1D0-61C Exam Questions - Online Test


1D0-61C Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

certleader.com

Proper study guides for Update CIW CIW Network Technology Associate certified begins with CIW 1D0-61C preparation products which designed to deliver the High value 1D0-61C questions by making you pass the 1D0-61C test at your first time. Try the free 1D0-61C demo right now.

NEW QUESTION 1
Ron has an older computer to which he frequently downloads and saves company files. He recently noticed that he was running low on disk space and decided to delete many old files that he no longer needed. He now notices that it takes a long time to open or save documents to his hard drive. Which maintenance task can help?

  • A. Disk defragmentation
  • B. chkdsk command
  • C. fdisk command
  • D. Disk cleanup

Answer: A

NEW QUESTION 2
Mobile computing has become a common necessity for both personal and business transactions. Which device has features similar to a smartphone but usually does not have telephone capabilities?

  • A. Portable media player
  • B. Netbook
  • C. Laptop
  • D. Tablet

Answer: D

NEW QUESTION 3
You want to enable wireless security on your Android device and your Linux system. Which of the following is a disadvantage of Wired Equivalent Privacy (WEP)?

  • A. It enables MAC address filtering.
  • B. It is easily compromised by hackers.
  • C. It only supports 56-bit symmetric-key encryption.
  • D. It is based on the outdated 802.lla wireless standard.

Answer: B

NEW QUESTION 4
On your Windows laptop, you store all your vacation photos and your entire digital music library. Concerned about data loss, you perform frequent backups. Your laptop has recently been stolen and you need to restore your files to a desktop computer. Which Windows tool would you use to recover and set up the saved copies of your files onto your desktop computer?

  • A. Backup and Restore
  • B. Backup Recovery
  • C. System Recovery
  • D. System Restore

Answer: A

NEW QUESTION 5
Which of the following is a disadvantage of implementing a Bring Your Own Device (BYOD) policy in a company?

  • A. Increased cost for licensing mobile applications
  • B. Configuring the corporate e-mail server to work with mobile devices
  • C. Inability to control access to company data if the device is stolen or lost
  • D. Providing training for employees on how to use mobile devices with company applications

Answer: C

NEW QUESTION 6
Security attacks can vary greatly. Which type of attack is characterized as an attempt to trick an individual into revealing confidential or private information?

  • A. Trojan
  • B. Spoofing
  • C. Man in the middle
  • D. Social engineering

Answer: D

NEW QUESTION 7
Which security issue is most closely associated with wireless networks?

  • A. Spoofing
  • B. Wardriving
  • C. Eavesdropping
  • D. Man-in-the-middle

Answer: B

NEW QUESTION 8
Which of the following is a security threat commonly associated with cloud-based services?

  • A. Malware
  • B. Phishing
  • C. Hypervisor vulnerabilities
  • D. Operating system vulnerabilities

Answer: C

NEW QUESTION 9
Patrick visits his teenage daughter’s social media page and discovers several offensive posts about one of her classmates. After speaking with his daughter, Patrick learns that several other girls in her class are upset with the classmate and have been posting, texting and e-mailing others about the girl. What is the best way for Patrick to help his daughter understand cyberbullying?

  • A. He should advise his daughter to ignore the posts, texts and c-mails.
  • B. He should explain to his daughter that she is participating in the bullying by accepting others’posts, texts and c-mails.
  • C. He should explain to his daughter that the Internet embraces freedom of speech, and anyone is allowed to write anything.
  • D. He should advise his daughter to delete all the posts, texts and c-mails she has received, as well as any new ones that appear.

Answer: B

NEW QUESTION 10
John is the network administrator for a small company. The company’s network equipment has become outdated, and John has been asked to recommend a plan to update the company’s infrastructure. John has read extensively about the many advantages of using cloud-based services. Which of the following is an advantage of cloud-based services that John could cite to support his recommendation?

  • A. Unlimited service options and choices
  • B. Higher security in a cloud-based environment
  • C. Elimination of need for high-speed Internet connection
  • D. Elimination of equipment purchase and maintenance

Answer: D

NEW QUESTION 11
When using cloud-based services to host company data, a company’s disaster recovery plan should include strategies for:

  • A. Creating redundancy and ensuring there is an exclusive contract with the cloud service provider.
  • B. Distributing data and software services across multiple cloud service providers.
  • C. Creating redundancy and using multiple cloud service providers.
  • D. Using a single well-established cloud service provider.

Answer: C

NEW QUESTION 12
Sally is a network technician at Acme Corporation. She has been directed to configure the network adapter for a company laptop so that it can be used to connect to the company network and the Internet. What is one of the required TCP/IP settings that she will need to configure?

  • A. MAC address
  • B. Default gateway
  • C. Workstation name
  • D. Loopback address

Answer: B

NEW QUESTION 13
A friend has called you about a possible computer problem because her computer is acting strangely. Sounds play unexpectedly, the monitor turns off suddenly, the hard-drive light flashes constantly, the computer sometimes reboots itself without warning. When you inspect your friend’s system, you notice that several ports are open. Which of the following is most likely the cause of these symptoms?

  • A. The computer has been infected with a polymorphic virus.
  • B. The computer is experiencing a denial-of-service attack.
  • C. The computer has been infected with an illicit server.
  • D. The computer has been infected by a worm.

Answer: C

NEW QUESTION 14
The capabilities of cellular networks have improved greatly since theiroriginal development for analogvoice phone calls. Most recently, fourth-generation (4G) wireless supports a variety of data-intensive needs.
A benefit of 4G networks is that they:

  • A. Use spread-spectrum technology to ensure high transmission rates.
  • B. Provide fast transmission rates equivalent to DSL or broadband-cable.
  • C. Provide fast transmission rates equivalent to high-speed dial-up connections.
  • D. Enable bandwidth throttling, allowing the user access to unrestricted download speeds.

Answer: B

NEW QUESTION 15
Three hardware devices need to communicate with the CPU simultaneously. Which of the following will each device need to issue?

  • A. DMA request
  • B. CON request
  • C. Interrupt request (IRQ)
  • D. Input/output request (I/O)

Answer: C

NEW QUESTION 16
Henry is the network manager at XYY Corporation, a large manufacturing company that competes in the global market. The company’s computing environment is extremely complex and includes several proprietary software systems, all of which require custom configuration of network devices to operate correctly. The company’s executive management team believes that they can benefit by switching the company over to any cloud-based service. Henry disagrees.
What is a disadvantage of cloud-based services that Henry can cite to support his position?

  • A. Cloud-based services provide no maintenance or support.
  • B. Cloud-based services are typically more costly than in-house solutions.
  • C. The company must typically purchase additional servers to support connections to these types of cloud-based service providers.
  • D. Cloud-based services are typically more limited in offerings and configurations than the company currently supports in-house.

Answer: D

NEW QUESTION 17
You are distributing a large video game file using BitTorrent. First, you upload the initial file and make it available via a central server called a tracker. Other users can then connect to the tracker and download the file. Each user who downloads the file makesit available to other users todownload. The use of BitTorrent significantly reduces the original provider’s hardware and bandwidth resource costs. BitTorrent is an example of what type of network?

  • A. Centralized network
  • B. Client-server network
  • C. Peer-to-peer (P2P) network
  • D. Virtual private network (VPN)

Answer: C

NEW QUESTION 18
Which of the following is generally a component of a BYOD policy?

  • A. Scope of control
  • B. Insurance on devices
  • C. Maintenance provision
  • D. Device replacement or upgrade

Answer: A

NEW QUESTION 19
ABC Company develops itsowndatabase applications. ABC is considering migrating to cloud services to accommodate the company’s growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?

  • A. Cloud-only solution
  • B. Regional systems solution
  • C. Location systems solution
  • D. Multiple cloud-service providers

Answer: C

NEW QUESTION 20
Which term describes the practice of actively collecting wireless networking data from companies and individuals?

  • A. War driving
  • B. Spear phishing
  • C. Dictionary attack
  • D. Social engineering

Answer: A

NEW QUESTION 21
Which term describes a compact personal computer that relies on a touch screen forinput, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity?

  • A. Tablet
  • B. Laptop
  • C. Netbook
  • D. Portable media player

Answer: A

NEW QUESTION 22
Lisa is traveling on company business. She has a company-issued smartphone with 4G access. Her hotel does not provide Internet access. What advantage does4G provide to help her access the Internet?

  • A. She can use a 4G mobile hotspot device with her phone to connect her laptop to Wi-Fi.
  • B. She can use the 4G phone to establish a VPN connection into the company network.
  • C. She can use the41G phone to call and locate a public location that provides free Wi-Fl.
  • D. She can use her41G phone’s GPS to identify another hotel that provides in-room Internet access.

Answer: A

NEW QUESTION 23
Gwen works for a small company where she has been asked to find a cost-effective option for providing comprehensive customer service. The finance, technical support, sales and customer service departments all need to share information about their customers. Gwen is considering adoption of a customer relationship management (CRM) application. Which of the following would be the most cost-effective solution?

  • A. She can purchase a new server, then create and maintain the CRM in-house.
  • B. She can outsource all customer service so the company can focus on product development.
  • C. She can contract with a cloud service provider to host the CRM that her company’s employees can access.
  • D. She can hire a programmer to develop and maintain the CRM specific to her company’s needs, then have a service provider host the application.

Answer: C

NEW QUESTION 24
Which type of attack involves the installation of malicious code on personal computers or servers that redirects Internet traffic from a legitimate Web site to an identical-looking but malicious imposter Web site?

  • A. Pharming
  • B. Spoofing
  • C. Phishing
  • D. Replay

Answer: A

NEW QUESTION 25
Carol is experiencing read/write errors when trying to save files on her Windows-based laptop. To correct the issue, she could consider performing which of the following maintenance tasks?

  • A. Disk cleanup
  • B. fsck command
  • C. chkdsk command
  • D. Disk defragmentation

Answer: C

NEW QUESTION 26
......

P.S. Surepassexam now are offering 100% pass ensure 1D0-61C dumps! All 1D0-61C exam questions have been updated with correct answers: https://www.surepassexam.com/1D0-61C-exam-dumps.html (59 New Questions)