Leads4pass > CIW > CIW Internet Business Associate > 1D0-61C > 1D0-61C Online Practice Questions and Answers

1D0-61C Online Practice Questions and Answers

Questions 4

Which of the following is a security threat commonly associated with cloud-based services?

A. Malware

B. Phishing

C. Hypervisor vulnerabilities

D. Operating system vulnerabilities

Buy Now
Questions 5

Which term describes the practice of actively collecting wireless networking data from companies and individuals?

A. War driving

B. Spear phishing

C. Dictionary attack

D. Social engineering

Buy Now
Questions 6

When a PC computer device wants to communicate with the processor, which system resource does it use?

A. I/O

B. DMA

C. PIO

D. IRQ

Buy Now
Questions 7

Henry is the network manager at XYY Corporation, a large manufacturing company that competes in the global market. The company's computing environment is extremely complex and includes several proprietary software systems, all of which require custom configuration of network devices to operate correctly. The company's executive management team believes that they can benefit by switching the company over to any cloud-based service. Henry disagrees.

What is a disadvantage of cloud-based services that Henry can cite to support his position?

A. Cloud-based services provide no maintenance or support.

B. Cloud-based services are typically more costly than in-house solutions.

C. The company must typically purchase additional servers to support connections to these types of cloud-based service providers.

D. Cloud-based services are typically more limited in offerings and configurations than the company currently supports in-house.

Buy Now
Questions 8

You are a computer technician supporting a small 15-computer Internet lab. The computers are regularly used to browse the Internet and download files. Users have recently complained that they receive error messages saying the hard disk is full or out of space. You suspect this is a result of a large amount of temporary Internet files. Which of the following is a way to easily delete all the temporary Internet files?

A. Disk cleanup

B. fdisk command

C. chkdsk command

D. Disk defragmentation

Buy Now
Questions 9

When comparing IPv4 to IPv6, which of the following is an advantage of the IPv6 network addressing scheme?

A. Larger address space

B. Shorter address space

C. High dependence on network routers

D. Fast and unencrypted network transmissions

Buy Now
Questions 10

You are distributing a large video game file using BitTorrent. First, you upload the initial file and make it available via a central server called a tracker. Other users can then connect to the tracker and download the file. Each user who downloads the file makes it available to other users to download. The use of BitTorrent significantly reduces the original provider's hardware and bandwidth resource costs. BitTorrent is an example of what type of network?

A. Centralized network

B. Client-server network

C. Peer-to-peer (P2P) network

D. Virtual private network (VPN)

Buy Now
Questions 11

Wireless networks are subject to more security issues than standard wired networks. Which wireless security protocol can prevent unauthorized devices from connecting to the wireless network?

A. WPA2

B. RSA

C. AES

D. DES

Buy Now
Questions 12

Your company is investigating the possibility of moving its customer service management system to a cloud service provider. The sales rep for the cloud service provider has presented many advantages that would benefit your company. What would be a potential drawback of moving the CRM from your current in-house solution?

A. If your company's Internet service is interrupted for any reason at any time, you will not have access to the CRM.

B. More company employees will have access to the system, which could result in unauthorized access to confidential data

C. Special equipment will need to be purchased and maintained in your office in order to access and maintain the CRM once it is migrated to the hosted cloud service.

D. Migrating the CRM to the cloud service provider will eliminate several jobs in your customer service department because their job roles will no longer be required.

Buy Now
Questions 13

The Internet has enabled many new anti-social activities, such as online stalking, cyberbullying, and addiction to solitary online activities. Which choice is the most feasible way for schools and parents to reduce cyberbullying?

A. Monitor, track and record all online activity conducted by students.

B. Teach teens that the use of online communication is a freedom of expression.

C. Prevent students from accessing the Internet while at school so that they learn good habits.

D. Educate students about cyber-ethics and the consequences of questionable online behavior.

Buy Now
Exam Code: 1D0-61C
Exam Name: CIW Network Technology Associate
Last Update: Dec 18, 2024
Questions: 59
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99