ciw 1d0-61c practice test

Exam Title: CIW Network Technology Associate

Last update: Nov 27 ,2025
Question 1

Which of the following is a security threat commonly associated with cloud-based services?

  • A. Malware
  • B. Phishing
  • C. Hypervisor vulnerabilities
  • D. Operating system vulnerabilities
Answer:

C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to
the computer lab to give the final exam. As an alternative, he asked students to bring their own
devices (BYOD) and connect to the college’s Wi-Fi for network access. What security risk is associated
with this implementation?

  • A. Inability for students to share files
  • B. Inability for students to back up user files
  • C. Student devices sending unsecured data
  • D. Student devices being more susceptible to malware
Answer:

C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

What is the biggest security concern with wireless networks?

  • A. Firewall software is not available for access points.
  • B. Wireless encryption algorithms must be implemented.
  • C. Wireless networks do not support intrusion detection.
  • D. Wireless networks do not support encryption via an access point.
Answer:

B

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

Gwen works for a small company where she has been asked to find a cost-effective option for
providing comprehensive customer service. The finance, technical support, sales and customer
service departments all need to share information about their customers. Gwen is considering
adoption of a customer relationship management (CRM) application. Which of the following would
be the most cost-effective solution?

  • A. She can purchase a new server, then create and maintain the CRM in-house.
  • B. She can outsource all customer service so the company can focus on product development.
  • C. She can contract with a cloud service provider to host the CRM that her company’s employees can access.
  • D. She can hire a programmer to develop and maintain the CRM specific to her company’s needs, then have a service provider host the application.
Answer:

C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

Sally is a network technician at Acme Corporation. She has been directed to configure the network
adapter for a company laptop so that it can be used to connect to the company network and the
Internet. What is one of the required TCP/IP settings that she will need to configure?

  • A. MAC address
  • B. Default gateway
  • C. Workstation name
  • D. Loopback address
Answer:

B

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

Which term describes the practice of actively collecting wireless networking data from companies
and individuals?

  • A. War driving
  • B. Spear phishing
  • C. Dictionary attack
  • D. Social engineering
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

Jose is experiencing performance problems with his notebook computer that he purchased a year
ago. Upon discussing this issue with him, you learn that he has never deleted any temporary files
since owning the device. What can Jose do to fix this problem most efficiently?

  • A. Reformat his hard drive.
  • B. Use the Windows chkdsk utility.
  • C. Use the Windows Disk Cleanup utility.
  • D. Back up his computer and delete the active partition.
Answer:

C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

Which of the following is a drawback to using Wired Equivalent Privacy (WEP)?

  • A. Wireless network overhead is excessive.
  • B. Symmetric-key encryption is susceptible to cracking.
  • C. The number of devices that can communicate using WEP is limited.
  • D. Encryption and decryption speeds are slower compared to other protocols.
Answer:

B

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

When using cloud-based services to host company data, a company’s disaster recovery plan should
include strategies for:

  • A. Creating redundancy and ensuring there is an exclusive contract with the cloud service provider.
  • B. Distributing data and software services across multiple cloud service providers.
  • C. Creating redundancy and using multiple cloud service providers.
  • D. Using a single well-established cloud service provider.
Answer:

C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

Which of the following statement about virtualization is true?

  • A. Virtualization enables multiple physical computers to run off of a single virtualized server.
  • B. In virtualization, you run multiple virtual machines, provided they all use the same operating system.
  • C. In virtualization, the operating systems of the virtual machines should match the host operating system.
  • D. Virtualization enables you to run multiple operating systems and applications on a single computer.
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 5
Viewing questions 1-10 out of 59
Go To
page 2