1D0-61C Exam - CIW Network Technology Associate

certleader.com

Virtual of 1D0-61C free practice questions materials and free practice exam for CIW certification for client, Real Success Guaranteed with Updated 1D0-61C pdf dumps vce Materials. 100% PASS CIW Network Technology Associate exam Today!

Online 1D0-61C free questions and answers of New Version:

NEW QUESTION 1
You have recently purchased a new wireless router. You would like to configure a name for your wireless network so that you can easily identify it when scanning available wireless networks.
Which term describes this wireless network device name?

  • A. Default gateway
  • B. Wireless access point (AP)
  • C. Access Point Identifier (API)
  • D. Service Set Identifier (SSID)

Answer: D

NEW QUESTION 2
Which of the following computer system maintenance tasks can help improve file access performance?

  • A. Use a SCSI drive instead of a SATA drive
  • B. Use a SATA drive instead of an EIDE drive
  • C. Defragment the drive using the following command: fdisk -d -w c:/
  • D. Defragment the drive using the following command: defrag c: -w

Answer: D

NEW QUESTION 3
Disaster recovery planning is considered a best practice for all organizations. It is even more important when cloud-computing services are used. Which of the following should be included as part of a disaster recovery plan for companies that use cloud-based services?

  • A. Company organizational chart
  • B. Malware and anti-virus software updates
  • C. Service-level agreement with a cloud-provider
  • D. Inventory of services not dependent on the cloud provider

Answer: C

NEW QUESTION 4
Which term describes a compact personal computer that relies on a touch screen forinput, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity?

  • A. Tablet
  • B. Laptop
  • C. Netbook
  • D. Portable media player

Answer: A

NEW QUESTION 5
When a PC computer device wants to communicate with the processor, which system resource does it use?

  • A. I/O
  • B. DMA
  • C. PIO
  • D. IRQ

Answer: D

NEW QUESTION 6
What is the biggest security concern with wireless networks?

  • A. Firewall software is not available for access points.
  • B. Wireless encryption algorithms must be implemented.
  • C. Wireless networks do not support intrusion detection.
  • D. Wireless networks do not support encryption via an access point.

Answer: B

NEW QUESTION 7
Ron has an older computer to which he frequently downloads and saves company files. He recently noticed that he was running low on disk space and decided to delete many old files that he no longer needed. He now notices that it takes a long time to open or save documents to his hard drive. Which maintenance task can help?

  • A. Disk defragmentation
  • B. chkdsk command
  • C. fdisk command
  • D. Disk cleanup

Answer: A

NEW QUESTION 8
Configuring a wireless network involves several steps. Which of the following is a task that should be performed to configure and connect to a wireless network?

  • A. Configure a certificate authority and configure the trust settings.
  • B. Configure the wireless AP’s SSID, encryption level and shared key.
  • C. Connect your computer to the same network hub as the wireless AP.
  • D. Connect your computer to the same network switch as the wireless AP.

Answer: B

NEW QUESTION 9
You want to enable wireless security on your Android device and your Linux system. Which of the following is a disadvantage of Wired Equivalent Privacy (WEP)?

  • A. It enables MAC address filtering.
  • B. It is easily compromised by hackers.
  • C. It only supports 56-bit symmetric-key encryption.
  • D. It is based on the outdated 802.lla wireless standard.

Answer: B

NEW QUESTION 10
A friend has called you about a possible computer problem because her computer is acting strangely. Sounds play unexpectedly, the monitor turns off suddenly, the hard-drive light flashes constantly, the computer sometimes reboots itself without warning. When you inspect your friend’s system, you notice that several ports are open. Which of the following is most likely the cause of these symptoms?

  • A. The computer has been infected with a polymorphic virus.
  • B. The computer is experiencing a denial-of-service attack.
  • C. The computer has been infected with an illicit server.
  • D. The computer has been infected by a worm.

Answer: C

NEW QUESTION 11
Which term describes the practice of actively collecting wireless networking data from companies and individuals?

  • A. War driving
  • B. Spear phishing
  • C. Dictionary attack
  • D. Social engineering

Answer: A

NEW QUESTION 12
You are a small-business owner and would like to encourage employees to bring their own devices (BYOD) to work. Which of the following can help reduce the security risks associated with a BYOD implementation?

  • A. Expense accounts
  • B. Acceptable use policy
  • C. End user license agreement
  • D. In-house device maintenance

Answer: B

NEW QUESTION 13
Patrick visits his teenage daughter’s social media page and discovers several offensive posts about one of her classmates. After speaking with his daughter, Patrick learns that several other girls in her class are upset with the classmate and have been posting, texting and e-mailing others about the girl. What is the best way for Patrick to help his daughter understand cyberbullying?

  • A. He should advise his daughter to ignore the posts, texts and c-mails.
  • B. He should explain to his daughter that she is participating in the bullying by accepting others’posts, texts and c-mails.
  • C. He should explain to his daughter that the Internet embraces freedom of speech, and anyone is allowed to write anything.
  • D. He should advise his daughter to delete all the posts, texts and c-mails she has received, as well as any new ones that appear.

Answer: B

NEW QUESTION 14
Your company is investigating the possibility of moving its customer service management system to a cloud service provider. The sales rep for the cloud service provider has presented many advantages that would benefit your company. What would be a potential drawback of moving the CRM from your current in-house solution?

  • A. If your company’s Internet service is interrupted for any reason at any time, you will not have access to the CRM.
  • B. More company employees will have access to the system, which could result in unauthorized access to confidential data
  • C. Special equipment will need to be purchased and maintained in your office in order to access and maintain the CRM once it is migrated to the hosted cloud service.
  • D. Migrating the CRM to the cloud service provider will eliminate several jobs in your customer service department because their job roles will no longer be required.

Answer: A

NEW QUESTION 15
Which of the following is a disadvantage of implementing a Bring Your Own Device (BYOD) policy in a company?

  • A. Increased cost for licensing mobile applications
  • B. Configuring the corporate e-mail server to work with mobile devices
  • C. Inability to control access to company data if the device is stolen or lost
  • D. Providing training for employees on how to use mobile devices with company applications

Answer: C

NEW QUESTION 16
Carol is experiencing read/write errors when trying to save files on her Windows-based laptop. To correct the issue, she could consider performing which of the following maintenance tasks?

  • A. Disk cleanup
  • B. fsck command
  • C. chkdsk command
  • D. Disk defragmentation

Answer: C

NEW QUESTION 17
Selena has run out of memory on her phone’s SD card. She has decided to store the files she has accumulated on a third-party cloud service provider’s drives. Which of the following is a typical issue that she may encounter?

  • A. The files become corrupted due to an attack from a hacker botnet.
  • B. The files become unavailable whenever Internet connectivity is lost.
  • C. The files become unavailable because they are being shared with other users.
  • D. The files become corrupted because the provider uses a proprietary compression algorithm during transit.

Answer: B

NEW QUESTION 18
Which of the following is generally a component of a BYOD policy?

  • A. Scope of control
  • B. Insurance on devices
  • C. Maintenance provision
  • D. Device replacement or upgrade

Answer: A

NEW QUESTION 19
Carlos is the Information Technology (IT) administrator for a small company. Over the past year, employees have been using their personal mobile devices and smartphones for business use. This has reduced costs of purchasing new devices for employees. Carlos is now considering whether he should stop supplying employees with company phones and instead require all employees to use their personal smartphones for work. How can Carlos address the most significant security vulnerability?

  • A. Develop a robust app to push security updates out to the various mobile OS devices
  • B. Create an employee policy that requires employees to keep phones updated to the latest technology
  • C. Create a policy that specifies acceptable use, ensuring security measures are in place for mobile devices
  • D. Mandate that employees switch to the company’s mobile service provider to ensure security policies are enforced

Answer: C

NEW QUESTION 20
Jose is experiencing performance problems with his notebook computer that he purchased a year ago. Upon discussing this issue with him, you learn that he has never deleted any temporary files since owning the device. What can Jose do to fix this problem most efficiently?

  • A. Reformat his hard drive.
  • B. Use the Windows chkdsk utility.
  • C. Use the Windows Disk Cleanup utility.
  • D. Back up his computer and delete the active partition.

Answer: C

NEW QUESTION 21
......

Recommend!! Get the Full 1D0-61C dumps in VCE and PDF From DumpSolutions.com, Welcome to Download: https://www.dumpsolutions.com/1D0-61C-dumps/ (New 59 Q&As Version)