You are expecting a very important file from a co-worker in a remote office to be sent to you through email. You finally call the co-worker and tell him that you have not received the file. He informs you that he sent the file yesterday, but will send it again immediately. After some time, you still have not received his email message. You contact the Technical Support department and ask them for help. After some investigation, Technical Support finds the e-mail from your coworker with an attachment named salesnumbers.exe in the spam folder of your e-mail client.
What is the most likely reason that the e-mail message was filtered out?
A. Messages from remote offices are blocked on internal e-mail.
B. The attachment's file exceeds the size exceeds the size limits of the e-mail filter policy.
C. File attachments with an .exe extension may contain malicious code.
D. The file name of the attached file exceeds the file name length of the filter policy.
Your Web browser is currently open and displaying a popular sports site. You decide that you want to browse to the CIW site without closing the browser.
What is the most efficient way to accomplish this?
A. By typing the CIW site's URL (www.CIWcertified.com) in the address bar of your Web browser
B. By performing a search within the site currently displayed in your Web browser
C. By performing a search on your computer for the term "CIW"
To reduce the costs of maintaining servers with FTP access; your company is using P2P to facilitate sharing of information.
Which strategy should your company use to protect the company's sensitive information while capitalizing on the benefits of P2P power?
A. Limit P2P use to sharing music files
B. Restrict employees from using their computers in P2P communications
C. Use technologies that will control access and password-protect files.
D. Restrict P2P use to sharing only with universities and research organizations
Roberto's company is releasing updates to a specific product. He needs to educate the company's sales managers, who are located in various international locations, about the new product updates.
Which of the following methods would be the most economical and efficient solution for Roberto to discuss the required information with the sales managers synchronously?
A. Send the product update blueprints via e-mail to each of the sales managers and ask them to contact him any questions.
B. Schedule an in-person sales meeting with them at the company headquarters so that the updates can be demonstrated and any questions answered with the entire group present.
C. Schedule a Webinar with the sales managers so that the updates can be demonstrated and any questions answered with the entire group.
Irena is reviewing several promotional product videos from her company's marketing department before they are published on the company's Web site. The videos are in RealMedia format, but they do not open in Irena's Windows Media Player.
What should Irena do in order to view the videos?
A. Contract her company's Technical Support department and schedule service for her computer.
B. Convert the video files to the WMV format, because RealMedia files will not play in Windows Media Player.
C. Upload the videos to the Web server to be viewed through Windows Media Player because they will not play from a local computer.
You are leading a team of new hires and need to train them on innovative strategies and technologies that will be used to develop an upcoming project. You send several e-mail messages with links to helpful resources. But you soon realize this is an inefficient way to organize and share this information.
Which solution would provide a more efficient way to categorize and share this information?
A. Social tagging
B. Grid computing
C. Ajax programming
D. Collective intelligence
What is the difference between a computer virus and a worm?
A. A virus can replicate by itself, whereas a worm requires user action to replicate.
B. A worm can replicate by itself, whereas a virus requires user action to replicate.
C. A worm can deposit an illicit server, whereas a virus cannot.
D. A worm can deposit an illicit server, whereas a worm cannot.
One of your co-workers calls you to ask if you sent her an e-mail message with an attachment. You recall that you sent several c-mails with attachments earlier that day.
Which of the following is your best response to this question?
A. Ask your co-worker to open the attachment and describe the contents.
B. Ask your co-worker to read the email message including the full name of the attachment and its extension.
C. Ask your co-worker to forward the e-mail to you so you can open the attachment and check it.