New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

CIW 1D0-61A - Internet Business Associate

Page: 2 / 2
Total 57 questions

You just started a small business and need to create a logo. Although you are technically savvy, your artistic creativity is limited. You decide to launch a contest to seek creative ideas for your logo. Using the Internet and social networking in this manner is known as:

A.

folksonomy

B.

outsourcing

C.

crowd sourcing

D.

social engineering

Andrea works as an Administrative Assistant for a small business that uses an SaaS service for accounting, sales orders and customer service information about the business’s customers. This product is similar to Salesforce.com and its competitors. Andrea makes sure she saves accurate records about current projects and performs regular backups of the business data stored on the cloud-based service. Which of the following is the primary reason for this practice?

A.

If there is an interruption in Internet access, the service and records would not be accessible.

B.

There is a limit on the number of users who are allowed to access the cloud-based service at any one time.

C.

Data stored online through the cloud-based service is more at risk to security breaches than if it were stored locally.

D.

Andrea is overly cautious because it is well known that cloud-based services are highly secure, highly reliable and always available.

Irena is reviewing several promotional product videos from her company’s marketing department before they are published on the company’s Web site. The videos are in RealMedia format, but they do not open in Irena’s Windows Media Player. What should Irena do in order to view the videos?

A.

Contact her company’s Technical Support department and schedule service for her computer.

B.

Convert the video files to the WMV format, because RealMedia files will not play in Windows Media Player.

C.

Upload the videos to the Web server to be viewed through Windows Media Player because they will not play from a local computer.

D.

Decompress the files before attempting to play them in Windows Media Player, because RealMedia files are compressed for uploading/downloading.

Which of the following strategies is recommended when conducting keyword searches?

A.

Use nouns instead of verbs for keywords.

B.

Use verbs instead of nouns for keywords.

C.

Use as few keywords as possible.

D.

Include at least one preposition such as“the”or“an”in your list of keywords.

Roberto’s company is releasing updates to a specific product. He needs to educate the company’s sales managers, who are located in various international locations, about the new product updates. Which of the following methods would be the most economical and efficient solution for Roberto to discuss the required information with the sales managers synchronously?

A.

Send the product update blueprints via e-mail to each of the sales managers and ask them to contact him with any questions.

B.

Schedule an in-person sales meeting with them at the company headquarters so that the updates can be demonstrated and any questions answered with the entire group present.

C.

Schedule a Webinar with the sales managers so that the updates can be demonstrated and any questions answered with the entire group.

D.

Post the product update blueprints on the company’s Web site and call each sales manager personally to discuss their individual questions or concerns offline.

You received a text and a threatening voicemail from an angry customer who wants to immediately discuss the shortcomings of a recently released product. You are about to walk into a mandatory meeting with your top-level leadership team. Which of the following is your best course of action?

A.

Continue to send text messages to the customer hoping to smooth things over until you can call him on the phone after your meeting.

B.

Request that the customer send his complaints by e-mail, knowing that any inappropriate communication will be well documented.

C.

Do not respond to the customer.

D.

Skip the meeting and call the customer.

When using secure authentication, which of the following are required?

A.

A user name only

B.

A user name and a password

C.

Neither user name nor a password

D.

A user name, a password and encryption of transmitted data