Melanie works in the sales department at XYZ Company. She decides that her company's marketing team has done a poor job representing the company's brand. Without direction or permission, she starts her own social networking account to help. This account's name is called XYZ Professional. To customize her page, she uses company logos and verbiage from the company Web site. She then begins communicating with customers and individuals interested in XYZ via this service.
Which of the following would be the most appropriate response to Melanie's actions by the company?
A. Providing a link to Melanie's page from the company's official social networking account
B. Sending Melanie a request from the company's Human Resources department to stop using company logos, yet allowing her to continue using this social networking account
C. Adding references to Melanie's social networking page in the company's internal newsletter
D. Terminating Melanie's employment for copyright and trademark violation, with a cease-and desist letter asking for control of the account.
Your Web browser is currently open and displaying a popular sports site. You decide that you want to browse to the CIW site without closing the browser.
What is the most efficient way to accomplish this?
A. By typing the CIW site's URL (www.CIWcertified.com) in the address bar of your Web browser
B. By performing a search within the site currently displayed in your Web browser
C. By performing a search on your computer for the term "CIW"
You just started a small business and need to create a logo. Although you are technically savvy, CIW 1D061A Exam your artistic creativity is limited. You decide to launch a contest to seek creative ideas for your logo.
Using the Internet and social networking in this manner is known as:
A. folksonomy
B. outsourcing
C. crowd sourcing
You have volunteered to give a presentation to the parents at your child's school about the dangers of the Internet.
Which of the following would you include in your recommendations to parents?
A. Warn children to never provide personal information over the Internet
B. Direct parents to ask other users in the children's chat rooms to provide identification.
C. Remind the parents that the anonymity of chat rooms provides security.
D. To reduce fear, claim that the threat of predators has been reduced in recent times.
Consider the following address: http://www.CIWcertified.com/certifications/web_foundations/iba.php
Which part of the URL represents the server name on which this page resides?
A. www
B. .CIWcertified
C. .CIWcertified.com
D. /certifications/
Marcella is looking for a very unique product online. She has found one on the XYZ Company's Web site, which is designed well and appears to be legitimate. As she navigates through the checkout process, she reaches the checkout page with this URL, which asks her to enter her credit card information: http://XYZ.com/gp/checkout.html/ref=chk_out_TLS12B_lb?ie=UTF8anddocId=10007931
Why should Marcella cancel her online transaction instead of proceeding?
A. Because the site uses 128-bit encryption, which is illegal for companies that are located overseas.
B. Because the link contains abbreviations and is not completely readable, so Marcella is unsure of the server name.
C. Because the link does not use SSL/TLS encryption and therefore the information Marcella enters would not be secure
D. Because the link uses SSL/TLS encryption, which Marcella knows is not compatible with the browser she is using
Which choice lists the required elements for HTTP to function?
A. Server, HTML and DNS
B. Client, server and TCP/IP
C. Browser, HTML and TCP/IP
What is the difference between a computer virus and a worm?
A. A virus can replicate by itself, whereas a worm requires user action to replicate.
B. A worm can replicate by itself, whereas a virus requires user action to replicate.
C. A worm can deposit an illicit server, whereas a virus cannot.
D. A worm can deposit an illicit server, whereas a worm cannot.
Proprietary information for your company's online business was released to a competitor. Which of the following preventative measures should your company take to ensure that its proprietary information is protected in the future?
A. Restrict Internet access
B. Uninstall any e-mail clients
C. Monitor employees' messages
D. Destroy all proprietary information
You are using an e-mail client that you are unfamiliar with. You need to send an e-mail with an attachment but you do not see a feature labeled "attachment" anywhere on the client.
What icon should you look for that is commonly used to invoke the e-mail attachment option?
A. Lock
B. Folder
C. Checkmark
D. Paperclip