1D0-61C Dumps

1D0-61C Braindumps 1D0-61C Real Questions 1D0-61C Practice Test

1D0-61C Actual Questions


killexams.com


CIW


1D0-61C


CIW Network Technology Associate


https://killexams.com/pass4sure/exam-detail/1D0-61C


QUESTION: 52

Consider the network configuration shown in the command prompt:


What does the Default Gateway identify?


  1. The file server on the network

  2. The local host on the network

  3. The computer on the network

  4. The router on the network


Answer: D


QUESTION: 53

Ron has an older computer to which he frequently downloads and saves company files. He recently noticed that he was running low on disk space and decided to delete many old files that he no longer needed. He now notices that it takes a long time to open or save documents to his hard drive. Which maintenance task can help?


  1. Disk defragmentation

  2. chkdsk command

  3. fdisk command

  4. Disk cleanup


Answer: A


QUESTION: 54

SuperBank is considering a cloud service from Local Data Center, Inc., to support the bank’s expanding needs. SuperBank’s managers are concerned about security. What can SuperBank request to protect its data from security threats?


  1. For Local Data Center to run multiple hypervisors

  2. For Local Data Center to install a DDoS mitigation system

  3. For SuperBank staff to manage the servers at Local Data Center, Inc.


  4. For SuperBank to perform background checks on the staff at Local Data Center, Inc.


Answer: D


QUESTION: 55

Carlos is the Information Technology (IT) administrator for a small company. Over the past year, employees have been using their personal mobile devices and smartphones for business use. This has reduced costs of purchasing new devices for employees. Carlos is now considering whether he should stop supplying employees with company phones and instead require all employees to use their personal smartphones for work. How can Carlos address the most significant security vulnerability?


  1. Develop a robust app to push security updates out to the various mobile OS devices

  2. Create an employee policy that requires employees to keep phones updated to the latest technology

  3. Create a policy that specifies acceptable use, ensuring security measures are in place for mobile devices

  4. Mandate that employees switch to the company’s mobile service provider to ensure security policies are enforced


Answer: C


QUESTION: 56

Carol is experiencing read/write errors when trying to save files on her Windows- based laptop. To correct the issue, she could consider performing which of the following maintenance tasks?


  1. Disk cleanup

  2. fsck command

  3. chkdsk command

  4. Disk defragmentation


Answer: C


QUESTION: 57

Virtualization software transforms the hardware resources of a physical computer to create a fully functional virtual computer that can run its own operating systems and applications. In addition to the CPU and RAM, which hardware resources are used by virtualization software?


  1. Hard disk and USB devices

  2. Hard disk and network devices

  3. Virtual hard disk and network devices

  4. Network devices and secondary storage devices


Answer: B


QUESTION: 58

Your company is investigating the possibility of moving its customer service management system to a cloud service provider. The sales rep for the cloud service provider has presented many advantages that would benefit your company. What would be a potential drawback of moving the CRM from your current in-house solution?


  1. If your company’s Internet service is interrupted for any reason at any time, you will not have access to the CRM.

  2. More company employees will have access to the system, which could result in unauthorized access to confidential data

  3. Special equipment will need to be purchased and maintained in your office in order to access and maintain the CRM once it is migrated to the hosted cloud service.

  4. Migrating the CRM to the cloud service provider will eliminate several jobs in your customer service department because their job roles will no longer be required.


Answer: A


QUESTION: 59

The Internet has enabled many new anti-social activities, such as online stalking, cyberbullying, and addiction to solitary online activities. Which choice is the most feasible way for schools and parents to reduce cyberbullying?


  1. Monitor, track and record all online activity conducted by students.

  2. Teach teens that the use of online communication is a freedom of expression.

  3. Prevent students from accessing the Internet while at school so that they learn good habits.

  4. Educate students about cyber-ethics and the consequences of questionable online behavior.


Answer: D