Independence Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

CIW 1D0-61A Internet Business Associate Exam Practice Test

Demo: 8 questions
Total 57 questions

Internet Business Associate Questions and Answers

Question 1

You have volunteered to give a presentation to the parents at your child’s school about the dangers of the Internet. Which of the following would you include in your recommendations to parents?

Options:

A.

Warn children to never provide personal information over the Internet.

B.

Direct parents to ask other users in the children’s chat rooms to provide identification.

C.

Remind the parents that the anonymity of chat rooms provides security.

D.

To reduce fear, claim that the threat of predators has been reduced in recent times.

Question 2

Raoul has received a file attachment from a known individual. He has no reason to expect files from this individual. Which of the following is an effective security strategy for Raoul to take?

Options:

A.

Open the file attachment and use anti-virus software to scan it.

B.

Before opening the attachment, use anti-virus software to scan the system’s hard disk.

C.

Make back-up copies of important files so that it is possible to recover them in case of an incident.

D.

Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.

Question 3

You have 20 remote employees flying in to attend a corporate meeting. The morning of travel day, the administrator tells you that the hotel reservations have changed. What is the best way to send each traveling employee a quick message with the new hotel information?

Options:

A.

Update the meeting agenda with the hotel information.

B.

Post an announcement to the company’s Web site with the new hotel information.

C.

Call each stakeholder and leave a message with the address of the hotel.

D.

Send a text message with the hotel information to the mobile phone of each traveler.

Question 4

You received a text and a threatening voicemail from an angry customer who wants to immediately discuss the shortcomings of a recently released product. You are about to walk into a mandatory meeting with your top-level leadership team. Which of the following is your best course of action?

Options:

A.

Continue to send text messages to the customer hoping to smooth things over until you can call him on the phone after your meeting.

B.

Request that the customer send his complaints by e-mail, knowing that any inappropriate communication will be well documented.

C.

Do not respond to the customer.

D.

Skip the meeting and call the customer.

Question 5

The App-A-Day company offers software applications for various topics. When a customer purchases a desired application from the App-A-Day online store, he is directed to a page where he can download the application directly. When the customer is redirected and begins downloading the application, which specific standard protocol is most likely transferring the application?

Options:

A.

FTP

B.

HTTPS

C.

HTTP

D.

SMTP

Question 6

You just received a joke that was c-mailed to you by a co-worker. You find the joke funny and consider forwarding it to another co-worker that you trust. Which human resources issue do you risk by forwarding the e-mail message?

Options:

A.

Forgetting to include others who might find the joke funny

B.

Copyright infringement by not providing credit to the originator of the joke

C.

Offending a recipient who receives the joke as a result from further forwarding

D.

Reducing the effectiveness of spam filters

Question 7

You opened an e-mail attachment and it launches a virus. The virus takes control of your system and you are unable to run your anti-virus software. Which of the following is the best step for you to take next?

Options:

A.

Let the virus run its course.

B.

Call your local authorities to report an identity theft.

C.

Turn off your computer and reboot from a known, clean system disk.

D.

Plug in your backup drive to try to initiate an immediate backup of important files.

Question 8

Digital signatures verify the integrity of the data, verify the identity of the sender, and:

Options:

A.

Provide data confidentiality.

B.

Enforce non-repudiation.

C.

Sign digitalcertificaterequests.

D.

Create certificate requests.

Demo: 8 questions
Total 57 questions