Networking Operations and Management (C2)

Networking Operations and Management (C2)

11th Grade

22 Qs

quiz-placeholder

Similar activities

UH - 01 VII

UH - 01 VII

1st - 12th Grade

20 Qs

Microsoft Excel

Microsoft Excel

KG - Professional Development

20 Qs

CÂU HỎI ÔN TAP HKI

CÂU HỎI ÔN TAP HKI

5th Grade - University

21 Qs

Tech Trivia, Part III

Tech Trivia, Part III

7th - 12th Grade

20 Qs

Data Manipulation IGCSE (Introduction to database) Grade 10

Data Manipulation IGCSE (Introduction to database) Grade 10

10th - 11th Grade

20 Qs

Yr 11 ICT quiz 1 Networks & Security

Yr 11 ICT quiz 1 Networks & Security

10th - 11th Grade

20 Qs

Primary storage

Primary storage

9th - 11th Grade

20 Qs

Komunikasi dalam Jaringan

Komunikasi dalam Jaringan

10th - 12th Grade

21 Qs

Networking Operations and Management (C2)

Networking Operations and Management (C2)

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Melody Kelley

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following could be to blame if your computer is regularly crashing or restarting?

The processor is too hot.

You don't have enough memory.

You're dropping packets.

You've run out of bandwidth.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a best practice when establishing a baseline?

Establish baselines within a network or device's first week of installation.

Determine baselines over time by analyzing network traffic.

Establish baselines using only specialized tools.

Establish baselines only during the busiest times of the day.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Because of an unexplained slowdown on your network, you decide to install monitoring software on several key network hosts to locate the problem. You will then collect and analyze the data from a central network host.

Which protocol will the software use to detect the problem?

IPX

TCP/IP

SNMP

UDP

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When an event occurs, the agent logs details regarding the event. What is this event called?

MIB

OID

Trap

Incident

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are concerned that an attacker can gain access to your web server, make modifications to the system, and alter the log files to hide his or her actions. Which of the following actions would BEST protect the log files?

Encrypt the log files.

Configure permissions on the log files to prevent access.

Take a hash of the log files.

Use Syslog to send log entries to another server.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Over the past few days, a server has gone offline and rebooted automatically several times. You would like to see a record of when each of these restarts occurred.

Which log type should you check?

Firewall

System

Performance

Security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Some users report that frequent system crashes have started happening on their workstations. Upon further investigation, you notice that these users all have received a recent update to the same application. Where would you go to conduct a root cause analysis?

Application log

Security log

Firewall log

Network log

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?