graded A+
Which term is used to describe an application that installs hidden services on a system that enables the
attacker to monitor and control the operation of the system? - correct answer ✔✔Illicit server
What are small software programs that are built to interact with Web technologies through your
browser? - correct answer ✔✔Extensions
What can you do during the executing and controlling phases of a project to discuss progress, and to
respond to project issues and unanticipated developments? - correct answer ✔✔Plan and schedule
meetings with team members.
You are part of a team that has been collaborating on a marketing document. The document is ready for
final approval from the stakeholders. The team leader has sent the document to the stakeholders as an
attachment to an email. You notice that an important stakeholder was omitted from the recipient list.
What should you do to ensure that the omitted stakeholder receives the document and receives future
replies to the email thread? - correct answer ✔✔Use the Forward feature, add the omitted stakeholder's
email address and include the other email addresses from the original message to alert the team to the
oversight.
Which protocol is often used to publish Webpages to a Web server? - correct answer ✔✔File Transfer
Protocol (FTP)
(http://www.CIWcertified.com/Certifications/Foundations/iba.htm) Which term best describes this
address type? - correct answer ✔✔Deep URL
What distinguishes an information portal from a search engine? - correct answer ✔✔An information
portal will only index Websites based on manual submissions.
In many cases, project teams are created and developed with people who have different perspectives
and priorities. Why is it important for a project manager to have the ability to develop and manage
teams? - correct answer ✔✔To help team members complete the project schedule within the project
constraints
, During the closing phase of every project, the project manager should perform a formal project review
with the project team. The project review provides an opportunity to: - correct answer ✔✔test the
product, evaluate performances and document lessons learned.
Which of the following improves the speed of your browser because it allows you to view previously
accessed Webpages without having to request them from the server again? - correct answer ✔✔The
browser cache
Which part of this address represents the server name on which this page resides?
(http://www.CIWcertified.com/courses/iba.htm) - correct answer ✔✔www
Which of the following is protected by copyright? - correct answer ✔✔The lessons explaining DNA
concepts on the www.DNAftb.org Website
Which of the following refers to a family of specifications for wireless network technology? - correct
answer ✔✔802.11 standards
Which protocol was developed as an extension of SMTP that allows users to exchange various types of
data files over the Internet? - correct answer ✔✔Multipurpose Internet Mail Extensions (MIME)
Every domain name is unique. Once registered, it cannot be used by an unauthorized organization or
individual. What organization is responsible for managing domain names? - correct answer ✔✔Internet
Corporation for Assigned Names and Numbers (ICANN)
What is the purpose of conducting an ontological study as it pertains to a particular organization or
business? - correct answer ✔✔To enable software engineers and programmers to accurately map
technology solutions to business needs
Virtual Network Computing (VNC) is a program that allows you to control a computer at a remote
location. VNC consists of which two components? - correct answer ✔✔The server and the viewer