Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

CIW 1D0-61C Network Technology Associate Exam Practice Test

Demo: 8 questions
Total 59 questions

Network Technology Associate Questions and Answers

Question 1

You are distributing a large video game file using BitTorrent. First, you upload the initial file and make it available via a central server called a tracker. Other users can then connect to the tracker and download the file. Each user who downloads the file makes it available to other users to download. The use of BitTorrent significantly reduces the original provider’s hardware and bandwidth resource costs. BitTorrent is an example of what type of network?

Options:

A.

Centralized network

B.

Client-server network

C.

Peer-to-peer (P2P) network

D.

Virtual private network (VPN)

Question 2

Disaster recovery planning is considered a best practice for all organizations. It is even more important when cloud-computing services are used. Which of the following should be included as part of a disaster recovery plan for companies that use cloud-based services?

Options:

A.

Company organizational chart

B.

Malware and anti-virus software updates

C.

Service-level agreement with a cloud-provider

D.

Inventory of services not dependent on the cloud provider

Question 3

Gwen works for a small company where she has been asked to find a cost-effective option for providing comprehensive customer service. The finance, technical support, sales and customer service departments all need to share information about their customers. Gwen is considering adoption of a customer relationship management (CRM) application. Which of the following would be the most cost-effective solution?

Options:

A.

She can purchase a new server, then create and maintain the CRM in-house.

B.

She can outsource all customer service so the company can focus on product development.

C.

She can contract with a cloud service provider to host the CRM that her company’s employees can access.

D.

She can hire a programmer to develop and maintain the CRM specific to her company’s needs, then have a service provider host the application.

Question 4

You have recently purchased a new wireless router. You would like to configure a name for your wireless network so that you can easily identify it when scanning available wireless networks.

Which term describes this wireless network device name?

Options:

A.

Default gateway

B.

Wireless access point (AP)

C.

Access Point Identifier (API)

D.

Service Set Identifier (SSID)

Question 5

Which of the following is generally a component of a BYOD policy?

Options:

A.

Scope of control

B.

Insurance on devices

C.

Maintenance provision

D.

Device replacement or upgrade

Question 6

Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify?

Options:

A.

Direct Sequence Spread Spectrum (DSSS) signal

B.

Media Access Control (MAC) address

C.

Wi-Fi Protected Access 2 (WPA2)

D.

Service Set Identifier (SSID)

Question 7

Mobile computing has become a common necessity for both personal and business transactions. Which device has features similar to a smartphone but usually does not have telephone capabilities?

Options:

A.

Portable media player

B.

Netbook

C.

Laptop

D.

Tablet

Question 8

Patrick visits his teenage daughter’s social media page and discovers several offensive posts about one of her classmates. After speaking with his daughter, Patrick learns that several other girls in her class are upset with the classmate and have been posting, texting and e-mailing others about the girl. What is the best way for Patrick to help his daughter understand cyber bullying?

Options:

A.

He should advise his daughter to ignore the posts, texts and c-mails.

B.

He should explain to his daughter that she is participating in the bullying by accepting others’posts, texts and c-mails.

C.

He should explain to his daughter that the Internet embraces freedom of speech, and anyone is allowed to write anything.

D.

He should advise his daughter to delete all the posts, texts and c-mails she has received, as well as any new ones that appear.

Demo: 8 questions
Total 59 questions