Black Friday Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sale65best

examstrack slider

Top Tips for Passing the CIW 1D0-61A Exam on Your First Try

Questions 11

Emelia and Lola have created a new software application that allows messaging site subscribers to analyze the message statistics in order to more easily assess and interact with followers. They have decided to license this software according to the GNU GPL Version 3. What does this license allow them to do with their software?

Options:

A.

They can only sell this software through a not-for-profit company.

B.

They can sell this software, but only if they make the software code available on a public server.

C.

The software enters the public domain for free use and can be altered by other programmers, who must then make their changes freely available as well.

D.

The software enters the public domain for free use, but any changes made in the future can be kept secret, allowing them to profitably sell the modified software.

Buy Now
Questions 12

Aisha is preparing to give a presentation to management about the development of cloud computing services that her company is planning to implement. Which of the following might her managers mention as a possible objection or drawback to using cloud services for the company?

Options:

A.

Speed

B.

Cost

C.

Flexibility

D.

Scalability

Buy Now
Questions 13

A paradigm shift has occurred in the way that small businesses use software applications. Companies increasingly choose hosted solutions with a monthly subscription fee and outsourced system maintenance, instead of purchasing software and hardware that must be maintained by internal resources. This business model is commonly referred to as:

Options:

A.

scalability

B.

grid computing

C.

crowdsourcing

D.

Software as a Service

Buy Now
Questions 14

Consider the following address:

http://www.CIWcertified .com/Certifications/Web_Foundations/iba.php

Which of the following is the best classification for the address?

Options:

A.

Fully qualified domain name

B.

Virtual domain name

C.

Relative URL

D.

Deep URL

Buy Now
Questions 15

Gabby suspects that an attacker has gained control of her system. Which of the following is the most appropriate action for her to take?

Options:

A.

Shut down the computer.

B.

Enable strong encryption on all files on the hard disk.

C.

Run anti-virus software on all disks associated with this system.

D.

Unplug the computer network cable and/or disable the computer’s wireless NIC.

Buy Now
Questions 16

You have just checked the balance in your bank account by logging into your bank’s Web site. Which protocol was most likely used for the transmission of your information?

Options:

A.

IMAPS

B.

HTTPS

C.

POP

D.

FTPS

Buy Now
Questions 17

You are configuring an e-mail client to connect to your e-mail account. Which of following is required to set up the e-mail account?

Options:

A.

An HTTP address

B.

An FTP address

C.

ADNSserveraddress

D.

APOP3 address

Buy Now