Vcehome > CIW > CIW Internet Business Associate > 1D0-61A > 1D0-61A Online Practice Questions and Answers

1D0-61A Online Practice Questions and Answers

Questions 4

Raoul has received a file attachment from a known individual. He has no reason to expect files from this individual.

Which of the following is an effective security strategy for Raoul to take?

A. Open the file attachment and use anti-virus software to scan it

B. Before opening the attachment, use anti-virus software to scan the system's hard disk.

C. Make back-up copies of important files so that it is possible to recover them in case of an incident.

D. Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.

Browse 57 Q&As
Questions 5

You have 20 remote employees flying in to attend a corporate meeting. The morning of travel day, the administrator tells you that the hotel reservations have changed.

What is the best way to send each traveling employee a quick message with the new hotel information?

A. Update the meeting agenda with the hotel information.

B. Post an announcement to the company's Web site with the new hotel information.

C. Send a text message with the hotel information to the mobile phone of each traveler.

D. Call each stakeholder and leave a message with the address of the hotel.

Browse 57 Q&As
Questions 6

Andrea works as an Administrative Assistant for a small business that uses a SaaS service for accounting, sales orders and customer service information about the business's customers. This product is similar to Salesforce.com and its competitors. Andrea makes sure she saves accurate records about current projects and performs regular backups of the business data stored on the cloud-based service.

Which of the following is the primary reason for this practice?

A. If there is an interruption in Internet access, the service and records would not be accessible.

B. There is a limit on the number of users who are allowed to access the cloud-based service at any one time.

C. Data stored online through the cloud-based service is more at risk to security breaches than if it were stored locally

D. Andrea is overly cautious because it is well known that cloud-based services are highly secure, highly reliable and always available.

Browse 57 Q&As
Questions 7

To reduce the costs of maintaining servers with FTP access; your company is using P2P to facilitate sharing of information.

Which strategy should your company use to protect the company's sensitive information while capitalizing on the benefits of P2P power?

A. Limit P2P use to sharing music files

B. Restrict employees from using their computers in P2P communications

C. Use technologies that will control access and password-protect files.

D. Restrict P2P use to sharing only with universities and research organizations

Browse 57 Q&As
Questions 8

The official CIW Web site has an IP address of 72.44.192.233. Which technology allows Web users to enter the URL www.CIWcertified.com in the browser address bar to access the site, instead of having to remember and enter the IP address?

A. SSL

B. DNS

C. HTTP

D. NNTP

Browse 57 Q&As
Questions 9

Which choice lists the required elements for HTTP to function?

A. Server, HTML and DNS

B. Client, server and TCP/IP

C. Browser, HTML and TCP/IP

Browse 57 Q&As
Questions 10

Irena is reviewing several promotional product videos from her company's marketing department before they are published on the company's Web site. The videos are in RealMedia format, but they do not open in Irena's Windows Media Player.

What should Irena do in order to view the videos?

A. Contract her company's Technical Support department and schedule service for her computer.

B. Convert the video files to the WMV format, because RealMedia files will not play in Windows Media Player.

C. Upload the videos to the Web server to be viewed through Windows Media Player because they will not play from a local computer.

Browse 57 Q&As
Questions 11

You received an e-mail message on which several other individuals were copied. You want to respond to this message in a way that will include everyone who was copied on the original message.

You can accomplish this by using which action?

A. Reply

B. Reply All

C. Forward

D. Send

Browse 57 Q&As
Questions 12

You are the technology coordinator for a small multi-national corporation with offices in Los Angeles, New York, Tokyo and London. You have been asked to coordinate a live and interactive meeting that will allow executives from each of the offices to meet virtually and share presentations.

What is the best way to achieve this desired goal?

A. Podcast

B. Webcast

C. Conference call

D. Web conference

Browse 57 Q&As
Questions 13

Your child's high school has created a wiki for its social science classes to support blogs and collaborative projects. Your child also contributes photos of extracurricular events to the school's Facebook site.

Which term collectively describes these types of Web usage?

A. Mashup

B. Web 1.0

C. Web 2.0

D. Folksonomy

Browse 57 Q&As
Exam Code: 1D0-61A
Exam Name: CIW Internet Business Associate
Last Update: Apr 28, 2024
Questions: 57 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99