Massive Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

CIW 1D0-61C Network Technology Associate Exam Practice Test

Demo: 8 questions
Total 59 questions

Network Technology Associate Questions and Answers

Question 1

Mobile computing has become a common necessity for both personal and business transactions. Which device has features similar to a smartphone but usually does not have telephone capabilities?

Options:

A.

Portable media player

B.

Netbook

C.

Laptop

D.

Tablet

Question 2

Henry is the network manager at XYY Corporation, a large manufacturing company that competes in the global market. The company’s computing environment is extremely complex and includes several proprietary software systems, all of which require custom configuration of network devices to operate correctly. The company’s executive management team believes that they can benefit by switching the company over to any cloud-based service. Henry disagrees.

What is a disadvantage of cloud-based services that Henry can cite to support his position?

Options:

A.

Cloud-based services provide no maintenance or support.

B.

Cloud-based services are typically more costly than in-house solutions.

C.

The company must typically purchase additional servers to support connections to these types of cloud-based service providers.

D.

Cloud-based services are typically more limited in offerings and configurations than the company currently supports in-house.

Question 3

Jose is experiencing performance problems with his notebook computer that he purchased a year ago. Upon discussing this issue with him, you learn that he has never deleted any temporary files since owning the device. What can Jose do to fix this problem most efficiently?

Options:

A.

Reformat his hard drive.

B.

Use the Windows chkdsk utility.

C.

Use the Windows Disk Cleanup utility.

D.

Back up his computer and delete the active partition.

Question 4

Which type of attack involves the installation of malicious code on personal computers or servers that redirects Internet traffic from a legitimate Web site to an identical-looking but malicious imposter Web site?

Options:

A.

Pharming

B.

Spoofing

C.

Phishing

D.

Replay

Question 5

Sally is a network technician at Acme Corporation. She has been directed to configure the network adapter for a company laptop so that it can be used to connect to the company network and the Internet. What is one of the required TCP/IP settings that she will need to configure?

Options:

A.

MAC address

B.

Default gateway

C.

Workstation name

D.

Loopback address

Question 6

Gwen works for a small company where she has been asked to find a cost-effective option for providing comprehensive customer service. The finance, technical support, sales and customer service departments all need to share information about their customers. Gwen is considering adoption of a customer relationship management (CRM) application. Which of the following would be the most cost-effective solution?

Options:

A.

She can purchase a new server, then create and maintain the CRM in-house.

B.

She can outsource all customer service so the company can focus on product development.

C.

She can contract with a cloud service provider to host the CRM that her company’s employees can access.

D.

She can hire a programmer to develop and maintain the CRM specific to her company’s needs, then have a service provider host the application.

Question 7

Which of the following is a disadvantage of implementing a Bring Your Own Device (BYOD) policy in a company?

Options:

A.

Increased cost for licensing mobile applications

B.

Configuring the corporate e-mail server to work with mobile devices

C.

Inability to control access to company data if the device is stolen or lost

D.

Providing training for employees on how to use mobile devices with company applications

Question 8

Wireless networks are subject to more security issues than standard wired networks. Which wireless security protocol can prevent unauthorized devices from connecting to the wireless network?

Options:

A.

WPA2

B.

RSA

C.

AES

D.

DES

Demo: 8 questions
Total 59 questions