ciw 1d0-61c practice test

CIW Network Technology Associate

Last exam update: Nov 18 ,2025
Page 1 out of 4. Viewing questions 1-15 out of 59

Question 1

What should be your first step when troubleshooting a network connection that uses a cable
modem?

  • A. Ping the proxy server.
  • B. Ping the default gateway.
  • C. Ping local devices using their DNS names.
  • D. Ping local devices using their IP addresses.
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Which of the following is generally a component of a BYOD policy?

  • A. Scope of control
  • B. Insurance on devices
  • C. Maintenance provision
  • D. Device replacement or upgrade
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

Which term describes a compact personal computer that relies on a touch screen for input, generally
uses a solid-state drive instead of a traditional hard disk, and relies on wireless or mobile networks
for connectivity?

  • A. Tablet
  • B. Laptop
  • C. Netbook
  • D. Portable media player
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

What does the following represent?
2E22:4F00:000E:00D0:A267:97FF:FE6B:FE34

  • A. A MAC address
  • B. AnIPv4address
  • C. An IPv6 address
  • D. An IP diagnostic loopback address
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 5

A friend has called you about a possible computer problem because her computer is acting strangely.
Sounds play unexpectedly, the monitor turns off suddenly, the hard-drive light flashes constantly, the
computer sometimes reboots itself without warning. When you inspect your friend’s system, you
notice that several ports are open. Which of the following is most likely the cause of these
symptoms?

  • A. The computer has been infected with a polymorphic virus.
  • B. The computer is experiencing a denial-of-service attack.
  • C. The computer has been infected with an illicit server.
  • D. The computer has been infected by a worm.
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 6

The Windows Device Manager is a tool that enables you to perform a variety of tasks, including:

  • A. Map to a printer.
  • B. Ping anIPaddress.
  • C. Defragment a hard drive.
  • D. Change a resource assignment.
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Which type of attack involves the installation of malicious code on personal computers or servers
that redirects Internet traffic from a legitimate Web site to an identical-looking but malicious
imposter Web site?

  • A. Pharming
  • B. Spoofing
  • C. Phishing
  • D. Replay
Mark Question:
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

The capabilities of cellular networks have improved greatly since their original development for
analog voice phone calls. Most recently, fourth-generation (4G) wireless supports a variety of data-
intensive needs. A benefit of 4G networks is that they:

  • A. Use spread-spectrum technology to ensure high transmission rates.
  • B. Provide fast transmission rates equivalent to DSL or broadband-cable.
  • C. Provide fast transmission rates equivalent to high-speed dial-up connections.
  • D. Enable bandwidth throttling, allowing the user access to unrestricted download speeds.
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

Selena has run out of memory on her phone’s SD card. She has decided to store the files she has
accumulated on a third-party cloud service provider’s drives. Which of the following is a typical issue
that she may encounter?

  • A. The files become corrupted due to an attack from a hacker botnet.
  • B. The files become unavailable whenever Internet connectivity is lost.
  • C. The files become unavailable because they are being shared with other users.
  • D. The files become corrupted because the provider uses a proprietary compression algorithm during transit.
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

Which of the following computer system maintenance tasks can help improve file access
performance?

  • A. Use a SCSI drive instead of a SATA drive
  • B. Use a SATA drive instead of an EIDE drive
  • C. Defragment the drive using the following command: fdisk -d -w c:/
  • D. Defragment the drive using the following command: defrag c: -w
Mark Question:
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

Which of the following is a security threat commonly associated with cloud-based services?

  • A. Malware
  • B. Phishing
  • C. Hypervisor vulnerabilities
  • D. Operating system vulnerabilities
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 12

Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to
the computer lab to give the final exam. As an alternative, he asked students to bring their own
devices (BYOD) and connect to the college’s Wi-Fi for network access. What security risk is associated
with this implementation?

  • A. Inability for students to share files
  • B. Inability for students to back up user files
  • C. Student devices sending unsecured data
  • D. Student devices being more susceptible to malware
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

What is the biggest security concern with wireless networks?

  • A. Firewall software is not available for access points.
  • B. Wireless encryption algorithms must be implemented.
  • C. Wireless networks do not support intrusion detection.
  • D. Wireless networks do not support encryption via an access point.
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Gwen works for a small company where she has been asked to find a cost-effective option for
providing comprehensive customer service. The finance, technical support, sales and customer
service departments all need to share information about their customers. Gwen is considering
adoption of a customer relationship management (CRM) application. Which of the following would
be the most cost-effective solution?

  • A. She can purchase a new server, then create and maintain the CRM in-house.
  • B. She can outsource all customer service so the company can focus on product development.
  • C. She can contract with a cloud service provider to host the CRM that her company’s employees can access.
  • D. She can hire a programmer to develop and maintain the CRM specific to her company’s needs, then have a service provider host the application.
Mark Question:
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Sally is a network technician at Acme Corporation. She has been directed to configure the network
adapter for a company laptop so that it can be used to connect to the company network and the
Internet. What is one of the required TCP/IP settings that she will need to configure?

  • A. MAC address
  • B. Default gateway
  • C. Workstation name
  • D. Loopback address
Mark Question:
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2