CIW EXAM QUESTIONS AND ANSWERS
Which of the following is a legal and ethical practice? - Answers -B. Trying shareware
for free and paying for it only after you decide to keep using it.
Irena is reviewing several promotional product videos from her companys marketing
department before they are published on the companys Web site. The videos are in
RealMedia format, but they do not open in Irenas Windows Media Player. What should
Irena do in order to view the videos? - Answers -B. Convert the video files to the WMV
format, because RealMedia files will not play in Windows Media Player.
You are leading a team of new hires and need to train them on innovative strategies
and
technologies that will be used to develop an upcoming project. You send several e-mail
messages with links to helpful resources. But you soon realize this is an inefficient way
to
organize and share this information. Which solution would provide a more efficient way
to
categorize and share this information? - Answers -A. Social tagging
The official CIW Web site has an IP address of 72.44.192.233. Which technology allows
Web users to enter the URL www.CIWcertified.com in the browser address bar to
access
the site, instead of having to remember and enter the IP address? - Answers -B. DNS
Your customer scheduled a meeting to discuss a project you are managing. Early
testing
indicates that there are currently quality problems with some of the more complex
features.
The customer stated that quality and budget are his two main concerns: The project
must
be developed within budget and must be very high quality. When you asked the
customer if
he would be willing to extend the deadline to meet his objectives, he stated this was not
possible.
What adjustment to the project triangle components can you suggest to meet your
customers needs? - Answers -A. Suggest that the scope be limited to include only the
most important features.
Gabby suspects that an attacker has gained control of her system. Which of the
following is
the most appropriate action for her to take? - Answers -D. Unplug the computer network
cable and/or disable the computer's wireless NIC.
, Raoul has received a file attachment from a known individual. He has no reason to
expect
files from this individual. Which of the following is an effective security strategy for Raoul
to
take? - Answers -D. Before opening the attachment, call or send a text or instant
message to the individual to verify that he or she meant to send it.
You just started a small business and need to create a logo. Although you are
technically
savvy, your artistic creativity is limited. You decide to launch a contest to seek creative
ideas for your logo. Using the Internet and social networking in this manner is known as:
- Answers -C. crowd sourcing
You are the technology coordinator for a small multi-national corporation with offices in
Los
Angeles,NewYork, Tokyo and London. You have been asked to coordinate a live and
interactive meeting that will allow executives from each of the offices to meet virtually
and
share presentations. What is the best way to achieve this desired goal? - Answers -D.
Web conference
Digital signatures verify the integrity of the data, verify the identity of the sender, and: -
Answers -B. Enforce non-repudiation.
One of your co-workers calls you to ask if you sent her an e-mail message with an
attachment. You recall that you sent several c-mails with attachments earlier that day.
Which of the following is your best response to this question? - Answers -B. Ask your
co-worker to read the e-mail message including the full name of the attachment and its
extension.
You have just finished designing a Web site to support a charity organizations fund-
raising
efforts. You need to meet with the board members to get their feedback and address
some
questions before you implement the final design. The board members are dispersed
throughout the country and want to avoid spending charity funds on traveling to this
meeting. Which of the following solutions would best support the charity and provide
you
with an opportunity to discuss the design as a group? - Answers -A. Plan a Web
conference using a service such as WebEx or GoToMeeting that supportsscreen
sharingand phone conferencing.
You have just checked the balance in your bank account by logging into your banks
Web
site. Which protocol was most likely used for the transmission of your information? -
Answers -B. HTTPS
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller GEEKA. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.99. You're not tied to anything after your purchase.