Search Header Logo

CIW Set 3

Authored by Charissa Manogin

Other

10th Grade

Used 17+ times

CIW Set 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The official CIW Web site has an IP address of 72.44.192.233. Which technology allows Web users to enter the URL www.CIWcertified.com in the browser address bar to access the site, instead of having to remember and enter the IP address?

HTTP

SSL

DNS

NNTP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which choice lists the required elements for HTTP to function?

Client, Web page and DNS

Browser, HTML and TCP/IP

Server, HTML and DNS

Client, server and TCP/IP

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following strategies will help protect your computer against virus attacks?

Perform regular backups of your hard drive.

Update the definitions for your malware protection application frequently.

Open e-mail attachments only from unknown senders.

Configure security settings for your Web browser to the lowest possible level.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the difference between a computer virus and a worm?

A worm can replicate itself, whereas a virus requires user action to replicate.

A virus can replicate itself, whereas a worm requires user action to replicate.

A worm can deposit an illicit server, whereas a virus cannot.

A virus can deposit an illicit server, whereas a worm cannot.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You opened an e-mail attachment, an it launches a virus. The virus takes control of your system, and you are unable to run your anti-virus software. Which of the following is the best step for you to take next?

Let the virus run its course.

Plug in your backup drive to try to initiate an immediate backup of important files.

Turn off your computer and reboot from a known, clean system disk.

Call your local authorities to report identity theft.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You are configuring an e-mail client to connect to your e-mail account. Which of the following is required to set up the e-mail account?

A NDS server address

A POP3 address

An FTP address

An HTTP address

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Xue's company has provided her with a desktop computer to use at work. She has configured her e-mail client on this work computer to include her personal e-mail account so that she can conveniently download messages and check her personal e-mail. Xue should be aware that:

The company will block personal e-mail accounts.

The company will have access to her personal e-mail messages.

The company must permit her to receive personal e-mail messages.

The company will ignore the e-mail messages to respect her privacy.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?