100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CIW Exam Questions and Answers Already Graded A

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
07-06-2023
Written in
2022/2023

CIW Exam Questions and Answers Already Graded A Which of the following is a legal and ethical practice? B. Trying shareware for free and paying for it only after you decide to keep using it. Irena is reviewing several promotional product videos from her companys marketing department before they are published on the companys Web site. The videos are in RealMedia format, but they do not open in Irenas Windows Media Player. What should Irena do in order to view the videos? B. Convert the video files to the WMV format, because RealMedia files will not play in Windows Media Player. You are leading a team of new hires and need to train them on innovative strategies and technologies that will be used to develop an upcoming project. You send several e-mail messages with links to helpful resources. But you soon realize this is an inefficient way to organize and share this information. Which solution would provide a more efficient way to categorize and share this information? A. Social tagging The official CIW Web site has an IP address of 72.44.192.233. Which technology allows Web users to enter the URL www.CIW in the browser address bar to access the site, instead of having to remember and enter the IP address? B. DNS Your customer scheduled a meeting to discuss a project you are managing. Early testing indicates that there are currently quality problems with some of the more complex features. The customer stated that quality and budget are his two main concerns: The project must be developed within budget and must be very high quality. When you asked the customer if he would be willing to extend the deadline to meet his objectives, he stated this was not possible. What adjustment to the project triangle components can you suggest to meet your customers needs? A. Suggest that the scope be limited to include only the most important features. Gabby suspects that an attacker has gained control of her system. Which of the following is the most appropriate action for her to take? D. Unplug the computer network cable and/or disable the computer's wireless NIC. Raoul has received a file attachment from a known individual. He has no reason to expect files from this individual. Which of the following is an effective security strategy for Raoul to take? D. Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it. You have just checked the balance in your bank account by logging into your banks Web site. Which protocol was most likely used for the transmission of your information? B. HTTPS You just received a joke that was c-mailed to you by a co-worker. You find the joke funny and consider forwarding it to another co-worker that you trust. Which human resources issue do you risk by forwarding the e-mail message? C. Offending a recipient who receives the joke as a result from further forwarding You just started a small business and need to create a logo. Although you are technically savvy, your artistic creativity is limited. You decide to launch a contest to seek creative ideas for your logo. Using the Internet and social networking in this manner is known as: C. crowd sourcing You are the technology coordinator for a small multi-national corporation with offices in Los Angeles,NewYork, Tokyo and London. You have been asked to coordinate a live and interactive meeting that will allow executives from each of the offices to meet virtually and share presentations. What is the best way to achieve this desired goal? D. Web conference Digital signatures verify the integrity of the data, verify the identity of the sender, and: B. Enforce non-repudiation. One of your co-workers calls you to ask if you sent her an e-mail message with an attachment. You recall that you sent several c-mails with attachments earlier that day. Which of the following is your best response to this question? B. Ask your co-worker to read the e-mail message including the full name of the attachment and its extension. You have just finished designing a Web site to support a charity organizations fund-raising efforts. You need to meet with the board members to get their feedback and address some questions before you implement the final design. The board members are dispersed throughout the country and want to avoid spending charity funds on traveling to this meeting. Which of the following solutions would best support the charity and provide you with an opportunity to discuss the design as a group? A. Plan a Web conference using a service such as WebEx or GoToMeeting that supportsscreen sharingand phone conferencing. A friend just sent you a link to a Facebook page with information that you find very useful. You want to be able to recall the site in the future from your desktop computer, or from your mobile device while away from your desk. Which is the best approach? B. Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks. You are a software developer who wants to start developing mobile apps for smartphones. You have the option to develop apps for an open-source operating system. Which of the following could persuade you to focus your development efforts on the open-source operating system? D. The operating system and associated development tools are free, provided you comply with the copyleft license. Melanie works in the sales department at XYZ Company. She decides that her companys marketing team has done a poor job representing the companys brand. Without direction or permission, she starts her own social networking account to help. This accounts name is called XYZProfessional. To customize her page, she uses company logos and verbiage from the company Web site. She then begins communicating with customers and individuals interested in XYZ via this service. Which of the following would be the most appropriate response to Melanies actions by the company? D. Terminating Melanies employment for copyright and trademark violation, with a cease- and-desist letter asking for control of the account Which choice lists the required elements for HTTP to function? B. Client, server and TCP/IP Which is the preferred approach to communicate important action items in an e-mail message to a co-worker? B. List the action items in a numbered or bulleted list for clarity. You are using an e-mail client that you are unfamiliar with. You need to send an e-mail with an attachment but you do not see a feature labeledattachmentanywhere on the client. What icon should you look for that is commonly used to invoke the e-mail attachment option? D. Paperclip Your childs high school has created a wiki for its social science classes to support blogs and collaborative projects. Your child also contributes photos of extracurricular events to the schools Facebook site. Which term collectively describes these types of Web usage? C. Web 2.0 Michelle wants to search for a scuba regulator. She plans to use a keyword search engine. She does not want to see any results from the manufacturer named Scubapro. Which of the following search strings should she use? A. Regulators !Scubapro Andrea works as an Administrative Assistant for a small business that uses an SaaS service for accounting, sales orders and customer service information about the businesss customers. This product is similar to S and its competitors. Andrea makes sure she saves accuraterecords about current projects and performs regular backups of the business data stored on the cloud-based service. Which of the following is the primary reason for this practice? A. If there is an interruption in Internet access, the service and records would not be accessible. As a project manager, you have to balance three elements that compose the project triangle. Suppose your customer requests that you add some new requirements to the project when you are halfway through. If you agree to this request, how would it affect other aspects of the project? B. Cost of the project will increase. You are expecting a very important file from a co-worker in a remote office to be sent to you through e-mail. You finally call the co-worker and tell him that you have not received the file. He informs you that he sent the file yesterday, but will send it again immediately. After some time, you still have not received his e-mail message. You contact the Technical Support department and ask them for help. After some investigation, Technical Support finds the e-mail from your coworker with an attachment named in the spam folder of your e-mail client. What is the most likely reason that the e-mail message was filtered out? C. File attachments with an .exe extension may contain malicious code. Proprietary information for your companys online business was released to a competitor. Which of the following preventative measures should your company take to ensure that its proprietary information is protected in the future? C. Monitor employees'messages The App-A-Day company offers software applications for various topics. When a customer purchases a desired application from the App-A-Day online store, he is directed to a page where he can download the application directly. When the customer is redirected and begins downloading the application, which specific standard protocol is most likely transferring the application? A. FTP What is the difference between a computer virus and a worm? B. A worm can replicate by itself, whereas a virus requires user action to replicate Paul has just finished a very important sales meeting with a potential customer and he needs to update his supervisor at the corporate office, which is located in another country. Paul is debating whether to text or e-mail his supervisor about the meeting details. Which of the following would be the best practice for communicating with his supervisor? C. Send a brief text message update now, and then send the meeting details in an e-mail message later. When using secure authentication, which of the following are required? D. A user name, a password and encryption of transmitted data

Show more Read less
Institution
CIW Certification
Course
CIW Certification









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CIW Certification
Course
CIW Certification

Document information

Uploaded on
June 7, 2023
Number of pages
9
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BrilliantScores Chamberlain College Of Nursng
View profile
Follow You need to be logged in order to follow users or courses
Sold
2818
Member since
3 year
Number of followers
2233
Documents
16100
Last sold
13 hours ago
latest updated documents, correct, verified & graded A study materials

get bundles, documents, test banks, case studies, shadow health's, ATIs, HESIs, study guides, summary, assignments & every kind of study materials.

3.8

774 reviews

5
388
4
117
3
116
2
37
1
116

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions