
CIW Exam Review
Other Sciences
9th - 12th Grade
Used 86+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You opened an e-mail attachment and it launches a virus. The virus takes control of your system and you are unable to run your anti-virus software. Which of the following is the best step for you to take next?
Plug in your backup drive to try to initiate an immediate backup of important files.
Call your local authorities to report an identity theft.
Let the virus run its course.
Turn off your computer and reboot from a known, clean system disk.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following strategies is recommended when conducting keyword searches?
Use nouns instead of verbs for keywords.
Include at least one preposition such as "the" or "an" in your list of keywords.
Use as few keywords as possible.
Use verbs instead of nouns for keywords.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is used to help non-technical users collectively classify and find information on a site
Web feed
Tagging
Ajax
A wiki
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Raoul has received a file attachment from a known individual. He has no reason to expect files from this individual. Which of the following is an effective security strategy for Raoul to take?
Before opening the attachment, use anti-virus software to scan the system's hard disk.
Make back-up copies of important files so that it is possible to recover them in case of an incident.
Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.
Open the file attachment and use anti-virus software to scan it.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which choice lists the information you will need to configure the e-mail client?
E-mail address, SMTP, IMAP, DNS, user name and password
Company name, e-mail address, SMTP, POP3, IMAP and DNS
Company name, SMTP, POP3, user name and password
E-mail address, SMTP, POP3, user name and password
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
As a project manager, you have to balance three elements that compose the project triangle. Suppose your customer requests that you add some new requirements to the project when you are halfway through. If you agree to this request, how would it affect other aspects of the project?
Time to complete project will be reduced.
Cost of the project will increase.
Cost of the project will decrease.
Project scope will decrease.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are expecting a very important file from a co-worker in a remote office to be sent to you through e-mail. You finally call the co-worker and tell him that you have not received the file. He informs you that he sent the file yesterday, but will send it again immediately. After some time, you still have not received his e-mail message. You contact the Technical Support department and ask them for help. After some investigation, Technical Support finds the e-mail from your coworker with an attachment named salesnumbers.exe in the spam folder of your e- mail client. What is the most likely reason that the e-mail message was filtered out?
File attachments with an .exe extension may contain malicious code.
The file name of the attached file exceeds the file name length of the filter policy.
The attachment's file size exceeds the size limits of the e-mail filter policy.
Messages from remote offices are blocked on internal e-mail.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?