Search Header Logo

CIW NTA Cert Prep I

Authored by D Davenport

Other

12th Grade

Used 4+ times

CIW NTA Cert Prep I
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gwen works for a small company where she has been asked to find a cost-effective option for providing comprehensive customer service. The finance, technical support, sales and customer service departments all need to share the information about their customers. Gwen is considering adoption of a customer relationship management application. Which of the following would be the most cost-effective solution?

She can outsource all customer service so the company can focus on product development.

She can hire a programmer to develop and maintain the CRM specific to her company’s needs, then have a service provider host the application.

She can contract with a cloud service provider to host the CRM that her company’s employees can access.

She can purchase a new server, then create and maintain the CRM in-house.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You want to enable wireless security on your Android device and your Linux system. Which of the following is a disadvantage of Wired Equivalent Privacy (WEP)?

It enables MAC address filtering

It is easily compromised by hackers

It only supports 56-bit symmetric-key encryption

It is based on the outdated 802.11a wireless standard

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a drawback to using Wired Equivalent Privacy (WEP)?

Encryption and decryption speeds are slower compared to other protocols.

Symmetric-key encryption is susceptible to cracking.

Wireless network overhead is excessive.

The number of devices than can communicate using WEP is limited.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the biggest security concern with wireless networks?

Firewall software is not available for access points.

Wireless encryption algorithms must be implemented.

Wireless networks do not support intrusion detection.

Wireless networks do not support encryption via an access point.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify?

Direct Sequence Spread Spectrum (DSSS) signal

Media Access Control (MAC) address

Wi-Fi Protected Access 2 (WPA2)

Service Set Identifier (SSID)

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

ABC Company develops its own database applications. ABC is considering migrating to cloud services to accommodate the company's growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?

Cloud-only solution

Regional systems solution

Location systems solution

Multiple cloud-service providers

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

On your Windows laptop, you store all your vacation photos and your entire digital music library. Concerned about data loss, you perform frequent backups. Your laptop has recently been stolen and you need to restore your files to a desktop computer. Which Windows tool would you use to recover and set up the saved copies of your files onto your desktop computer?

Backup and restore

Backup Recovery

System recovery

System restore

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?