Search Header Logo

CIW Exam Review

Other Sciences

9th - 12th Grade

Used 86+ times

CIW Exam Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You opened an e-mail attachment and it launches a virus. The virus takes control of your system and you are unable to run your anti-virus software. Which of the following is the best step for you to take next?

Plug in your backup drive to try to initiate an immediate backup of important files.

Call your local authorities to report an identity theft.

Let the virus run its course.

Turn off your computer and reboot from a known, clean system disk.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following strategies is recommended when conducting keyword searches?

Use nouns instead of verbs for keywords.

Include at least one preposition such as "the" or "an" in your list of keywords.

Use as few keywords as possible.

Use verbs instead of nouns for keywords.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is used to help non-technical users collectively classify and find information on a site

Web feed

Tagging

Ajax

A wiki

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Raoul has received a file attachment from a known individual. He has no reason to expect files from this individual. Which of the following is an effective security strategy for Raoul to take?

Before opening the attachment, use anti-virus software to scan the system's hard disk.

Make back-up copies of important files so that it is possible to recover them in case of an incident.

Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.

Open the file attachment and use anti-virus software to scan it.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which choice lists the information you will need to configure the e-mail client?

E-mail address, SMTP, IMAP, DNS, user name and password

Company name, e-mail address, SMTP, POP3, IMAP and DNS

Company name, SMTP, POP3, user name and password

E-mail address, SMTP, POP3, user name and password

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As a project manager, you have to balance three elements that compose the project triangle. Suppose your customer requests that you add some new requirements to the project when you are halfway through. If you agree to this request, how would it affect other aspects of the project?

Time to complete project will be reduced.

Cost of the project will increase.

Cost of the project will decrease.

Project scope will decrease.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are expecting a very important file from a co-worker in a remote office to be sent to you through e-mail. You finally call the co-worker and tell him that you have not received the file. He informs you that he sent the file yesterday, but will send it again immediately. After some time, you still have not received his e-mail message. You contact the Technical Support department and ask them for help. After some investigation, Technical Support finds the e-mail from your coworker with an attachment named salesnumbers.exe in the spam folder of your e- mail client. What is the most likely reason that the e-mail message was filtered out?

File attachments with an .exe extension may contain malicious code.

The file name of the attached file exceeds the file name length of the filter policy.

The attachment's file size exceeds the size limits of the e-mail filter policy.

Messages from remote offices are blocked on internal e-mail.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?