Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CIW 1D0-61C - Network Technology Associate

Page: 2 / 2
Total 59 questions

Which term describes a compact personal computer that relies on a touch screen for input, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity?

A.

Tablet

B.

Laptop

C.

Netbook

D.

Portable media player

Ron has an older computer to which he frequently downloads and saves company files. He recently noticed that he was running low on disk space and decided to delete many old files that he no longer needed. He now notices that it takes a long time to open or save documents to his hard drive. Which maintenance task can help?

A.

Disk defragmentation

B.

chkdsk command

C.

fdisk command

D.

Disk cleanup

Which of the following computer system maintenance tasks can help improve file access performance?

A.

Use a SCSI drive instead of a SATA drive

B.

Use a SATA drive instead of an EIDE drive

C.

Defragment the drive using the following command: fdisk -d -w c:/

D.

Defragment the drive using the following command: defrag c: -w

Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to the computer lab to give the final exam. As an alternative, he asked students to bring their own devices (BYOD) and connect to the college’s Wi-Fi for network access. What security risk is associated with this implementation?

A.

Inability for students to share files

B.

Inability for students to back up user files

C.

Student devices sending unsecured data

D.

Student devices being more susceptible to malware

A friend has called you about a possible computer problem because her computer is acting strangely. Sounds play unexpectedly, the monitor turns off suddenly, the hard-drive light flashes constantly, the computer sometimes reboots itself without warning. When you inspect your friend’s system, you notice that several ports are open. Which of the following is most likely the cause of these symptoms?

A.

The computer has been infected with a polymorphic virus.

B.

The computer is experiencing a denial-of-service attack.

C.

The computer has been infected with an illicit server.

D.

The computer has been infected by a worm.

Mobile computing has become a common necessity for both personal and business transactions. Which device has features similar to a smartphone but usually does not have telephone capabilities?

A.

Portable media player

B.

Netbook

C.

Laptop

D.

Tablet

What is the biggest security concern with wireless networks?

A.

Firewall software is not available for access points.

B.

Wireless encryption algorithms must be implemented.

C.

Wireless networks do not support intrusion detection.

D.

Wireless networks do not support encryption via an access point.