ciw 1d0-61a practice test

Exam Title: CIW Internet Business Associate

Last update: Nov 27 ,2025
Question 1

You have 20 remote employees flying in to attend a corporate meeting. The morning of travel day,
the administrator tells you that the hotel reservations have changed. What is the best way to send
each traveling employee a quick message with the new hotel information?

  • A. Update the meeting agenda with the hotel information.
  • B. Post an announcement to the company’s Web site with the new hotel information.
  • C. Call each stakeholder and leave a message with the address of the hotel.
  • D. Send a text message with the hotel information to the mobile phone of each traveler.
Answer:

D


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

As a project manager, you have to balance three elements that compose the project triangle.
Suppose your customer requests that you add some new requirements to the project when you are
halfway through. If you agree to this request, how would it affect other aspects of the project?

  • A. Project scope will decrease.
  • B. Cost of the project will increase.
  • C. Cost of the project will decrease.
  • D. Time to complete project will be reduced.
Answer:

B


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

You are expecting a very important file from a co-worker in a remote office to be sent to you through
e-mail. You finally call the co-worker and tell him that you have not received the file. He informs you
that he sent the file yesterday, but will send it again immediately. After some time, you still have not
received his e-mail message. You contact the Technical Support department and ask them for help.
After some investigation, Technical Support finds the e-mail from your coworker with an attachment
named salesnumbers.exe in the spam folder of your e-mail client. What is the most likely reason that
the e-mail message was filtered out?

  • A. Messages from remote offices are blocked on internal e-mail.
  • B. The attachment’s file size exceeds the size limits of the e-mail filter policy.
  • C. File attachments with an .exe extension may contain malicious code.
  • D. The file name of the attached file exceeds the file name length of the filter policy.
Answer:

C


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

The App-A-Day company offers software applications for various topics. When a customer purchases
a desired application from the App-A-Day online store, he is directed to a page where he can
download the application directly. When the customer is redirected and begins downloading the
application, which specific standard protocol is most likely transferring the application?

  • A. FTP
  • B. HTTPS
  • C. HTTP
  • D. SMTP
Answer:

A


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

Digital signatures verify the integrity of the data, verify the identity of the sender, and:

  • A. Provide data confidentiality.
  • B. Enforce non-repudiation.
  • C. Sign digital certificate requests.
  • D. Create certificate requests.
Answer:

B


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

You use a proprietary Windows-based program to generate architectural drawings and plans for your
freelance drafting business. You have a personal Web site and would like to share samples of your
work for potential new customers to review. To which file format should you convert your drawings
so that they are viewable regardless of the local operating system used by the individual viewing
your site?

  • A. PDF
  • B. MP3
  • C. DOC
  • D. XML
Answer:

A


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

Andrea works as an Administrative Assistant for a small business that uses an SaaS service for
accounting, sales orders and customer service information about the business’s customers. This
product is similar to Salesforce.com and its competitors. Andrea makes sure she saves accurate
records about current projects and performs regular backups of the business data stored on the
cloud-based service. Which of the following is the primary reason for this practice?

  • A. If there is an interruption in Internet access, the service and records would not be accessible.
  • B. There is a limit on the number of users who are allowed to access the cloud-based service at any one time.
  • C. Data stored online through the cloud-based service is more at risk to security breaches than if it were stored locally.
  • D. Andrea is overly cautious because it is well known that cloud-based services are highly secure, highly reliable and always available.
Answer:

A


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

Consider the following address:
http://www.CIWcertified
.com/Certifications/Web_Foundations/iba.php
Which of the following is the best classification for the address?

  • A. Fully qualified domain name
  • B. Virtual domain name
  • C. Relative URL
  • D. Deep URL
Answer:

D


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

You are a software developer who wants to start developing mobile apps for smartphones. You have
the option to develop apps for an open-source operating system. Which of the following could
persuade you to focus your development efforts on the open-source operating system?

  • A. An open-source license will never be in the public domain.
  • B. Source code for an open-source app is not viewable and cannot be modified.
  • C. Open-source operating systems and development tools are free from software bugs and viruses.
  • D. The operating system and associated development tools are free, provided you comply with the copy left license.
Answer:

D


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

Melanie works in the sales department at XYZ Company. She decides that her company’s marketing
team has done a poor job representing the company’s brand. Without direction or permission, she
starts her own social networking account to help. This account’s name is called XYZ Professional. To
customize her page, she uses company logos and verbiage from the company Web site. She then
begins communicating with customers and individuals interested in XYZ via this service. Which of the
following would be the most appropriate response to Melanie’s actions by the company?

  • A. Providing a link to Melanie’s page from the company’s official social networking account
  • B. Sending Melanie a request from the company’s Human Resources department to stop using company logos, yet allowing her to continue using this social networking account
  • C. Adding references to Melanie’s social networking page in the company’s internal newsletter
  • D. Terminating Melanie’s employment for copyright and trademark violation, with a cease-and-desist letter asking for control of the account
Answer:

D


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 5
Viewing questions 1-10 out of 57
Go To
page 2