Search Header Logo
CIW Internet Business Associate Exam Review

CIW Internet Business Associate Exam Review

Assessment

Presentation

Business

9th Grade - Professional Development

Medium

Created by

Doc Scriv

Used 1+ times

FREE Resource

1 Slide • 20 Questions

1

(Part 1) CIW Internet Business Associate Exam Review

Slide image

2

Multiple Choice

You are a software developer who wants to start developing mobile apps for smartphones. You have the option to develop apps for an open-source operating system. Which of the following could persuade you to focus your development efforts on the open-source operating system?

1

An open-source license will never be in the public domain

2

Source code for an open-source app is not viewable and cannot be modified.

3

Open-source operating systems and development tools are free from software bugs and viruses.

4

The operating system and associated development tools are free, provided you comply with the copyleft license.

3

Multiple Choice

The App-A-Day company offers software applications for various topics. When a customer purchases a desired application from the App-A-Day online store, he is directed to a page where he can download the application directly. When the customer is redirected and begins downloading the application, which specific standard protocol is most likely transferring the application?

1

FTP

2

HTTPS

3

HTTP

4

SMTP

4

Multiple Choice

You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance drafting business. You have a personal Web site and would like to share samples of your work for potential new customers to review. To which file format should you convert your drawings so that they are viewable regardless of the local operating system used by the individual viewing your site?

1

PDF

2

MP3

3

DOC

4

XML

5

Multiple Choice

Digital signatures verify the integrity of the data, verify the identity of the sender and:

1

Provides data confidentiality

2

Enforce non-repudiation

3

Sign digital certificate requests

4

Create certificate requests

6

Fill in the Blank

The App-A-Day company offers software applications for various topics. When a customer purchases a desired application from the App-A-Day online store, he is directed to a page where he can download the application directly. When the customer is redirected and begins downloading the application, what specific standard protocol is most likely transferring the application?

7

Multiple Choice

You have just finished designing a Web site to support a charity organization's fund-raising efforts. You need to meet with the board embers to get their feedback and address some questions before you implement the final design. The board members are dispersed throughout the country and want to avoid spending charity funds on traveling to this meeting. Which of the following solutions would best support the charity and provide you with an opportunity to discuss the design as a group?

1

Plan a Web conference using a service such as WebEx or GoToMeeting that supports screen sharing and phone conferencing.

2

Plan a Webinar that reviews the layout of the site and request that board members submit their feedback by e-mail after the Webinar.

3

Create a PowerPoint slideshow that contains pictures of your Web site design and create a survey to gather the board members feedback.

4

Create an audio Webcast and distribute it to the board members over the Internet.

8

Multiple Choice

Which of the following is used to help non-technical users collectively classify and find information on a site?

1

Tagging

2

Awiki

3

Web feed

4

Ajax

9

Fill in the Blank

Digital signatures verify the integrity of the data, verify the identity of the sender and:

10

Multiple Choice

You received a text and a threatening voicemail from an angry customer who wants to immediately discuss the shortcomings of a recently released product. You are about to walk into a mandatory meeting with your top-level leadership team. Which of the following is your best course of action?

1

Continue to send text message to the customer hoping to smooth things over until you can call him/her on the phone after your meeting.

2

Request that the customer send his complaints by e-mail, knowing that any inappropriate communication will be well documented.

3

Do not respond to the customer.

4

Skip the meeting and call the customer.

11

Multiple Choice

Gilberto has received a file attachment from a known individual. He has no reason to expect files from this individual. Which of the following is an effective security strategy for Gilberto to take?

1

Open the file attachment and use anti-virus software to scan it.

2

Before opening the attachment, use anti-virus software to scan the system's hard disk.

3

Make back-up copies of important files so that it is possible to recover them in case of an incident.

4

Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.

12

Fill in the Blank

______ is used to help non-technical users collectively classify and find information on a site?

13

Multiple Choice

You accidentally dropped your mobile phone, which was submerged in water and no longer works. Upon replacing the phone with an upgraded unit you must reconfigure many of the services. The instructions say that all you need to do is enter your e-mail address and the unit will configure the e-mail client for you. Even though you have tried this serval times, it does not work. The mobile phone vendor says that because you are trying to sync your e-mail account with an enterprise mail server, you will need to configure the e-mail client manually. Which choice lists the information you will need to configure the e-mail client?

1

Company name, e-mail address, SMTP, POP3, IMAP and DNS

2

E-mail address, SMTP, IMAP, DNS, user name and password

3

E-mail address, SMTP, POP3, user name and password

4

Company name, SMTP, POP3, user name and password

14

Multiple Choice

Which is the preferred approach to communicate important action items in an e-mail message to a co-worker?

1

Write the action items using all capital letters

2

List the action items in a numbered or bulleted list for clarity

3

Include emoticons to ensure the recipient understands your humor.

4

Describes all action items at length in a detailed paragraph in the middle of the message.

15

Multiple Choice

You have 20 remote employees flying in to attend a corporate meeting. The morning of travel day, the administrator tells you that the hotel reservations have changed. What is the best way to send each traveling employee a quick message with the new hotel information?

1

Update the meeting agenda with the hotel information.

2

Post an announcement to the company's Web site with the new hotel information.

3

Call each stakeholder and leave a message with the address of the hotel.

4

Send a text message with the hotel information to the mobile phone of each traveler.

16

Multiple Choice

As a project manager, you have to balance three elements that compose the project triangle. Suppose your customer requests that you add some new requirements to the project when you are halfway through. If you agree to this request, how would it affect other aspects of the project?

1

Project scope will decrease.

2

Cost of the project will increase

3

Cost of the project will decrease

4

Time to complete project will be reduced.

17

Multiple Choice

You are expecting a very important file from a co-worker in a remote office to be sent to you through e-mail. You finally call the co-worker and tell him that you have not received the file. He informs you that he sent the file yesterday, but will send it again immediately. After some time, you still have not received his e-mail message. You contact the Technical Support department and ask them for help. After some investigation, Technical Support finds the e-mail from your coworker with an attachment named salesnumbers.exe in the spam folder of your e-mail client. What is the most likely reason that the e-mail message was filtered out?

1

Messages from remote offices are blocked on internet e-mail.

2

The attachment's file size exceeds the size limits of the e-mail filter policy.

3

File attachments with an .exe extension may contain malicious code.

4

The file name of the attached file exceeds the file name length of the filter policy.

18

Multiple Choice

Maddy works as an Administrative Assistant for a small business that uses an SaaS service for accounting, sales orders and customer service information about the business's customers. This product is similar to Salesforce.com and its competitors. Maddy makes sure she saves accurate records about current projects and performs regular backups of the business data stored on the cloud-based service. Which of the following is the primary reason for this practice?

1

If there is an interruption in Internet access, the service and records would not be accessible.

2

There is a limit on the number of users who are allowed to access the cloud-based service at any one time.

3

Data stored online through the cloud-based service is more at risk to security breaches than if it were stored locally.

4

Maddy is overly cautious because it is well known that cloud-based services are highly secure, highly reliable and always available

19

Multiple Choice

Consider the following address: http:/www.CIWcertified.com/Certifications/Web_Foundations/iba.php. Now, which of the following is the best classification for the address?

1

Fully qualified domain name

2

Virtual domain name

3

Relative URL

4

Deep URL

20

Fill in the Blank

Consider the following address: http:/www.CIWcertified.com/Certifications/Web_Foundations/iba.php. Now, what is the best classification for the address called _____?

21

Fill in the Blank

You use a proprietary Windows-based program to generate architectural drawings and plans for your freelance drafting business. You have a personal Web site and would like to share samples of your work for potential new customers to review. To which file format should you convert your drawings so that they are viewable regardless of the local operating system used by the individual viewing your site?

(Part 1) CIW Internet Business Associate Exam Review

Slide image

Show answer

Auto Play

Slide 1 / 21

SLIDE