ciw 1d0-61a practice test

CIW Internet Business Associate

Last exam update: Dec 04 ,2025
Page 1 out of 4. Viewing questions 1-15 out of 57

Question 1

You opened an e-mail attachment and it launches a virus. The virus takes control of your system and
you are unable to run your anti-virus software. Which of the following is the best step for you to take
next?

  • A. Let the virus run its course.
  • B. Call your local authorities to report an identity theft.
  • C. Turn off your computer and reboot from a known, clean system disk.
  • D. Plug in your backup drive to try to initiate an immediate backup of important files.
Mark Question:
Answer:

C


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

You just received a joke that was c-mailed to you by a co-worker. You find the joke funny and consider
forwarding it to another co-worker that you trust. Which human resources issue do you risk by
forwarding the e-mail message?

  • A. Forgetting to include others who might find the joke funny
  • B. Copyright infringement by not providing credit to the originator of the joke
  • C. Offending a recipient who receives the joke as a result from further forwarding
  • D. Reducing the effectiveness of spam filters
Mark Question:
Answer:

C


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Which of the following strategies is recommended when conducting keyword searches?

  • A. Use nouns instead of verbs for keywords.
  • B. Use verbs instead of nouns for keywords.
  • C. Use as few keywords as possible.
  • D. Include at least one preposition such as “the” or “an” in your list of keywords.
Mark Question:
Answer:

A


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

Evonka is listening to music from an online music provider (such as Pandora or Jango). She builds a
list of music preferences, including favorite songs. The music service then suggests additional songs
she might enjoy. The music provider is an example of a cloud-computing application that uses a
technology for collaborative filtering, which helps define the list of songs available to listeners.
Which term describes this technology?

  • A. Bit-torrent
  • B. Crowd sourcing
  • C. Grid computing
  • D. Software as a Service
Mark Question:
Answer:

B


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

You have just finished designing a Web site to support a charity organization’s fund-raising efforts.
You need to meet with the board members to get their feedback and address some questions before
you implement the final design. The board members are dispersed throughout the country and want
to avoid spending charity funds on traveling to this meeting. Which of the following solutions would
best support the charity and provide you with an opportunity to discuss the design as a group?

  • A. Plan a Web conference using a service such as WebEx or GoToMeeting that supports screen sharing and phone conferencing.
  • B. Plan a Webinar that reviews the layout of the site and request that board members submit their feedback by e-mail after the Webinar.
  • C. Create a PowerPoint slideshow that contains pictures of your Web site design and create a survey to gather the board members’ feedback.
  • D. Create an audio Webcast and distribute it to the board members over the Internet.
Mark Question:
Answer:

A


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

Which of the following is used to help non-technical users collectively classify and find information
on a site?

  • A. Tagging
  • B. A wiki
  • C. Web feed
  • D. Ajax
Mark Question:
Answer:

A


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

You received a text and a threatening voicemail from an angry customer who wants to immediately
discuss the shortcomings of a recently released product. You are about to walk into a mandatory
meeting with your top-level leadership team. Which of the following is your best course of action?

  • A. Continue to send text messages to the customer hoping to smooth things over until you can call him on the phone after your meeting.
  • B. Request that the customer send his complaints by e-mail, knowing that any inappropriate communication will be well documented.
  • C. Do not respond to the customer.
  • D. Skip the meeting and call the customer.
Mark Question:
Answer:

B


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

Raoul has received a file attachment from a known individual. He has no reason to expect files from
this individual. Which of the following is an effective security strategy for Raoul to take?

  • A. Open the file attachment and use anti-virus software to scan it.
  • B. Before opening the attachment, use anti-virus software to scan the system’s hard disk.
  • C. Make back-up copies of important files so that it is possible to recover them in case of an incident.
  • D. Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.
Mark Question:
Answer:

D


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

You accidentally dropped your mobile phone, which was submerged in water and no longer works.
Upon replacing the phone with an upgraded unit you must reconfigure many of the services. The
instructions say that all you need to do is enter your e-mail address and the unit will configure the e-
mail client for you. Even though you have tried this several times, it does not work. The mobile
phone vendor says that because you are trying to sync your e-mail account with an enterprise mail
server, you will need to configure the e-mail client manually. Which choice lists the information you
will need to configure the e-mail client?

  • A. Company name, e-mail address, SMTP, POP3, IMAP and DNS
  • B. E-mail address, SMTP, IMAP, DNS, user name and password
  • C. E-mail address, SMTP, POP3, user name and password
  • D. Company name, SMTP, POP3, user name and password
Mark Question:
Answer:

C


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which is the preferred approach to communicate important action items in an e-mail message to a
co-worker?

  • A. Write the action items using all capital letters.
  • B. List the action items in a numbered or bulleted list for clarity.
  • C. Include emoticons to ensure the recipient understands your humor.
  • D. Describe all action items at length in a detailed paragraph in the middle of the message.
Mark Question:
Answer:

B


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

You have 20 remote employees flying in to attend a corporate meeting. The morning of travel day,
the administrator tells you that the hotel reservations have changed. What is the best way to send
each traveling employee a quick message with the new hotel information?

  • A. Update the meeting agenda with the hotel information.
  • B. Post an announcement to the company’s Web site with the new hotel information.
  • C. Call each stakeholder and leave a message with the address of the hotel.
  • D. Send a text message with the hotel information to the mobile phone of each traveler.
Mark Question:
Answer:

D


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

As a project manager, you have to balance three elements that compose the project triangle.
Suppose your customer requests that you add some new requirements to the project when you are
halfway through. If you agree to this request, how would it affect other aspects of the project?

  • A. Project scope will decrease.
  • B. Cost of the project will increase.
  • C. Cost of the project will decrease.
  • D. Time to complete project will be reduced.
Mark Question:
Answer:

B


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

You are expecting a very important file from a co-worker in a remote office to be sent to you through
e-mail. You finally call the co-worker and tell him that you have not received the file. He informs you
that he sent the file yesterday, but will send it again immediately. After some time, you still have not
received his e-mail message. You contact the Technical Support department and ask them for help.
After some investigation, Technical Support finds the e-mail from your coworker with an attachment
named salesnumbers.exe in the spam folder of your e-mail client. What is the most likely reason that
the e-mail message was filtered out?

  • A. Messages from remote offices are blocked on internal e-mail.
  • B. The attachment’s file size exceeds the size limits of the e-mail filter policy.
  • C. File attachments with an .exe extension may contain malicious code.
  • D. The file name of the attached file exceeds the file name length of the filter policy.
Mark Question:
Answer:

C


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

The App-A-Day company offers software applications for various topics. When a customer purchases
a desired application from the App-A-Day online store, he is directed to a page where he can
download the application directly. When the customer is redirected and begins downloading the
application, which specific standard protocol is most likely transferring the application?

  • A. FTP
  • B. HTTPS
  • C. HTTP
  • D. SMTP
Mark Question:
Answer:

A


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Digital signatures verify the integrity of the data, verify the identity of the sender, and:

  • A. Provide data confidentiality.
  • B. Enforce non-repudiation.
  • C. Sign digital certificate requests.
  • D. Create certificate requests.
Mark Question:
Answer:

B


User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2