CIW Networking 1

Ace your homework & exams now with Quizwiz!

You are a small-business owner and would like to encourage employees to bring their own devices (BYOD) to work. Which of the following can help reduce the security risks associated with a BYOD implementation?

Acceptable use policy

On your Windows laptop, you store all your vacation photos and your entire digital music library. Concerned about data loss, you perform frequent backups. Your laptop has recently been stolen and you need to restore your files to a desktop computer. Which Windows tool would you use to recover and set up the saved copies of your files onto your desktop computer?

Backup and Restore

Henry is the network manager at XYY Corporation, a large manufacturing company that competes in the global market. The company's computing environment is extremely complex and includes several proprietary software systems, all of which require custom configuration of network devices to operate correctly. The company's executive management team believes that they can benefit by switching the company over to any cloud-based service. Henry disagrees. What is a disadvantage of cloud-based services that Henry can cite to support his position?

Cloud-based services are typically more limited in offerings and configurations than the company currently supports in-house.

Carlos is the Information Technology (IT) administrator for a small company. Over the past year, employees have been using their personal mobile devices and smartphones for business use. This has reduced costs of purchasing new devices for employees. Carlos is now considering whether he should stop supplying employees with company phones and instead require all employees to use their personal smartphones for work. How can Carlos address the most significant security vulnerability?

Create a policy that specifies acceptable use, ensuring security measures are in place for mobile devices

Jenny recently switched from broadband cable Internet to ADSL service with her local phone company. To economize, she chose the self-installation option. It appears that her ADSL modem is not allowing her to connect to the Internet. Which setting should she check first?

Default gateway

Which of the following computer system maintenance tasks can help improve file access performance?

Defragment the drive using the following command: defrag c: -w

Ron has an older computer to which he frequently downloads and saves company files. He recently noticed that he was running low on disk space and decided to delete many old files that he no longer needed. He now notices that it takes a long time to open or save documents to his hard drive. Which maintenance task can help?

Disk defragmentation

John is the network administrator for a small company. The company's network equipment has become outdated, and John has been asked to recommend a plan to update the company's infrastructure. John has read extensively about the many advantages of using cloud-based services. Which of the following is an advantage of cloud-based services that John could cite to support his recommendation?

Elimination of equipment purchase and maintenance

Patrick visits his teenage daughter's social media page and discovers several offensive posts about one of her classmates. After speaking with his daughter, Patrick learns that several other girls in her class are upset with the classmate and have been posting, texting and e-mailing others about the girl. What is the best way for Patrick to help his daughter understand cyberbullying?

He should explain to his daughter that she is participating in the bullying by accepting others' posts, texts and c-mails.

When a PC computer device wants to communicate with the processor, the system resource that it uses is:

IRQ

Your company is investigating the possibility of moving its customer service management system to a cloud service provider. The sales rep for the cloud service provider has presented many advantages that would benefit your company. What would be a potential drawback of moving the CRM from your current in-house solution?

If your company's Internet service is interrupted for any reason at any time, you will not have access to the CRM.

Which of the following is a disadvantage of implementing a Bring Your Own Device (BYOD) policy in a company?

Inability to control access to company data if the device is lost or stolen

When comparing IPv4 to IPv6, which of the following is an advantage of the IPv6 network addressing scheme?

Larger Address Space

ABC Company develops its own database applications. ABC is considering migrating to cloud services to accommodate the company's growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?

Location systems solution

You want to restrict host access to the wireless access point. What is the best way for him to do this?

Log in to the access point and configure features, such as changing the SSID.

Cloud-computing enables mobile devices to provide users with access to a wide variety of applications and services. Which of the following is a disadvantage of mobile devices?

Mobile devices cannot accommodate large database installations or applications

You are distributing a large video game file using BitTorrent. First, he uploads the initial file and makes it available via a central server called a tracker. Other users can then connect to the tracker and download the file. Each user who downloads the file makes it available to other users to download. Using BitTorrent significantly reduces Jimmy's hardware and bandwidth resource costs. BitTorrent is an example of a:

Peer to Peer (P2P) network

The capabilities of cellular networks have improved greatly since their original development for analog voice phone calls. Most recently, fourth-generation (4G) wireless supports a variety of data-intensive needs.

Provide fast transmission rates equivalent to DSL or broadband cable

Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify? Direct Sequence Spread Spectrum (DSSS) signal

Service Set Identifier (SSID)

You have recently purchased a new wireless router. You want to configure a name for his wireless network so that he can easily identify it when scanning available wireless networks. Which term describes this wireless network device name?

Service Set Identifier (SSID)

Disaster recovery planning is considered a best practice for all organizations. It is even more important when cloud-computing services are used. Which of the following should be included as part of a disaster recovery plan for companies that use cloud-based services?

Service-level agreement with a cloud-provider

Lisa is traveling on company business. She has a company-issued smartphone with 4G access. Her hotel does not provide Internet access. What advantage does 4G provide to help her access the Internet?

She can use a 4G mobile hotspot device with her phone to connect her laptop to Wi-Fi.

Security attacks can vary greatly. Which type of attack is characterized as an attempt to trick an individual into reveling confidential or private information?

Spoofing

Which of the following is a drawback to using Wired Equivalent Privacy (WEP)?

Symmetric-key encryption is susceptible to cracking.

Mobile computing has become a common necessity for both personal and business transactions. Which device has features similar to a smartphone but usually does not have telephone capabilities?

Tablet

Marsha has been hired by XYZ, Inc., to update the company Web site. Marsha discovers that the existing Web pages were structured using tables. Marsha needs to explain to XYZ why the Web site needs to be recoded in HTML5 with CSS controlling the structure of the document. What is the most important reason for using HTML5 and CSS?

The Web site can be interpreted by any HTML5-compliant browser, including mobile devices.

A friend has called you about a possible computer problem because her computer is acting strangely. Sounds play unexpectedly, the monitor turns off suddenly, the hard-drive light flashes constantly, the computer sometimes reboots itself without warning. When you inspect your friend's system, you notice that several ports are open. Which of the following is most likely the cause of these symptoms?

The computer has been infected with an illicit server.

What does the Default Gateway identify?

The router on the network

Server-based networks typically contain centralized network resources, which are usually not available on peer-to-peer (P2P) networks. Which of the following examples describes a server-based network?

Three network clients connecting to a file server

Which of the following statements about virtualization is true?

Virtualization enables you to run multiple operating systems and applications on a single computer.

Virtualization software transforms the hardware resources of a physical computer to create a fully functional virtual computer that can run its own operating systems and applications. In addition to the CPU and RAM, which hardware resources are used by virtualization software?

Virtualization software transforms the hardware resources of a physical computer to create a fully functional virtual computer that can run its own operating systems and applications. In addition to the CPU and RAM, which hardware resources are used by virtualization software?

Wireless networks are subject to more security issues than standard wired networks. Which wireless security protocol can you implement to prevent unauthorized devices from connecting to the wireless network?

WPA2

You have volunteered to give a presentation to the parents at your child's school about the dangers of the Internet. Which of the following would you include in your recommendations to parents?

Warn children to never provide personal information over the Internet.

You have just been hired by a large company, and the IT manager is giving you an overview of the corporate network. He tells you that the corporation is spread out over several cities, and various departments are divided into subnetworks that are connected using routers. What type of network are you being shown?

Wide area network (WAN)

Carol is experiencing read/write errors when trying to save files on her Windows based laptop. To correct the issue, she could consider performing which of the following maintenance tasks?

chkdsk command


Related study sets

14.2.5 Controls and Frameworks Section Quiz

View Set

Georgia Principles of Real Estate

View Set

Money and Banking Chapter 1 (Possibly part of CH.2 also)

View Set

Exam 9 Women and Children Chapter35, (Adult Health 41, 42, 43)

View Set

Java Programming - Chapter 1 - Creating Java Programs

View Set

Professionalism and Leadership Test

View Set

World Civ-Chapter 19 Section 4,5

View Set

7.Construction, drawings, schedules, specs.

View Set