Certbus > CIW > CIW Internet Business Associate > 1D0-61C > 1D0-61C Online Practice Questions and Answers

1D0-61C Online Practice Questions and Answers

Questions 4

Which of the following is generally a component of a BYOD policy?

A. Scope of control

B. Insurance on devices

C. Maintenance provision

D. Device replacement or upgrade

Browse 59 Q&As
Questions 5

The capabilities of cellular networks have improved greatly since their original development for analog voice phone calls. Most recently, fourth-generation (4G) wireless supports a variety of data-intensive needs.

A benefit of 4G networks is that they:

A. Use spread-spectrum technology to ensure high transmission rates.

B. Provide fast transmission rates equivalent to DSL or broadband-cable.

C. Provide fast transmission rates equivalent to high-speed dial-up connections.

D. Enable bandwidth throttling, allowing the user access to unrestricted download speeds.

Browse 59 Q&As
Questions 6

Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to the computer lab to give the final exam. As an alternative, he asked students to bring their own devices (BYOD) and connect to the college's Wi-Fi for network access. What security risk is associated with this implementation?

A. Inability for students to share files

B. Inability for students to back up user files

C. Student devices sending unsecured data

D. Student devices being more susceptible to malware

Browse 59 Q&As
Questions 7

When using cloud-based services to host company data, a company's disaster recovery plan should include strategies for:

A. Creating redundancy and ensuring there is an exclusive contract with the cloud service provider.

B. Distributing data and software services across multiple cloud service providers.

C. Creating redundancy and using multiple cloud service providers.

D. Using a single well-established cloud service provider.

Browse 59 Q&As
Questions 8

On your Windows laptop, you store all your vacation photos and your entire digital music library. Concerned about data loss, you perform frequent backups. Your laptop has recently been stolen and you need to restore your files to a desktop computer. Which Windows tool would you use to recover and set up the saved copies of your files onto your desktop computer?

A. Backup and Restore

B. Backup Recovery

C. System Recovery

D. System Restore

Browse 59 Q&As
Questions 9

Configuring a wireless network involves several steps. Which of the following is a task that should be performed to configure and connect to a wireless network?

A. Configure a certificate authority and configure the trust settings.

B. Configure the wireless AP's SSID, encryption level and shared key.

C. Connect your computer to the same network hub as the wireless AP.

D. Connect your computer to the same network switch as the wireless AP.

Browse 59 Q&As
Questions 10

What is the distinguishing difference between a LAN and WAN?

A. A LAN is a group of networked computers within a confined geographic area.

B. A WAN is a group of networked computers within a confined geographic area.

C. A LAN typically provides slower network connection speeds than a WAN.

D. A WAN is commonly used for intra-office communication.

Browse 59 Q&As
Questions 11

ABC Company develops its own database applications. ABC is considering migrating to cloud services to accommodate the company's growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?

A. Cloud-only solution

B. Regional systems solution

C. Location systems solution

D. Multiple cloud-service providers

Browse 59 Q&As
Questions 12

You are a computer technician supporting a small 15-computer Internet lab. The computers are regularly used to browse the Internet and download files. Users have recently complained that they receive error messages saying the hard disk is full or out of space. You suspect this is a result of a large amount of temporary Internet files. Which of the following is a way to easily delete all the temporary Internet files?

A. Disk cleanup

B. fdisk command

C. chkdsk command

D. Disk defragmentation

Browse 59 Q&As
Questions 13

You want to enable wireless security on your Android device and your Linux system. Which of the following is a disadvantage of Wired Equivalent Privacy (WEP)?

A. It enables MAC address filtering.

B. It is easily compromised by hackers.

C. It only supports 56-bit symmetric-key encryption.

D. It is based on the outdated 802.lla wireless standard.

Browse 59 Q&As
Questions 14

You want to restrict host access to a wireless access point. What is the best way to do this?

A. Enable MAC address filtering at each host.

B. Log in to the access point and configure features, such as changing the SSID.

C. Change the Direct Sequence Spread Spectrum (DSSS) signal at both the access point and each hosts NIC.

D. Install software on the host you want to limit, then use a Web browser to log in to the host and configure it with the necessary settings to use the access point.

Browse 59 Q&As
Questions 15

Lisa is traveling on company business. She has a company-issued smartphone with 4G access. Her hotel does not provide Internet access. What advantage does 4G provide to help her access the Internet?

A. She can use a 4G mobile hotspot device with her phone to connect her laptop to Wi-Fi.

B. She can use the 4G phone to establish a VPN connection into the company network.

C. She can use the41G phone to call and locate a public location that provides free Wi-Fl.

D. She can use her41G phone's GPS to identify another hotel that provides in-room Internet access.

Browse 59 Q&As
Questions 16

You are distributing a large video game file using BitTorrent. First, you upload the initial file and make it available via a central server called a tracker. Other users can then connect to the tracker and download the file. Each user who downloads the file makes it available to other users to download. The use of BitTorrent significantly reduces the original provider's hardware and bandwidth resource costs. BitTorrent is an example of what type of network?

A. Centralized network

B. Client-server network

C. Peer-to-peer (P2P) network

D. Virtual private network (VPN)

Browse 59 Q&As
Questions 17

You are a small-business owner and would like to encourage employees to bring their own devices (BYOD) to work. Which of the following can help reduce the security risks associated with a BYOD implementation?

A. Expense accounts

B. Acceptable use policy

C. End user license agreement

D. In-house device maintenance

Browse 59 Q&As
Questions 18

Jenny recently switched from broadband cable Internet to ADSL service with her local phone company.

To economize, she chose the self-installation option. It appears that her ADSL modem is not allowing her to connect to the Internet. Which setting should she check first?

A. Loopback address

B. Software version

C. Default gateway

D. Device name

Browse 59 Q&As
Exam Code: 1D0-61C
Exam Name: CIW Network Technology Associate
Last Update: Apr 20, 2024
Questions: 59 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99