You accidentally dropped your mobile phone, which was submerged in water and no longer works. Upon replacing the phone with an upgraded unit you must reconfigure many of the services. The instructions say that all you need to do is enter your e-mail address and the unit will configure the e-mail client for you. Even though you have tried this several times, it does not work. The mobile phone vendor says that because you are trying to sync your e-mail account with an enterprise mail server, you will need to configure the e-mail client manually.
Which choice lists the information you will need to configure the e-mail client?
A. Company name, email address, SMTP, POP3, IMAP and DNS
B. E-mail address, SMTP, IMAP, DNS, user name and password
C. E-mail address, SMTP, POP3, user name and password
The App-A-Day company offers software applications for various topics. When a customer purchases a desired application from the App-A-Day online store, he is directed to a page where he can download the application directly.
When the customer is redirected and begins downloading the application, which specific standard protocol is most likely transferring the application?
A. FTP
B. HTTPS
C. HTTP
D. SMTP
Digital signatures verify the integrity of the data, verify the identity of the sender, and:
A. Provide data confidentiality.
B. Enforce non-repudiation.
C. Sign digital certificate requests.
D. Create certificate requests.
Consider the following address:
http://www.CIWcertified .com/Certifications/Web_Foundations/iba.php
Which of the following is the best classification for the address?
A. Fully qualified domain name
B. Deep URL
C. Virtual domain name
D. Relative URL
Melanie works in the sales department at XYZ Company. She decides that her company's marketing team has done a poor job representing the company's brand. Without direction or permission, she starts her own social networking account to help. This account's name is called XYZ Professional. To customize her page, she uses company logos and verbiage from the company Web site. She then begins communicating with customers and individuals interested in XYZ via this service.
Which of the following would be the most appropriate response to Melanie's actions by the company?
A. Providing a link to Melanie's page from the company's official social networking account
B. Sending Melanie a request from the company's Human Resources department to stop using company logos, yet allowing her to continue using this social networking account
C. Adding references to Melanie's social networking page in the company's internal newsletter
D. Terminating Melanie's employment for copyright and trademark violation, with a cease-and desist letter asking for control of the account.
Your Web browser is currently open and displaying a popular sports site. You decide that you want to browse to the CIW site without closing the browser.
What is the most efficient way to accomplish this?
A. By typing the CIW site's URL (www.CIWcertified.com) in the address bar of your Web browser
B. By performing a search within the site currently displayed in your Web browser
C. By performing a search on your computer for the term "CIW"
An end user cannot log in to a page that provides an c-learning course. The authentication window will not launch.
Which of the following is most likely the cause of this problem?
A. Pop-up blocking software has been enabled in the operating system.
B. Pop-up blocking software has been enabled in the Web browser
C. The browser has recently had its browsing history cleared.
D. The browser has recently had its cookie cache cleared.
You have volunteered to give a presentation to the parents at your child's school about the dangers of the Internet.
Which of the following would you include in your recommendations to parents?
A. Warn children to never provide personal information over the Internet
B. Direct parents to ask other users in the children's chat rooms to provide identification.
C. Remind the parents that the anonymity of chat rooms provides security.
D. To reduce fear, claim that the threat of predators has been reduced in recent times.
You have just checked the balance in your bank account by logging into your bank's Web site. Which protocol was most likely used for the transmission of your information?
A. IMAPS
B. HTTPS
C. POP
D. FTPS
A family member has just sent you an e-mail message that contains highly personal details about a family matter. The message was sent to your company e-mail address. The family member has requested that you respond with your ideas about how to resolve the situation.
Which of the following is a reason for you to call your family member and discuss the matter over the phone instead?
A. Because your employer has the right to read your email.
B. Because e-mail is completely private but not personal enough.
C. Because it is illegal to use company e-mail for personal use.