CIW Set 3

CIW Set 3

10th Grade

10 Qs

quiz-placeholder

Similar activities

Current Business Technology

Current Business Technology

5th - 12th Grade

11 Qs

Comp App Test 1

Comp App Test 1

10th Grade

14 Qs

Resume Readiness

Resume Readiness

9th Grade - University

10 Qs

Google

Google

7th - 12th Grade

12 Qs

Intro to Education Quiz

Intro to Education Quiz

2nd Grade - University

10 Qs

Intro to Cybersecurity Ch 1 Part 1

Intro to Cybersecurity Ch 1 Part 1

7th - 12th Grade

9 Qs

CIW Set 5

CIW Set 5

10th Grade

10 Qs

TMK Tahun 5

TMK Tahun 5

KG - University

15 Qs

CIW Set 3

CIW Set 3

Assessment

Quiz

Other

10th Grade

Medium

Created by

Charissa Manogin

Used 17+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The official CIW Web site has an IP address of 72.44.192.233. Which technology allows Web users to enter the URL www.CIWcertified.com in the browser address bar to access the site, instead of having to remember and enter the IP address?

HTTP

SSL

DNS

NNTP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which choice lists the required elements for HTTP to function?

Client, Web page and DNS

Browser, HTML and TCP/IP

Server, HTML and DNS

Client, server and TCP/IP

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following strategies will help protect your computer against virus attacks?

Perform regular backups of your hard drive.

Update the definitions for your malware protection application frequently.

Open e-mail attachments only from unknown senders.

Configure security settings for your Web browser to the lowest possible level.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the difference between a computer virus and a worm?

A worm can replicate itself, whereas a virus requires user action to replicate.

A virus can replicate itself, whereas a worm requires user action to replicate.

A worm can deposit an illicit server, whereas a virus cannot.

A virus can deposit an illicit server, whereas a worm cannot.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You opened an e-mail attachment, an it launches a virus. The virus takes control of your system, and you are unable to run your anti-virus software. Which of the following is the best step for you to take next?

Let the virus run its course.

Plug in your backup drive to try to initiate an immediate backup of important files.

Turn off your computer and reboot from a known, clean system disk.

Call your local authorities to report identity theft.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You are configuring an e-mail client to connect to your e-mail account. Which of the following is required to set up the e-mail account?

A NDS server address

A POP3 address

An FTP address

An HTTP address

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Xue's company has provided her with a desktop computer to use at work. She has configured her e-mail client on this work computer to include her personal e-mail account so that she can conveniently download messages and check her personal e-mail. Xue should be aware that:

The company will block personal e-mail accounts.

The company will have access to her personal e-mail messages.

The company must permit her to receive personal e-mail messages.

The company will ignore the e-mail messages to respect her privacy.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?