Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
CIW IBA Review #3
Test Description: Reviewing for the CIW IBA TEST
Instructions: Answer all questions to get your test result.
1) You should schedule meetings with project stakeholders and management during the executing and controlling phases of a project to:
A
outline the requirements for each project task to ensure the project objectives are met.
B
outline project tasks and assign resources to each.
C
inform them of progress and to handle issues they raise that may affect project scope.
D
identify the problems or needs that the project must resolve or address.
2) When you sign in to your instant messaging (IM) service, your online status is advertised (or published) to the people on your contacts list. What does this scenario represent?
A
Mobile computing
B
Unified communications (UC)
C
Presencing
D
Convergence
3) You have created a new software application and are ready to distribute it to other users. You have decided to license the software according to the GNU GPL version 3. What does this license allow you to do with your software?
A
Your software is available for free use by other programmers, but anyone who alters it must pay you a fee and share royalties
B
You can sell your software, but only if you make the software code available on a public server.
C
Your software is avail. for free use and alteration by programmers, who must make modified versions freely available as well.
D
You can sell your software, but only through a not-for-profit company.
4) Your company wants to simplify the customer support process for its distributors by enabling them to obtain company forms and reports online. Your Web team are in charge of implementing this capability. Which Web-based system should you implement?
A
Webinar
B
Intranet
C
Extranet
D
FTP site
5) Which of the following audio file formats is a free, open-source alternative to the MP3 format?
A
Ogg Vorbis
B
Waveform (WAV)
C
AU
D
Audio Interchange File Format (AIFF)
6) As an IT project manager, you must be able to determine which projects to preserve and which projects to eliminate in order to:
A
maintain a positive Return On Investment (ROI).
B
prepare an effective Statement Of Work (SOW).
C
conduct an appropriate needs analysis.
D
determine which project triangle factors will most affect product quality.
7) As an IT project manager, you are weighing the benefits of installing a new company firewall. Which of the following will convince upper management to approve the project?
A
The new firewall installation will allow employees access to the Internet
B
The new firewall installation will prevent outside users from accessing company servers
C
The new firewall installation will effectively filter spam
D
The new firewall installation will result in a positive Return On Investment (ROI)
8) You have been asked to defragment the hard drives of several corporate systems without leaving your desk. All of the systems are running Windows 10. To complete this task, you should:
A
use command-line FTP.
B
use the ipconfig utility.
C
use the BitTorrent application.
D
use Remote Desktop Connection.
9) Johann uses instant messaging to communicate with his team members, as well as with close friends. Johann was surprised he started receiving spam during IM sessions. Which statement would explain why Johann could receive spam during an IM session?
A
Instant messaging runs on mobile devices, which are less secure than standard PCs.
B
Instant messaging runs on standard PCs, which are less secure than mobile devices.
C
Instant messaging bypasses anti-virus software and firewalls.
D
Instant messaging bypasses users' presencing settings.
10) During which project management phase should you troubleshoot problems and take corrective measures to ensure that all objectives are being met?
A
The planning phase
B
The executing phase
C
The initiating phase
D
The controlling phase
11) Frankie works on the IT team at her company. She is looking for ways to reduce costs, so she suggests that the company uses P2P to facilitate sharing of information. To protect its confidential data while benefiting from P2P, the company should:
A
forbid employees to use their computers in P2P communications.
B
limit P2P use to sharing only with universities and research organizations.
C
implement technologies that will control access and password-protect files.
D
limit P2P use to sharing only music files.
12) Much of the data your company sends is proprietary and sensitive in nature, so you determine that encrypting company transmissions is critical. What is the disadvantage of encrypting company transmiss
A
Encrypting transmissions slows communication because each data packet must be encrypted and decrypted.
B
Encrypting transmissions encourages hackers and places data at risk for interception by malicious outsiders.
C
Encrypting transmissions violates your employees' privacy rights.
D
Encrypting transmissions requires you to obtain a license from the copyright owner.
13) Why does an IT project manager need to consider a project's Return On Investment (ROI) before starting a new project?
A
Before starting a project, an IT project manager must convince management that the product will result in a negative ROI.
B
Before starting a project, an IT project manager must convince management that a product will lead to productivity gains.
C
Before starting a project, an IT project manager must make sure that sufficient funds exist to complete the project.
D
Before starting a project, an IT project manager will be required to justify the project's benefits relative to its costs.
14) Employers can monitor their employees' email messages sent to and from the company network because:
A
regular monitoring reduces the extent of infection by malware.
B
all information carried by the company's communication system is company property.
C
this activity minimizes the amount of spam employees receive.
D
it prevents employees from using network resources too frequently.
15) In a business environment, in which situation would email be more appropriate for communicating than texting?
A
Sending a message to a co-worker about a special delivery at the front desk
B
Sending a message to a friend about meeting at the ballgame later that evening
C
Sending a message to your supervisor for not able to attend social gathering
D
Sending a contract to your supervisor for her review and advice
16) Which of the following could be a disadvantage for you to choose open-source, and thus a compelling enough reason to purchase the licensed software instead of using the open-source solution?
A
The code for the open-source solution can be viewed by a community of open-source developers.
B
Your developers will have ready access to the source code.
C
The open-source solution is in the public domain.
D
Maintenance of an open-source solution relies on developers who volunteer to work on the code.
17) Samson tries to view the videos on his computer using his Windows Media Player, but they will not play. The video files are in RealMedia format. What should Samson do in order to view these videos?
A
Upload the videos to the Web server to view them on the company Website because they will not play from a local computer.
B
Decompress the files before attempting to play them in Windows Media Player, b/c RealMedia files are compressed for uploading
C
Contact his company's Technical Support department and request an upgrade for his computer.
D
Convert the video files to the WMV format, because RealMedia files will not play in Windows Media Player.
18) What must an email message include in order for you to send it?
A
At least one address in the To field
B
At least one character in the Body field
C
At least one character in the Subject field
D
At least one character in the From field
19) You download a file with the unusual file name extension of .wow. When you attempt to open this file, Windows displays an error message. Which of the following determines a document type and the application required to open it?
A
MIME
B
TCP/IP
C
HTTP
D
FTP
20) Your computer crashed, and you lost many personal and work-related files. You just got a new computer, but you are now much more concerned about viruses and other security threats. Which strategy can help protect your computer against virus attacks?
A
Open email attachments only from unknown senders.
B
Perform regular backups of your hard drive.
C
Update the definitions on your anti-virus application frequently.
D
Disable your Web browser's automatic security settings so you can manually control the content you download.
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?