Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CIW > CIW-Associate > 1D0-61A

1D0-61A Internet Business Associate Question and Answers

Question # 4

Raoul has received a file attachment from a known individual. He has no reason to expect files from this individual. Which of the following is an effective security strategy for Raoul to take?

A.

Open the file attachment and use anti-virus software to scan it.

B.

Before opening the attachment, use anti-virus software to scan the system’s hard disk.

C.

Make back-up copies of important files so that it is possible to recover them in case of an incident.

D.

Before opening the attachment, call or send a text or instant message to the individual to verify that he or she meant to send it.

Full Access
Question # 5

Xue’s company has provided her with a desktop computer to use at work. She has configured her e-mail client on this work computer to include her personal e-mail account so that she can conveniently download messages and check her personal e-mail. Xue should be aware that:

A.

The company will block personal e-mail accounts.

B.

The company must permit her to receive personal e-mail messages.

C.

The company will ignore the e-mail messages to respect her privacy.

D.

The company will have access to her personal e-mail messages.

Full Access
Question # 6

An end user cannot log in to a page that provides an c-learning course. The authentication window will not launch. Which of the following is most likely the cause of this problem?

A.

Pop-up blocking software has been enabled in the operating system.

B.

The browser has recently had its cookie cache cleared.

C.

The browser has recently had its browsing history cleared.

D.

Pop-up blocking software has been enabled in the Web browser.

Full Access
Question # 7

You just received a joke that was c-mailed to you by a co-worker. You find the joke funny and consider forwarding it to another co-worker that you trust. Which human resources issue do you risk by forwarding the e-mail message?

A.

Forgetting to include others who might find the joke funny

B.

Copyright infringement by not providing credit to the originator of the joke

C.

Offending a recipient who receives the joke as a result from further forwarding

D.

Reducing the effectiveness of spam filters

Full Access
Question # 8

You accidentally dropped your mobile phone, which was submerged in water and no longer works. Upon replacing the phone with an upgraded unit you must reconfigure many of the services. The instructions say that all you need to do is enter your e-mail address and the unit will configure the e-mail client for you. Even though you have tried this several times, it does not work. The mobile phone vendor says that because you are trying to sync your e-mail account with an enterprise mail server, you will need to configure the e-mail client manually. Which choice lists the information you will need to configure the e-mail client?

A.

Company name, e-mail address, SMTP, POP3, IMAP and DNS

B.

E-mail address, SMTP, IMAP, DNS, user name and password

C.

E-mail address, SMTP, POP3, user name and password

D.

Company name, SMTP, POP3, user name and password

Full Access