100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CIW NETWORK TECHNOLOGY ASSOCIATE EXAM QUESTIONS WITH COMPLETE SOLUTIONS

Rating
-
Sold
-
Pages
7
Uploaded on
30-03-2025
Written in
2024/2025

CIW NETWORK TECHNOLOGY ASSOCIATE EXAM QUESTIONS WITH COMPLETE SOLUTIONS

Institution
Microsoft Technology Associate
Course
Microsoft Technology Associate









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Microsoft Technology Associate
Course
Microsoft Technology Associate

Document information

Uploaded on
March 30, 2025
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Unknown

Subjects

Content preview

CIW NETWORK TECHNOLOGY
ASSOCIATE EXAM QUESTIONS WITH
COMPLETE SOLUTIONS
Sam is a professor at a small college. Due to a scheduling conflict, he was unable to
obtain access to the computer lab to give the final exam. As an alternative, he asked
students to bring their own devices (BYOD) and connect to the college's Wi-Fi for
network access. What security risk is associated with this implementation?
A. Inability for students to share files
B. Inability for students to back up user files
C. Student devices sending unsecured data
D. Student devices being more susceptible to malware - Answer-C. Student devices
sending unsecured data

A friend has called you about a possible computer problem because her computer is
acting strangely. Sounds play unexpectedly, the monitor turns off suddenly, the hard-
drive light flashes constantly, the computer sometimes reboots itself without warning.
When you inspect your friend's system, you notice that several ports are open.
Which of the following is most likely the cause of these symptoms?
A. The computer has been infected with a polymorphic attack
B. The computer is experiencing a denial-of-service
C. The computer has been infected with an illicit server
D. The computer has been infected by a worm - Answer-C. The computer has been
infected with an illicit server

Which term describes the practice of actively collecting wireless networking data
from companies and individuals?
A. War driving
B. Spear phishing
C. Dictionary attack
D. Social engineering - Answer-A. War driving

What should be your first step when troubleshooting a network connection that uses
a cable modem?
A. Ping the proxy server
B. Ping the default gateway
C. Ping local devices using their DNS names
D. Ping local devices using their IP addresses - Answer-D. Ping local devices using
their IP addresses

You have just been hired by a large company, and the IT manager is giving you an
overview of the corporate network. He tells you that the corporation is spread out
over several cities, and various departments are divided into subnetworks that are
connected using routers. What type of network are you being shown?
A. Local area network (LAN)
B. Wide area network (WAN)
C. Virtual private network (VPN)

, D. Internet exchange point (IPX) - Answer-B. Wide area network (WAN)

Which term describes a compact personal computer that relies on a touch screen for
input, generally uses a solid-state drive instead of a traditional hard disk, and relies
on wireless or mobile networks for connectivity?
A. Tabby
B. Laptop
C. Netbook
D. Potable media player - Answer-A. Tabby

You want to enable wireless security on your Android device and your Linux system.
Which of the following is a disadvantage of Wired Equivalent Privacy (WEP)?
A. It enables MAC address filtering
B. It is easily compromised by hackers
C. It only supports 56-bit symmetric-key encryption
D. It is based on the outdated 802.lla wireless standard - Answer-B. It is easily
compromised by hackers

Security attacks can vary greatly. Which type of attack is characterized as an attempt
to trick an individual into revealing confidential or private information?
A. Trojan
B. Spoofing
C. Man in the middle
D. Social engineering - Answer-D. Social engineering

Sally is a network technician at Acme Corporation. She has been directed to
configure the network adapter for a company laptop so that it can be used to connect
to the company network and the Internet. What is one of the required TCP/IP
settings that she will need to configure?
A. MAC address
B. Default gateway
C. Workstation name
D. Loopback address - Answer-B. Default gateway

Your company is investigating the possibility of moving its customer service
management system to a cloud service provider. The sales rep for the cloud service
provider has presented many advantages that would benefit your company. What
would be a potential drawback of moving the CRM from your current in-house
solution?
A. If your company's Internet service is interrupted for any reason at any time, you
will not have access to the CRM
B. More company employees will have access to the system, which could result in
unauthorized access to confidential data
C. Special equipment will need to be purchased and maintained in your office in
order to access and maintain the CRM once it is migrated to the hosted cloud
service
D. Migrating the CRM to the cloud service provider will eliminate several jobs in your
customer service department because their job roles will no longer be required -
Answer-A. If your company's Internet service is interrupted for any reason at any
time, you will not have access to the CRM

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
biggdreamer Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
247
Member since
2 year
Number of followers
68
Documents
17956
Last sold
6 hours ago

4.0

38 reviews

5
22
4
4
3
6
2
2
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions