CIW 1D0 61C
Q: 1
Security attacks can vary greatly. Which type of attack is characterized as an attempt to trick an
individual into revealing confidential or private information?
Options
Q: 2
Jenny recently switched from broadband cable Internet to ADSL service with her local phone
company. To economize, she chose the self-installation option. It appears that her ADSL modem is
not allowing her to connect to the Internet. Which setting should she check first?
Options
Q: 3
Which of the following is a disadvantage of implementing a Bring Your Own Device (BYOD) policy in a
company?
Options
Q: 4
Sam is a professor at a small college. Due to a scheduling conflict, he was unable to obtain access to
the computer lab to give the final exam. As an alternative, he asked students to bring their own
devices (BYOD) and connect to the college’s Wi-Fi for network access. What security risk is associated
with this implementation?
Options
Q: 5
Configuring a wireless network involves several steps. Which of the following is a task that should be
performed to configure and connect to a wireless network?
Options
Q: 6
You have recently purchased a new wireless router. You would like to configure a name for your
wireless network so that you can easily identify it when scanning available wireless networks. Which
term describes this wireless network device name?
Options
Q: 7
Server-based networks typically contain centralized network resources, which are usually not
available on peer-to-peer (P2P) networks. Which of the following examples describes a server based
network?
Options
Q: 8
Which type of attack is a form of social engineering in which an attacker attempts to steal personal or
confidential information by sending e-mail that lures unsuspecting victims to log in to an authentic-
looking but imposter Web site?
Options
Q: 9
What does the following represent?
2E22:4F00:000E:00D0:A267:97FF:FE6B:FE34
Options
Q: 10
You are a computer technician supporting a small 15-computer Internet lab. The computers are
regularly used to browse the Internet and download files. Users have recently complained that they
receive error messages saying the hard disk is full or out of space. You suspect this is a result of a
large amount of temporary Internet files. Which of the following is a way to easily delete all the
temporary Internet files?
Options
Question 1 of 10