CIW 1D0-61C - Network Technology Associate
Gwen works for a small company where she has been asked to find a cost-effective option for providing comprehensive customer service. The finance, technical support, sales and customer service departments all need to share information about their customers. Gwen is considering adoption of a customer relationship management (CRM) application. Which of the following would be the most cost-effective solution?
Selena has run out of memory on her phone’s SD card. She has decided to store the files she has accumulated on a third-party cloud service provider’s drives. Which of the following is a typical issue that she may encounter?
The capabilities of cellular networks have improved greatly since their original development for analog voice phone calls. Most recently, fourth-generation (4G) wireless supports a variety of data-intensive needs.
A benefit of 4G networks is that they:
Which of the following is a disadvantage of implementing a Bring Your Own Device (BYOD) policy in a company?
You want to enable wireless security on your Android device and your Linux system. Which of the following is a disadvantage of Wired Equivalent Privacy (WEP)?
On your Windows laptop, you store all your vacation photos and your entire digital music library. Concerned about data loss, you perform frequent backups. Your laptop has recently been stolen and you need to restore your files to a desktop computer. Which Windows tool would you use to recover and set up the saved copies of your files onto your desktop computer?
Your company is investigating the possibility of moving its customer service management system to a cloud service provider. The sales rep for the cloud service provider has presented many advantages that would benefit your company. What would be a potential drawback of moving the CRM from your current in-house solution?
The Windows Device Manager is a tool that enables you to perform a variety of tasks, including:
Carlos is the Information Technology (IT) administrator for a small company. Over the past year, employees have been using their personal mobile devices and smartphones for business use. This has reduced costs of purchasing new devices for employees. Carlos is now considering whether he should stop supplying employees with company phones and instead require all employees to use their personal smartphones for work. How can Carlos address the most significant security vulnerability?
Configuring a wireless network involves several steps. Which of the following is a task that should be performed to configure and connect to a wireless network?