Networking Operations and Management (C2)

Networking Operations and Management (C2)

11th Grade

22 Qs

quiz-placeholder

Similar activities

Sets

Sets

11th Grade

21 Qs

EMPOWERMENT ONLINE QUIZ BEE 2

EMPOWERMENT ONLINE QUIZ BEE 2

11th Grade

20 Qs

CA - XI B Quiz 1

CA - XI B Quiz 1

11th Grade

20 Qs

FNaF1

FNaF1

4th - 12th Grade

19 Qs

School Mangement System ICT 0417 IGCSE

School Mangement System ICT 0417 IGCSE

10th - 12th Grade

18 Qs

Latihan Soal Administrasi Infrastruktur Jaringan XII TKJ

Latihan Soal Administrasi Infrastruktur Jaringan XII TKJ

10th - 12th Grade

20 Qs

Networking Operations and Management (C2)

Networking Operations and Management (C2)

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Melody Kelley

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following could be to blame if your computer is regularly crashing or restarting?

The processor is too hot.

You don't have enough memory.

You're dropping packets.

You've run out of bandwidth.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a best practice when establishing a baseline?

Establish baselines within a network or device's first week of installation.

Determine baselines over time by analyzing network traffic.

Establish baselines using only specialized tools.

Establish baselines only during the busiest times of the day.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Because of an unexplained slowdown on your network, you decide to install monitoring software on several key network hosts to locate the problem. You will then collect and analyze the data from a central network host.

Which protocol will the software use to detect the problem?

IPX

TCP/IP

SNMP

UDP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When an event occurs, the agent logs details regarding the event. What is this event called?

MIB

OID

Trap

Incident

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are concerned that an attacker can gain access to your web server, make modifications to the system, and alter the log files to hide his or her actions. Which of the following actions would BEST protect the log files?

Encrypt the log files.

Configure permissions on the log files to prevent access.

Take a hash of the log files.

Use Syslog to send log entries to another server.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Over the past few days, a server has gone offline and rebooted automatically several times. You would like to see a record of when each of these restarts occurred.

Which log type should you check?

Firewall

System

Performance

Security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Some users report that frequent system crashes have started happening on their workstations. Upon further investigation, you notice that these users all have received a recent update to the same application. Where would you go to conduct a root cause analysis?

Application log

Security log

Firewall log

Network log

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?