Pass4itsure > CIW > CIW Internet Business Associate > 1D0-61A > 1D0-61A Online Practice Questions and Answers

1D0-61A Online Practice Questions and Answers

Questions 4

You opened an e-mail attachment and it launches a virus. The virus takes control of your system and you are unable to run your anti-virus software.

Which of the following is the best step for you to take next?

A. Let the virus run its course.

B. Call your local authorities to report an identity theft.

C. Turn off your computer and reboot from a known, clean system disk.

D. Plug in your backup drive to try to initiate an immediate backup of important files.

Buy Now
Questions 5

The App-A-Day company offers software applications for various topics. When a customer purchases a desired application from the App-A-Day online store, he is directed to a page where he can download the application directly.

When the customer is redirected and begins downloading the application, which specific standard protocol is most likely transferring the application?

A. FTP

B. HTTPS

C. HTTP

D. SMTP

Buy Now
Questions 6

Andrea works as an Administrative Assistant for a small business that uses a SaaS service for accounting, sales orders and customer service information about the business's customers. This product is similar to Salesforce.com and its competitors. Andrea makes sure she saves accurate records about current projects and performs regular backups of the business data stored on the cloud-based service.

Which of the following is the primary reason for this practice?

A. If there is an interruption in Internet access, the service and records would not be accessible.

B. There is a limit on the number of users who are allowed to access the cloud-based service at any one time.

C. Data stored online through the cloud-based service is more at risk to security breaches than if it were stored locally

D. Andrea is overly cautious because it is well known that cloud-based services are highly secure, highly reliable and always available.

Buy Now
Questions 7

Melanie works in the sales department at XYZ Company. She decides that her company's marketing team has done a poor job representing the company's brand. Without direction or permission, she starts her own social networking account to help. This account's name is called XYZ Professional. To customize her page, she uses company logos and verbiage from the company Web site. She then begins communicating with customers and individuals interested in XYZ via this service.

Which of the following would be the most appropriate response to Melanie's actions by the company?

A. Providing a link to Melanie's page from the company's official social networking account

B. Sending Melanie a request from the company's Human Resources department to stop using company logos, yet allowing her to continue using this social networking account

C. Adding references to Melanie's social networking page in the company's internal newsletter

D. Terminating Melanie's employment for copyright and trademark violation, with a cease-and desist letter asking for control of the account.

Buy Now
Questions 8

Your Web browser is currently open and displaying a popular sports site. You decide that you want to browse to the CIW site without closing the browser.

What is the most efficient way to accomplish this?

A. By typing the CIW site's URL (www.CIWcertified.com) in the address bar of your Web browser

B. By performing a search within the site currently displayed in your Web browser

C. By performing a search on your computer for the term "CIW"

Buy Now
Questions 9

Which of the following strategies will help protect your computer against virus attacks?

A. Perform regular backups of your hard drive

B. Open e-mail attachments only from unknown senders

C. Update the definitions for your malware protection application frequently.

D. Configure security settings for your Web browser to the lowest to the lowest possible level.

Buy Now
Questions 10

A family member has just sent you an e-mail message that contains highly personal details about a family matter. The message was sent to your company e-mail address. The family member has requested that you respond with your ideas about how to resolve the situation.

Which of the following is a reason for you to call your family member and discuss the matter over the phone instead?

A. Because your employer has the right to read your email.

B. Because e-mail is completely private but not personal enough.

C. Because it is illegal to use company e-mail for personal use.

Buy Now
Questions 11

When using secure authentication, which of the following are required?

A. A user name only

B. A user name and a password

C. Neither user name nor a password

D. A user name, a password and encryption of transmitted data

Buy Now
Questions 12

Which organization is responsible for managing domain names so that each one is unique, and (once registered) cannot be used by an unauthorized individual or organization?

A. ICANN

B. W3C

C. IEFT

D. RFC

Buy Now
Questions 13

Irena is reviewing several promotional product videos from her company's marketing department before they are published on the company's Web site. The videos are in RealMedia format, but they do not open in Irena's Windows Media Player.

What should Irena do in order to view the videos?

A. Contract her company's Technical Support department and schedule service for her computer.

B. Convert the video files to the WMV format, because RealMedia files will not play in Windows Media Player.

C. Upload the videos to the Web server to be viewed through Windows Media Player because they will not play from a local computer.

Buy Now
Exam Code: 1D0-61A
Exam Name: CIW Internet Business Associate
Last Update: Apr 15, 2024
Questions: 57
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99