IBA #6
IBA #7
IBA #8
IBA #9
IBA #10
100

You just started a small business and need to create a logo. Although you are technically savvy, your artistic creativity is limited. You decide to launch a contest to seek creative ideas for your logo. Using the Internet and social networking in this manner is known as:

-social engineering

-folksonomy

-outsourcing

-crowd sourcing

Crowed Sourcing

100

When using secure authentication, which of the following are required?

-A user name, a password and encryption of transmitted data

-A user name only

-Neither user name nor a password

-A user name and a password

A user name, a password and encryption of transmitted data

100

A friend just sent you a link to a Facebook page with information that you find very useful. You want to be able to recall the site in the future from your desktop computer, or from your mobile device while away from your desk. Which is the best approach?

-Memorize the URL so you can pull up the site in any browser such as Chrome, Firefox or Internet Explorer.

-Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.

-Manually enter the Web address into any and all browsers on all of your devices.

-Pull up the message with the link any time you want to view the site.

Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.

100

You are leading a team of new hires and need to train them on innovative strategies and technologies that will be used to develop an upcoming project. You send several e-mail messages with links to helpful resources. But you soon realize this is an inefficient way to organize and share this information. Which solution would provide a more efficient way to categorize and share this information?

-Collective intelligence

-Grid computing

-Ajax programming

-Social tagging

Social tagging

100

You attend an online university that offers seminars on APA Style through its Writing Center. You registered for the seminar and learned that the training will be provided over the Web. Although there is no opportunity to ask questions, you find the live lecture to be engaging. Which Web based meeting format was used?

-Webinar

-Web conference

-Blog

-Video conference

Webinar

200

You have just checked the balance in your bank account by logging into your bank’s Web site. Which protocol was most likely used for the transmission of your information?

-IMAPS

-FTPS

-POP

-HTTPS

HTTPS

200

One of your co-workers calls you to ask if you sent her an e-mail message with an attachment. You recall that you sent several c-mails with attachments earlier that day. Which of the following is your best response to this question?

-Ask your co-worker to open the attachment and describe the contents.

-Ask your co-worker to forward the e-mail to you so you can open the attachment and check it.

-Ask your co-worker to forward the e-mail to your company’s management.

-Ask your co-worker to read the e-mail message including the full name of the attachment and its extension.

Ask your co-worker to read the e-mail message including the full name of the attachment and its extension.

200

To reduce the costs of maintaining servers with FTP access; your company is using P2P to facilitate sharing of information. Which strategy should your company use to protect the company’s sensitive information while capitalizing on the benefits ofP2P power?

-Limit P2P use to sharing music files.

-Restrict employees from using their computers in P2P communications.

-Use technologies that will control access and password-protect files.

-Restrict P2P use to sharing only with universities and research organizations.

Use technologies that will control access and password-protect files.

200

Which of the following is a legal and ethical practice?

-Downloading copyrighted artwork and using it as a background on your Web site.

-Trying shareware for free and paying for it only after you decide to keep using it.

-Copying someone else’s written work found on the Internet and presenting it as your own, as long as it is for schoolwork.

-Downloading music and motion pictures as long as they are from a peer-to-peer network.

Trying shareware for free and paying for it only after you decide to keep using it.

200

Which is the preferred approach to communicate important action items in an e-mail message to a co-worker?

-Describe all action items at length in a detailed paragraph in the middle of the message.

-Write the action items using all capital letters.

-Include emoticons to ensure the recipient understands your humor.

-List the action items in a numbered or bulleted list for clarity.

List the action items in a numbered or bulleted list for clarity.

300

Emelia and Lola have created a new software application that allows messaging site subscribers to analyze the message statistics in order to more easily assess and interact with followers. They have decided to license this software according to the GNU GPL Version 3. What does this license allow them to do with their software?

-They can sell this software, but only if they make the software code available ona public server.

-The software enters the public domain for free use and can be altered by otherprogrammers, who must then make their changes freely available as well.

-The software enters the public domain for free use, but any changes made in thefuture can be kept secret, allowing them to profitably sell the modified software.

-They can only sell this software through a not-for-profit company.

The software enters the public domain for free use and can be altered by other programmers, who must then make their changes freely available as well.

300

A family member has just sent you an e-mail message that contains highly personal details about a family matter. The message was sent to your company e-mail address. The family member has requested that you respond with your ideas about how to resolve the situation. Which of the following is a reason for you to call your family member and discuss the matter over the phone instead?

-Because your employer has the right to read your e-mail

-Because an e-mail message about a personal family matter will violate netiquette guidelines

-Because it is illegal to use company e-mail for personal use

-Because e-mail is completely private but not personal enough

Because your employer has the right to read your e-mail

300

An end user cannot log in to a page that provides an e-learning course. The authentication window will not launch. Which of the following is most likely the cause of this problem?

-Pop-up blocking software has been enabled in the operating system.

-Pop-up blocking software has been enabled in the Web browser.

-The browser has recently had its browsing history cleared.

-The browser has recently had its cookie cache cleared.

Pop-up blocking software has been enabled in the Web browser.

300

Selena needs to send a message to her manager providing all the details of a business proposal. The idea they have discussed is critical to the business. The project is considered urgent and confidential. Selena wants to get this outline to her manager as quickly as possible. What would be the most appropriate way Selena could use an SMS (text) message in relation to this proposal?

-To alert her manager that she has sent the proposal via e-mail so her manager can view the proposal as soon as possible

-To send the proposal as an attachment to the text message

-To send a useful summary of the proposal to her manager so that the manager has it available during a presentation

-To provide a detailed outline of the proposal so that her manager can refer to it as he Travels.

To alert her manager that she has sent the proposal via e-mail so her manager can view the proposal as soon as possible

300

The official CIW Web site has an IP address of 72.44.192.233. Which technology allows Web users to enter the URL www.CIWcertified.com in the browser addressbar to access the site, instead of having to remember and enter the IP address?

-HTTP

-SSL

-DNS

-NNTP

DNS

400

Which of the following strategies will help protect your computer against virus attacks?

-Perform regular backups of your hard drive.

-Update the definitions for your malware protection application frequently.

-Open e-mail attachments only from unknown senders.

-Configure security settings for your Web browser to the lowest possible level.

Update the definitions for your malware protection application frequently.

400

Andrea works as an Administrative Assistant for a small business that uses a SaaS service for accounting, sales orders, and customer service information about the business’s customers. This product is like Salesforce.com and its competitors. Andrea makes sure she saves accurate records about current projects and performs regular backups of the business data stored on the cloud-based service. Which of the following is the primary reason for this practice?

Andrea is overly cautious because it is well known that cloud-based services are highly secure, highly reliable and always available.

-Data stored online through the cloud-based service is more at risk to security breaches than if it were stored locally.

-If there is an interruption in Internet access, the service and records would notbe accessible.

-There is a limit on the number of users who are allowed to access the cloud-based service at any one time.

If there is an interruption in Internet access, the service and records would not be accessible.

400

Raoul has received a file attachment from a known individual. He has no reason to expect files from this individual. Which of the following is an effective security strategy for Raoul to take?

-Open the file attachment and use anti-virus software to scan it.

-Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.

-Before opening the attachment, use anti-virus software to scan the system’s hard disk.

-Make back-up copies of important files so that it is possible to recover them in case of an incident.

Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.

400

The App-A-Day company offers software applications for various topics. When acustomer purchases a desired application from the App-A-Day online store, he is directed to a page where he can download the application directly. When the customer is redirected and begins downloading the application, which specific protocol is most likely transferring the application?

-FTP

-HTTPS

-HTTP

-SMTP

FTP

400

A paradigm shift has occurred in the way that small businesses use software applications. Companies increasingly choose hosted solutions with a monthly subscription fee and outsourced system maintenance, instead of purchasing software and hardware that must be maintained by internal resources. This business model is commonly referred to as:

-Software as a Service

-scalability

-crowdsourcing

-grid computing

Software as a service

500

Digital signatures verify the integrity of the data, verify the identity of the sender, and:

-Enforce non-repudiation.

-Sign digital certificate requests.

-Create certificate requests.

-Provide data confidentiality.

Enforce non-repudiation

500

Your child’s high school has created a wiki for its social science classes to support blogs and collaborative projects. Your child also contributes photos of extracurricular events to the school’s Facebook site. Which term collectively describes these types of Web usage?

-Mashup

-Web 1.0

-Folksonomy

-Web 2.0

Web 2.0

500

You are expecting a very important file from a co-worker in a remote office to be sent to you through e-mail. You finally call the co-worker and tell him that you have not received the file. He informs you that he sent the file yesterday but will send it again immediately. After some time, you still have not received his e-mail message You contact the Technical Support department and ask them for help. After some investigation, Technical Support finds the e-mail from your coworker with an attachment named salesnumbers.exe in the spam folder of your e-mail client. What is the most likely reason that the e-mail message was filtered out?

-The attachment’s file size exceeds the size limits of the e-mail filter policy.

-The file name of the attached file exceeds the file name length of the filter policy.

-Messages from remote offices are blocked on internal e-mail.

-File attachments with an .exe extension may contain malicious code.

File attachments with an .exe extension may contain malicious code.

500

You are a software developer who wants to start developing mobile apps for smartphones. You have the option to develop apps for an open-source operating system. Which of the following could persuade you to focus your development efforts on the open-source operating system?

-Open-source operating systems and development tools are free from software bugs and viruses.

-The operating system and associated development tools are free, provided you comply with the copyleft license.

-Source code for an open-source app is not viewable and cannot be modified.

-An open-source license will never be in the public domain.

The operating system and associated development tools are free, provided you comply with the copyleft license.

500

Marcella is looking for a unique product online. She has found one on the XYZ Company’s Web site, which is designed well and appears to be legitimate. As she navigates through the checkout process, she reaches the checkout page with this URL, which asks her to enter her credit card information:http://XYZ.com/gp/checkout.html/ref=chk_out_TLS12B_lb?ie=UTF8&docId=1000 7931. Why should Marcella cancel her online transactioninstead of proceeding?

-Because the link contains abbreviations and is not completely readable, so Marcella is unsure of the server’s name

-Because the site uses 128-bit encryption, which is illegal for companies that are located overseas

-Because the link does not use SSL/TLS encryption and therefore the information Marcella enters would not be secure

-Because the link uses SSL/TLS encryption, which Marcella knows is not compatible with the browser she is using

Because the link does not use SSL/TLS encryption and therefore the information Marcella enters would not be secure

M
e
n
u