
CIW NTA Cert Prep I
Authored by D Davenport
Other
12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Gwen works for a small company where she has been asked to find a cost-effective option for providing comprehensive customer service. The finance, technical support, sales and customer service departments all need to share the information about their customers. Gwen is considering adoption of a customer relationship management application. Which of the following would be the most cost-effective solution?
She can outsource all customer service so the company can focus on product development.
She can hire a programmer to develop and maintain the CRM specific to her company’s needs, then have a service provider host the application.
She can contract with a cloud service provider to host the CRM that her company’s employees can access.
She can purchase a new server, then create and maintain the CRM in-house.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You want to enable wireless security on your Android device and your Linux system. Which of the following is a disadvantage of Wired Equivalent Privacy (WEP)?
It enables MAC address filtering
It is easily compromised by hackers
It only supports 56-bit symmetric-key encryption
It is based on the outdated 802.11a wireless standard
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a drawback to using Wired Equivalent Privacy (WEP)?
Encryption and decryption speeds are slower compared to other protocols.
Symmetric-key encryption is susceptible to cracking.
Wireless network overhead is excessive.
The number of devices than can communicate using WEP is limited.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the biggest security concern with wireless networks?
Firewall software is not available for access points.
Wireless encryption algorithms must be implemented.
Wireless networks do not support intrusion detection.
Wireless networks do not support encryption via an access point.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Selena has decided to change a 32-character unique wireless network name on her wireless router to improve network security after a break-in. She is following advice from CERT to make this change in order to avoid attacks from botnets. Which of the following settings would she modify?
Direct Sequence Spread Spectrum (DSSS) signal
Media Access Control (MAC) address
Wi-Fi Protected Access 2 (WPA2)
Service Set Identifier (SSID)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
ABC Company develops its own database applications. ABC is considering migrating to cloud services to accommodate the company's growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?
Cloud-only solution
Regional systems solution
Location systems solution
Multiple cloud-service providers
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
On your Windows laptop, you store all your vacation photos and your entire digital music library. Concerned about data loss, you perform frequent backups. Your laptop has recently been stolen and you need to restore your files to a desktop computer. Which Windows tool would you use to recover and set up the saved copies of your files onto your desktop computer?
Backup and restore
Backup Recovery
System recovery
System restore
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?