Download CIW.1D0-61C.CertDumps.2015-10-26.59q.vcex

Download Exam

File Info

Exam CIW Network Technology Associate Exam
Number 1D0-61C
File Name CIW.1D0-61C.CertDumps.2015-10-26.59q.vcex
Size 193 KB
Posted Oct 26, 2015
Download CIW.1D0-61C.CertDumps.2015-10-26.59q.vcex


How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

What should be your first step when troubleshooting a network connection that uses a cable modem?


  1. Ping the proxy server.
  2. Ping the default gateway.
  3. Ping local devices using their DNS names.
  4. Ping local devices using their IP addresses.
Correct answer: D



Question 2

Which of the following is generally a component of a BYOD policy?


  1. Scope of control
  2. Insurance on devices
  3. Maintenance provision
  4. Device replacement or upgrade
Correct answer: A



Question 3

Which term describes a compact personal computer that relies on a touch screen for input, generally uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks for connectivity?


  1. Tablet
  2. Laptop
  3. Netbook
  4. Portable media player
Correct answer: A



Question 4

What does the following represent?
2E22:4F00:000E:00D0:A267:97FF:FE6B:FE34


  1. A MAC address
  2. AnIPv4address
  3. An IPv6 address
  4. An IP diagnostic loopback address
Correct answer: C



Question 5

A friend has called you about a possible computer problem because her computer is acting strangely. Sounds play unexpectedly, the monitor turns off suddenly, the hard-drive light flashes constantly, the computer sometimes reboots itself without warning. When you inspect your friend's system, you notice that several ports are open. Which of the following is most likely the cause of these symptoms?


  1. The computer has been infected with a polymorphic virus.
  2. The computer is experiencing a denial-of-service attack.
  3. The computer has been infected with an illicit server.
  4. The computer has been infected by a worm.
Correct answer: C



Question 6

The Windows Device Manager is a tool that enables you to perform a variety of tasks, including:


  1. Map to a printer.
  2. Ping anIPaddress.
  3. Defragment a hard drive.
  4. Change a resource assignment.
Correct answer: D



Question 7

Which type of attack involves the installation of malicious code on personal computers or servers that redirects Internet traffic from a legitimate Web site to an identical-looking but malicious imposter Web site?


  1. Pharming
  2. Spoofing
  3. Phishing
  4. Replay
Correct answer: A



Question 8

The capabilities of cellular networks have improved greatly since their original development for analog voice phone calls. Most recently, fourth-generation (4G) wireless supports a variety of data-intensive needs.
A benefit of 4G networks is that they:


  1. Use spread-spectrum technology to ensure high transmission rates.
  2. Provide fast transmission rates equivalent to DSL or broadband-cable.
  3. Provide fast transmission rates equivalent to high-speed dial-up connections.
  4. Enable bandwidth throttling, allowing the user access to unrestricted download speeds.
Correct answer: B



Question 9

Selena has run out of memory on her phone's SD card. She has decided to store the files she has accumulated on a third-party cloud service provider's drives. Which of the following is a typical issue that she may encounter?


  1. The files become corrupted due to an attack from a hacker botnet.
  2. The files become unavailable whenever Internet connectivity is lost.
  3. The files become unavailable because they are being shared with other users.
  4. The files become corrupted because the provider uses a proprietary compression algorithm during transit.
Correct answer: B



Question 10

Which of the following computer system maintenance tasks can help improve file access performance?


  1. Use a SCSI drive instead of a SATA drive
  2. Use a SATA drive instead of an EIDE drive
  3. Defragment the drive using the following command: fdisk -d -w c:/
  4. Defragment the drive using the following command: defrag c: -w
Correct answer: D









PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files