Vcehome > CIW > CIW Internet Business Associate > 1D0-61C > 1D0-61C Online Practice Questions and Answers

1D0-61C Online Practice Questions and Answers

Questions 4

Selena has run out of memory on her phone's SD card. She has decided to store the files she has accumulated on a third-party cloud service provider's drives. Which of the following is a typical issue that she may encounter?

A. The files become corrupted due to an attack from a hacker botnet.

B. The files become unavailable whenever Internet connectivity is lost.

C. The files become unavailable because they are being shared with other users.

D. The files become corrupted because the provider uses a proprietary compression algorithm during transit.

Browse 59 Q&As
Questions 5

Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to the computer lab to give the final exam. As an alternative, he asked students to bring their own devices (BYOD) and connect to the college's Wi-Fi for network access. What security risk is associated with this implementation?

A. Inability for students to share files

B. Inability for students to back up user files

C. Student devices sending unsecured data

D. Student devices being more susceptible to malware

Browse 59 Q&As
Questions 6

Which of the following is a drawback to using Wired Equivalent Privacy (WEP)?

A. Wireless network overhead is excessive.

B. Symmetric-key encryption is susceptible to cracking.

C. The number of devices that can communicate using WEP is limited.

D. Encryption and decryption speeds are slower compared to other protocols.

Browse 59 Q&As
Questions 7

Acme Corp. is a small manufacturing company. To reduce IT infrastructure costs, it uses cloud- based services extensively and strives to have the least amount of IT equipment onsite. Last year, Acme suffered a failure that resulted in significant down time and data loss. Management has decided to implement a continuous data protection (CDP) solution. Which type of CDP solution best fits Acme's situation?

A. Cloud-only solution

B. Local systems solution

C. Distributed network services provider

D. Contracted network services provider

Browse 59 Q&As
Questions 8

Patrick visits his teenage daughter's social media page and discovers several offensive posts about one of her classmates. After speaking with his daughter, Patrick learns that several other girls in her class are upset with the classmate and have been posting, texting and e-mailing others about the girl. What is the best way for Patrick to help his daughter understand cyber bullying?

A. He should advise his daughter to ignore the posts, texts and c-mails.

B. He should explain to his daughter that she is participating in the bullying by accepting others'posts, texts and c-mails.

C. He should explain to his daughter that the Internet embraces freedom of speech, and anyone is allowed to write anything.

D. He should advise his daughter to delete all the posts, texts and c-mails she has received, as well as any new ones that appear.

Browse 59 Q&As
Questions 9

Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify?

A. Direct Sequence Spread Spectrum (DSSS) signal

B. Media Access Control (MAC) address

C. Wi-Fi Protected Access 2 (WPA2)

D. Service Set Identifier (SSID)

Browse 59 Q&As
Questions 10

You are a computer technician supporting a small 15-computer Internet lab. The computers are regularly used to browse the Internet and download files. Users have recently complained that they receive error messages saying the hard disk is full or out of space. You suspect this is a result of a large amount of temporary Internet files. Which of the following is a way to easily delete all the temporary Internet files?

A. Disk cleanup

B. fdisk command

C. chkdsk command

D. Disk defragmentation

Browse 59 Q&As
Questions 11

Which type of attack is a form of social engineering in which an attacker attempts to steal personal or confidential information by sending e-mail that lures unsuspecting victims to log in to an authentic-looking but imposter Web site?

A. Replay

B. Phishing

C. Spoofing

D. Pharming

Browse 59 Q&As
Questions 12

To restore a backup file on a Windows-based computer, you:

A. Use the Disk Management utility in the Microsoft Management Console (MMC).

B. Use the BackupandRestore utility in the Control Panel.

C. Use Device Manager in the Control Panel.

D. Extract the backed-up file.

Browse 59 Q&As
Questions 13

Jenny recently switched from broadband cable Internet to ADSL service with her local phone company.

To economize, she chose the self-installation option. It appears that her ADSL modem is not allowing her to connect to the Internet. Which setting should she check first?

A. Loopback address

B. Software version

C. Default gateway

D. Device name

Browse 59 Q&As
Exam Code: 1D0-61C
Exam Name: CIW Network Technology Associate
Last Update: Apr 30, 2024
Questions: 59 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99