Black Friday Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

1D0-61C Sample Questions Answers

Questions 4

You are a small-business owner and would like to encourage employees to bring their own devices (BYOD) to work. Which of the following can help reduce the security risks associated with a BYOD implementation?

Options:

A.

Expense accounts

B.

Acceptable use policy

C.

End user license agreement

D.

In-house device maintenance

Buy Now
Questions 5

The Windows Device Manager is a tool that enables you to perform a variety of tasks, including:

Options:

A.

Map to a printer.

B.

Ping anIPaddress.

C.

Defragment a hard drive.

D.

Change a resource assignment.

Buy Now
Questions 6

Which of the following is a disadvantage of implementing a Bring Your Own Device (BYOD) policy in a company?

Options:

A.

Increased cost for licensing mobile applications

B.

Configuring the corporate e-mail server to work with mobile devices

C.

Inability to control access to company data if the device is stolen or lost

D.

Providing training for employees on how to use mobile devices with company applications

Buy Now
Questions 7

Carlos is the Information Technology (IT) administrator for a small company. Over the past year, employees have been using their personal mobile devices and smartphones for business use. This has reduced costs of purchasing new devices for employees. Carlos is now considering whether he should stop supplying employees with company phones and instead require all employees to use their personal smartphones for work. How can Carlos address the most significant security vulnerability?

Options:

A.

Develop a robust app to push security updates out to the various mobile OS devices

B.

Create an employee policy that requires employees to keep phones updated to the latest technology

C.

Create a policy that specifies acceptable use, ensuring security measures are in place for mobile devices

D.

Mandate that employees switch to the company’s mobile service provider to ensure security policies are enforced

Buy Now
Questions 8

Which of the following is a security threat commonly associated with cloud-based services?

Options:

A.

Malware

B.

Phishing

C.

Hypervisor vulnerabilities

D.

Operating system vulnerabilities

Buy Now
Questions 9

Configuring a wireless network involves several steps. Which of the following is a task that should be performed to configure and connect to a wireless network?

Options:

A.

Configure a certificate authority and configure the trust settings.

B.

Configure the wireless AP’s SSID, encryption level and shared key.

C.

Connect your computer to the same network hub as the wireless AP.

D.

Connect your computer to the same network switch as the wireless AP.

Buy Now
Questions 10

When using cloud-based services to host company data, a company’s disaster recovery plan should include strategies for:

Options:

A.

Creating redundancy and ensuring there is an exclusive contract with the cloud service provider.

B.

Distributing data and software services across multiple cloud service providers.

C.

Creating redundancy and using multiple cloud service providers.

D.

Using a single well-established cloud service provider.

Buy Now
Questions 11

On your Windows laptop, you store all your vacation photos and your entire digital music library. Concerned about data loss, you perform frequent backups. Your laptop has recently been stolen and you need to restore your files to a desktop computer. Which Windows tool would you use to recover and set up the saved copies of your files onto your desktop computer?

Options:

A.

Backup and Restore

B.

Backup Recovery

C.

System Recovery

D.

System Restore

Buy Now
Questions 12

You are distributing a large video game file using BitTorrent. First, you upload the initial file and make it available via a central server called a tracker. Other users can then connect to the tracker and download the file. Each user who downloads the file makes it available to other users to download. The use of BitTorrent significantly reduces the original provider’s hardware and bandwidth resource costs. BitTorrent is an example of what type of network?

Options:

A.

Centralized network

B.

Client-server network

C.

Peer-to-peer (P2P) network

D.

Virtual private network (VPN)

Buy Now
Questions 13

Ron has an older computer to which he frequently downloads and saves company files. He recently noticed that he was running low on disk space and decided to delete many old files that he no longer needed. He now notices that it takes a long time to open or save documents to his hard drive. Which maintenance task can help?

Options:

A.

Disk defragmentation

B.

chkdsk command

C.

fdisk command

D.

Disk cleanup

Buy Now
Questions 14

Which of the following computer system maintenance tasks can help improve file access performance?

Options:

A.

Use a SCSI drive instead of a SATA drive

B.

Use a SATA drive instead of an EIDE drive

C.

Defragment the drive using the following command: fdisk -d -w c:/

D.

Defragment the drive using the following command: defrag c: -w

Buy Now
Questions 15

ABC Company develops its own database applications. ABC is considering migrating to cloud services to accommodate the company’s growth. What strategy should ABC use to ensure continuous data protection if it begins using cloud services?

Options:

A.

Cloud-only solution

B.

Regional systems solution

C.

Location systems solution

D.

Multiple cloud-service providers

Buy Now
Questions 16

Selena has run out of memory on her phone’s SD card. She has decided to store the files she has accumulated on a third-party cloud service provider’s drives. Which of the following is a typical issue that she may encounter?

Options:

A.

The files become corrupted due to an attack from a hacker botnet.

B.

The files become unavailable whenever Internet connectivity is lost.

C.

The files become unavailable because they are being shared with other users.

D.

The files become corrupted because the provider uses a proprietary compression algorithm during transit.

Buy Now
Questions 17

Which of the following statement about virtualization is true?

Options:

A.

Virtualization enables multiple physical computers to run off of a single virtualized server.

B.

In virtualization, you run multiple virtual machines, provided they all use the same operating system.

C.

In virtualization, the operating systems of the virtual machines should match the host operating system.

D.

Virtualization enables you to run multiple operating systems and applications on a single computer.

Buy Now
Exam Code: 1D0-61C
Exam Name: Network Technology Associate
Last Update: Nov 20, 2024
Questions: 59
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now 1D0-61C