actions would be considered unethical?

Linking your site to another site with permission

When establishing a mobile presence, which of the following offers mobile-friendly content to the widest possible audience?

Mobile Web sites

You just received a joke that was e-mailed to you by a co-worker. You find the joke funny and consider forwarding it to another co-worker that you trust. Which human resources issue do you risk by forwarding the e-mail message?

Offending a recipient who receives the joke as a result from further forwarding

You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance drafting business. You have a personal Web site and would like to share samples of your work for potential new customers to review. To which file format should you convert your drawings so that they are viewable regardless of the local operating system used by the individual viewing your site?

PDF

You are using an e-mail client that you are unfamiliar with. You need to send an e-mail with an attachment but you do not see a feature labeled "attachment" anywhere on the client. What icon should you look for that is commonly used to invoke the e-mail attachment option?

Paperclip

Marion is formatting a simple Web page. She has been asked to create headings before the first and third paragraphs. To accomplish this most efficiently, which type of HTML elements should Marion use?

Paragraph-level elements

Which type of attack involves the installation of malicious code on personal computers or servers that redirects Internet traffic from a legitimate Web site to an identical-looking but malicious imposter Web site?

Pharming

Violating a copyright or trademark is an example of what type of prosecutable crime?

Plagiarism

An end user cannot log in to a page that provides an c-learning course. The authentication window will not launch. Which of the following is most likely the cause of this problem?

Pop-up blocking software has been enabled in the Web browser.

Consider the following address: http://www.CIWcertified .com/Certifications/Web_Foundations/iba.php Which of the following is the best classification for the address?

Relative URL

Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify?

Service Set Identifier (SSID)

Gwen works for a small company where she has been asked to find a cost-effective option for providing comprehensive customer service. The finance, technical support, sales and customer service departments all need to share information about their customers. Gwen is considering adoption of a customer relationship management (CRM) application. Which of the following would be the most cost-effective solution?

She can contract with a cloud service provider to host the CRM that her company's employees can access.

Security attacks can vary greatly. Which type of attack is characterized as an attempt to trick an individual into revealing confidential or private information?

Social engineering

You are leading a team of new hires and need to train them on innovative strategies and technologies that will be used to develop an upcoming project. You send several e-mail messages with links to helpful resources. But you soon realize this is an inefficient way to organize and share this information. Which solution would provide a more efficient way to categorize and share this information?

Social tagging

Aisha is preparing to give a presentation to management about the development of cloud computing services that her company is planning to implement. Which of the following might her managers mention as a possible objection or drawback to using cloud services for the company?

Speed

Marion has been hired by a small business to determine why its Web site does not attract users. As Marion interviews different members of the company, she learns that when the site was first created, the external Web developer did not produce any documents specifying the basic requirements for the site. As a result, the site did not have a defined purpose and was not designed for the company's audience. Additionally, the site navigation did not make sense from a user's point of view. Marion considers this information, then she recommends that the company create which document?

Storyboard

Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to the computer lab to give the final exam. As an alternative, he asked students to bring their own devices (BYOD) and connect to the college's Wi-Fi for network access. What security risk is associated with this implementation?

Student devices sending unsecured data

Your customer scheduled a meeting to discuss a project you are managing. Early testing indicates that there are currently quality problems with some of the more complex features.The customer stated that quality and budget are his two main concerns: The project must be developed within budget and must be very high quality. When you asked the customer if he would be willing to extend the deadline to meet his objectives, he stated this was not possible.What adjustment to the project triangle components can you suggest to meet your customers needs?

Suggest that the scope be limited to include only the most important features.

Which term describes a compact personal computer that relies on a touch screen for in put, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity?

Tablet

Emelia and Lola have created a new software application that allows messaging site subscribers to analyze the message statistics in order to more easily assess and interact with followers. They have decided to license this software according to the GNU GPL Version 3. What does this license allow them to do with their software?

The software enters the public domain for free use and can be altered by other programmers, who must then make their changes freely available as well.

Which type of intellectual property includes business plans, proprietary code and sales contracts?

Trade secret

You opened an e-mail attachment and it launches a virus. The virus takes control of your system and you are unable to run your anti-virus software. Which of the following is the best step for you to take next?

Turn off your computer and reboot from a known, clean system disk.

Gabby suspects that an attacker has gained control of her system. Which of the following is the most appropriate action for her to take?

Unplug the computer network cable and/or disable the computer's wireless NIC.

Jose is experiencing performance problems with his notebook computer that he purchased a year ago. Upon discussing this issue with him, you learn that he has never deleted any temporary files since owning the device. What can Jose do to fix this problem most efficiently?

Use the Windows Disk Cleanup utility.

Which term describes the practice of actively collecting wireless networking data from companies and individuals?

War driving

You are the technology coordinator for a small multi-national corporation with offices in Los Angeles, New York, Tokyo and London. You have been asked to coordinate a live and interactive meeting that will allow executives from each of the offices to meet virtually and share presentations. What is the best way to achieve this desired goal?

Web conference

You attend an online university that offers seminars on APA Style through its Writing Center. You registered for the seminar and learn that the training will be provided over the Web. Although there is no opportunity to ask questions, you find the live lecture to be engaging. Which Web based meeting format was used?

Webinar

You have just been hired by a large company, and the IT manager is giving you an overview of the corporate network. He tells you that the corporation is spread out over several cities, and various departments are divided into sub networks that are connected using routers. What type of network are you being shown?

Wide area network (WAN)

What is the biggest security concern with wireless networks?

Wireless encryption algorithms must be implemented.

Xue's company has provided her with a desktop computer to use at work. She has configured her e-mail client on this work computer to include her personal e-mail account so that she can conveniently download messages and check her personal e-mail. Xue should be aware that:

the company will have access to her personal e-mail messages.


Related study sets

Introduction to Pharmacology - CHAPTER 21 Antineoplastic Drugs

View Set

Chapter 3: Creating Anglo-America, 1660-1750

View Set

Chapter 3: Evaluating the External Environment

View Set

Chapter 17: Evolution of Populations

View Set

intro to interpersonal communications 1-7

View Set

Management of Patients with Upper Respiratory Tract Disorders

View Set