Certified Internet Web (CIW) Professional Practice Exam

Disable ads (and more) with a membership for a one time $2.99 payment

Prepare for the Certified Internet Web (CIW) Professional Exam. Test your knowledge with a comprehensive quiz featuring detailed questions, hints, and explanations. Get exam-ready today!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


What is the most likely reason an email with an attachment named salesnumbers.exe was filtered into a spam folder?

  1. The attachment's file size exceeds the size limits of the email filter policy.

  2. The file name of the attached file exceeds the file name length of the filter policy.

  3. Messages from remote offices are blocked on internal email.

  4. File attachments with an .exe extension may contain malicious code.

The correct answer is: File attachments with an .exe extension may contain malicious code.

Filtering an email with an attachment named salesnumbers.exe into a spam folder most likely occurs due to the nature of the file extension. Executable files, indicated by the .exe extension, are commonly associated with software applications and have the capability to run code on a computer. This can pose significant security risks, as malicious software often uses this type of file to deliver malware, viruses, or other harmful programs. Email filtering systems are designed to protect users from potential threats by identifying and blocking attachments that could be dangerous. Given the prevalence of cyber threats and the common practice of using .exe files to spread malware, many email systems classify emails containing these attachments as spam or potential threats to enhance user security. While the other options mention technical aspects of email filtering policies, they don’t directly address the primary concern regarding security associated with executable files. The focus on the .exe extension aligns with the broader cybersecurity protocols that prioritize safeguarding systems from harmful software.