Pass the CIW Security Analyst 1D0-610 Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

Marsha has been hired by XYZ, Inc., to update the company Web site. Marsha discovers that the existing Web pages were structured using tables. Marsha needs to explain to XYZ why the Web site needs to be recoded in HTML5 with CSS controlling the structure of the document. What is the most important reason for using HTML5 and CSS?

Options:

A.

The updates will increase user traffic to the site.


B.

The updates will improve the overall look and feel of the Web site.


C.

The Web site can be interpreted by any HTML5-compliant browser, including mobile devices.


D.

The Web site will rank higher in many search engines results, as long as the search engine bot recognizes the code.


Expert Solution
Questions # 2:

You are a small-business owner and would like to encourage employees to bring their own devices (BYOD) to work. Which of the following can help reduce the security risks associated with a BYOD implementation?

Options:

A.

Expense accounts


B.

Acceptable use policy


C.

End user license agreement


D.

In-house device maintenance


Expert Solution
Questions # 3:

Gabby suspects that an attacker has gained control of her system. Which of the following is the most appropriate action for her to take?

Options:

A.

Shut down the computer.


B.

Enable strong encryption on all files on the hard disk.


C.

Run anti-virus software on all disks associated with this system.


D.

Unplug the computer network cable and/or disable the computer’s wireless NIC.


Expert Solution
Questions # 4:

Which Web-based validation tool is used to validate HTML documents?

Options:

A.

www.vischeck.com


B.

www.jigsaw.w3.org


C.

www.validator.w3.org


D.

www.cynthiasays.com


Expert Solution
Questions # 5:

Security attacks can vary greatly. Which type of attack is characterized as an attempt to trick an individual into revealing confidential or private information?

Options:

A.

Trojan


B.

Spoofing


C.

Man in the middle


D.

Social engineering


Expert Solution
Questions # 6:

Irena is reviewing several promotional product videos from her company’s marketing department before they are published on the company’s Web site. The videos are in RealMedia format, but they do not open in Irena’s Windows Media Player. What should Irena do in order to view the videos?

Options:

A.

Contact her company’s Technical Support department and schedule service for her computer.


B.

Convert the video files to the WMV format, because RealMedia files will not play in Windows Media Player.


C.

Upload the videos to the Web server to be viewed through Windows Media Player because they will not play from a local computer.


D.

Decompress the files before attempting to play them in Windows Media Player, because RealMedia files are compressed for uploading/downloading.


Expert Solution
Questions # 7:

Virtualization software transforms the hardware resources of a physical computer to create a fully functional virtual computer that can run its own operating systems and applications. In addition to the CPU and RAM, which hardware resources are used by virtualization software?

Options:

A.

Hard disk and USB devices


B.

Hard disk and network devices


C.

Virtual hard disk and network devices


D.

Network devices and secondary storage devices


Expert Solution
Questions # 8:

Lisa is traveling on company business. She has a company-issued smartphone with 4G access. Her hotel does not provide Internet access. What advantage does 4G provide to help her access the Internet?

Options:

A.

She can use a 4G mobile hotspot device with her phone to connect her laptop to Wi-Fi.


B.

She can use the 4G phone to establish a VPN connection into the company network.


C.

She can use the 4G phone to call and locate a public location that provides free Wi-Fl.


D.

She can use her 4G phone’s GPS to identify another hotel that provides in-room Internet access.


Expert Solution
Questions # 9:

A friend just sent you a link to a Facebook page with information that you find very useful. You want to be able to recall the site in the future from your desktop computer, or from your mobile device while away from your desk. Which is the best approach?

Options:

A.

Memorize the URL so you can pull up the site in any browser such as Chrome, Firefox or Internet Explorer.


B.

Add the link to a cloud-based bookmark service such as Delicious or Google Bookmarks.


C.

Manually enter the Web address into any and all browsers on all of your devices.


D.

Pull up the message with the link any time you want to view the site.


Expert Solution
Questions # 10:

Philip creates a Web form in HTNL5, but the data will not process. He has the method attribute included in the <form> element. What is missing?

Options:

A.

The type attribute of the <form> element


B.

The type attribute of the <input> element


C.

The action attribute of the <form> element


D.

The action attribute of the <input> element


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions