CIW Exam Questions and Correct
Answers 2023
Which of the following is a legal and ethical practice? - CORRECT ANSWER-B. Trying
shareware for free and
... [Show More] paying for it only after you decide to keep using it.
Irena is reviewing several promotional product videos from her companys marketing
department before they are published on the companys Web site. The videos are in
RealMedia format, but they do not open in Irenas Windows Media Player. What should
Irena do in order to view the videos? - CORRECT ANSWER-B. Convert the video files
to the WMV format, because RealMedia files will not play in Windows Media Player.
You are leading a team of new hires and need to train them on innovative strategies
and
technologies that will be used to develop an upcoming project. You send several e-mail
messages with links to helpful resources. But you soon realize this is an inefficient way
to
organize and share this information. Which solution would provide a more efficient way
to
categorize and share this information? - CORRECT ANSWER-A. Social tagging
The official CIW Web site has an IP address of 72.44.192.233. Which technology allows
Web users to enter the URL www.CIWcertified.com in the browser address bar to
access
the site, instead of having to remember and enter the IP address? - CORRECT
ANSWER-B. DNS
Your customer scheduled a meeting to discuss a project you are managing. Early
testing
indicates that there are currently quality problems with some of the more complex
features.
The customer stated that quality and budget are his two main concerns: The project
must
be developed within budget and must be very high quality. When you asked the
customer if
he would be willing to extend the deadline to meet his objectives, he stated this was not
possible.
What adjustment to the project triangle components can you suggest to meet your
customers needs? - CORRECT ANSWER-A. Suggest that the scope be limited to
include only the most important features.
Gabby suspects that an attacker has gained control of her system. Which of the
following is
the most appropriate action for her to take? - CORRECT ANSWER-D. Unplug the
computer network cable and/or disable the computer's wireless NIC.
Raoul has received a file attachment from a known individual. He has no reason to
expect
files from this individual. Which of the following is an effective security strategy for Raoul
to
take? - CORRECT ANSWER-D. Before opening the attachment, call or send a text or
instant message to the individual to verify that he or she meant to send it.
You have just checked the balance in your bank account by logging into your banks
Web
site. Which protocol was most likely used for the transmission of your information? -
CORRECT ANSWER-B. HTTPS
You just received a joke that was c-mailed to you by a co-worker. You find the joke
funny
and consider forwarding it to another co-worker that you trust. Which human resources
issue do you risk by forwarding the e-mail message? - CORRECT ANSWER-C.
Offending a recipient who receives the joke as a result from further forwarding
You just started a small business and need to create a logo. Although you are
technically
savvy, your artistic creativity is limited. You decide to launch a contest to seek creative
ideas for your logo. Using the Internet and social networking in this manner is known as:
- CORRECT ANSWER-C. crowd sourcing
You are the technology coordinator for a small multi-national corporation with offices in
Los
Angeles,NewYork, Tokyo and London. You have been asked to coordinate a live and
interactive meeting that will allow executives from each of the offices to meet virtually
and
share presentations. What is the best way to achieve this desired goal? - CORRECT
ANSWER-D. Web conference
Digital signatures verify the integrity of the data, verify the identity of the sender, and: -
CORRECT ANSWER-B. Enforce non-repudiation.
One of your co-workers calls you to ask if you sent her an e-mail message with an
attachment. You recall that you sent several c-mails with attachments earlier that day.
Which of the following is your best response to this question? - CORRECT ANSWER-B.
Ask your co-worker to read the e-mail message including the full name of the
attachment and its extension.
You have just finished designing a Web site to support a charity organizations fundraising [Show Less]