Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

CIW 1D0-61C - Network Technology Associate

Page: 1 / 2
Total 59 questions

Gwen works for a small company where she has been asked to find a cost-effective option for providing comprehensive customer service. The finance, technical support, sales and customer service departments all need to share information about their customers. Gwen is considering adoption of a customer relationship management (CRM) application. Which of the following would be the most cost-effective solution?

A.

She can purchase a new server, then create and maintain the CRM in-house.

B.

She can outsource all customer service so the company can focus on product development.

C.

She can contract with a cloud service provider to host the CRM that her company’s employees can access.

D.

She can hire a programmer to develop and maintain the CRM specific to her company’s needs, then have a service provider host the application.

Selena has run out of memory on her phone’s SD card. She has decided to store the files she has accumulated on a third-party cloud service provider’s drives. Which of the following is a typical issue that she may encounter?

A.

The files become corrupted due to an attack from a hacker botnet.

B.

The files become unavailable whenever Internet connectivity is lost.

C.

The files become unavailable because they are being shared with other users.

D.

The files become corrupted because the provider uses a proprietary compression algorithm during transit.

The capabilities of cellular networks have improved greatly since their original development for analog voice phone calls. Most recently, fourth-generation (4G) wireless supports a variety of data-intensive needs.

A benefit of 4G networks is that they:

A.

Use spread-spectrum technology to ensure high transmission rates.

B.

Provide fast transmission rates equivalent to DSL or broadband-cable.

C.

Provide fast transmission rates equivalent to high-speed dial-up connections.

D.

Enable bandwidth throttling, allowing the user access to unrestricted download speeds.

Which of the following is a disadvantage of implementing a Bring Your Own Device (BYOD) policy in a company?

A.

Increased cost for licensing mobile applications

B.

Configuring the corporate e-mail server to work with mobile devices

C.

Inability to control access to company data if the device is stolen or lost

D.

Providing training for employees on how to use mobile devices with company applications

You want to enable wireless security on your Android device and your Linux system. Which of the following is a disadvantage of Wired Equivalent Privacy (WEP)?

A.

It enables MAC address filtering.

B.

It is easily compromised by hackers.

C.

It only supports 56-bit symmetric-key encryption.

D.

It is based on the outdated 802.lla wireless standard.

On your Windows laptop, you store all your vacation photos and your entire digital music library. Concerned about data loss, you perform frequent backups. Your laptop has recently been stolen and you need to restore your files to a desktop computer. Which Windows tool would you use to recover and set up the saved copies of your files onto your desktop computer?

A.

Backup and Restore

B.

Backup Recovery

C.

System Recovery

D.

System Restore

Your company is investigating the possibility of moving its customer service management system to a cloud service provider. The sales rep for the cloud service provider has presented many advantages that would benefit your company. What would be a potential drawback of moving the CRM from your current in-house solution?

A.

If your company’s Internet service is interrupted for any reason at any time, you will not have access to the CRM.

B.

More company employees will have access to the system, which could result in unauthorized access to confidential data

C.

Special equipment will need to be purchased and maintained in your office in order to access and maintain the CRM once it is migrated to the hosted cloud service.

D.

Migrating the CRM to the cloud service provider will eliminate several jobs in your customer service department because their job roles will no longer be required.

The Windows Device Manager is a tool that enables you to perform a variety of tasks, including:

A.

Map to a printer.

B.

Ping anIPaddress.

C.

Defragment a hard drive.

D.

Change a resource assignment.

Carlos is the Information Technology (IT) administrator for a small company. Over the past year, employees have been using their personal mobile devices and smartphones for business use. This has reduced costs of purchasing new devices for employees. Carlos is now considering whether he should stop supplying employees with company phones and instead require all employees to use their personal smartphones for work. How can Carlos address the most significant security vulnerability?

A.

Develop a robust app to push security updates out to the various mobile OS devices

B.

Create an employee policy that requires employees to keep phones updated to the latest technology

C.

Create a policy that specifies acceptable use, ensuring security measures are in place for mobile devices

D.

Mandate that employees switch to the company’s mobile service provider to ensure security policies are enforced

Configuring a wireless network involves several steps. Which of the following is a task that should be performed to configure and connect to a wireless network?

A.

Configure a certificate authority and configure the trust settings.

B.

Configure the wireless AP’s SSID, encryption level and shared key.

C.

Connect your computer to the same network hub as the wireless AP.

D.

Connect your computer to the same network switch as the wireless AP.