单选题Which of the following would contain information regarding network device alerts using SNMP?()ASyslogBAudit logCHistory logDPing sweep reports

单选题
Which of the following would contain information regarding network device alerts using SNMP?()
A

Syslog

B

Audit log

C

History log

D

Ping sweep reports


参考解析

解析: 暂无解析

相关考题:

A network technician wants to use a packet analyzer to troubleshoot a reported problem with auser‘s workstation with IP address 192.168.1.45. To identify the workstation‘s packets thetechnician wants to use the workstation‘s MAC address.Which of the following protocols would provide the needed information?()A.DHCPB.ARPC.DNSD.PING

A user in the accounting department reports that their office is able to connect to the network, butthey are unable to connect to the Internet.Which of the following documentation would be the MOST useful to the administrator in diagnosing this issue?() (Select TWO).A. Physical network diagramB. Job logC. Acceptable use policyD. Baseline documentationE. Wiring schematic

Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?() A. Disable TELNETB. Disable IGMP snoopingC. Enable TELNET but not SSLD. Disable ICMP/ping on device

Which of the following devices would allow a technician using a packet sniffer to view all the dataon a network?() A.GBICB.HubC.BridgeD.Modem

Which of the following would contain information regarding network device alerts using SNMP?() A. SyslogB. Audit logC. History logD. Ping sweep reports

While using the ping command to try and reach a local server, a technician receives a response of “Destination host unreachable”. After confirming that the PC is physically connected to the network, which of the following commands should the technician use to get more detailed information?()A、TRACERTB、GREPC、TELNETD、DIG

Which of the following would contain information regarding network device alerts using SNMP?()A、SyslogB、Audit logC、History logD、Ping sweep reports

Which of the following protocols can be used to retrieve system and network performance information from a router?()A、LDAPB、IMAPC、TFTPD、SNMP

Your IT manager has requested that you start providing weekly reports of CPU utilization on all network devices.Which monitoring function should be enabled on the MAG Series device?()A、Admin loggingB、SNMP loggingC、Syslog server loggingD、Event logging

Which of the following is not information provided from an IP phone to a Catalyst switch using  CDP?()A、 device PoE requirementsB、 device IP addressC、 device voice VLAN IDD、 device platform

While troubleshooting a network, you need to verify the liveness of hosts in the subnet 192.168.1.64/26. All of the hosts are able to reply to ping requests. How would you confirm the existing nodes using one single command?()A、ping 192.168.1.255B、ping with sweep optionC、ping 192.168.1.127D、ping 192.168.1.64E、ping with broadcast option

A network technician wants to use a packet analyzer to troubleshoot a reported problem with a user's workstation with IP address 192.168.1.45. To identify the workstation's packets the technician wants to use the workstation's MAC address. Which of the following protocols would provide the needed information?()A、DHCPB、ARPC、DNSD、PING

Which of the following devices would allow a technician using a packet sniffer to view all the dataon a network?()A、GBICB、HubC、BridgeD、Modem

A user reports they can no longer change the web browser home page. Which of the following is MOSTlikely the problem? ()A、They are using the wrong WEP key.B、They have been infected with malware.C、They have lost Internet connectivity.D、They need to update their network device drivers.

Which of the following locations would a technician use to add a Windows 7 computer to adomain?()A、System PropertiesB、Windows DefenderC、Network and Sharing CenterD、Device Manager

Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()A、Disable TELNETB、Disable IGMP snoopingC、Enable TELNET but not SSLD、Disable ICMP/ping on device

A program is crashing and causing the computer to lockup. Which of the following is the BESTlocation for a technician to check for further information about the cause of the crash?()A、Application logB、File Replication logC、System logD、Security log

A technician is troubleshooting a workstation that has the wrong time information. All workstations should be pointing to a central NTP server. Which of the following locations would the technician check to investigate error messages related to this issue?()A、IIS logB、Application logC、System logD、Security log

A user in the accounting department reports that their office is able to connect to the network, but they are unable to connect to the Internet. Which of the following documentation would be the MOST useful to the administrator in diagnosing this issue?() (Select TWO).A、Physical network diagramB、Job logC、Acceptable use policyD、Baseline documentationE、Wiring schematic

An administrator would like to know the name of the workstation that is being repaired. Which ofthe following commands, without parameters, will provide this information?()A、HostnameB、IpconfigC、NetstatD、Ping

Which of the following commands would MOST likely be used to see where a loss of connectivity between two devices on a network is located?()A、tracertB、netstatC、nslookupD、ping

Which log contains information about service restarts, system errors, warnings, and requests to check server connectivity? ()A、Events logB、System logC、User Access logD、Admin Access log

单选题Which of the following is not information provided from an IP phone to a Catalyst switch using  CDP?()A device PoE requirementsB device IP addressC device voice VLAN IDD device platform

单选题Which of the following devices would allow a technician using a packet sniffer to view all the dataon a network?()AGBICBHubCBridgeDModem

单选题A user reports they can no longer change the web browser home page. Which of the following is MOSTlikely the problem? ()AThey are using the wrong WEP key.BThey have been infected with malware.CThey have lost Internet connectivity.DThey need to update their network device drivers.

单选题Which of the following mitigation techniques would an administrator apply to a device in order torestrict remote access?()ADisable TELNETBDisable IGMP snoopingCEnable TELNET but not SSLDDisable ICMP/ping on device

单选题While using the ping command to try and reach a local server, a technician receives a response of “Destination host unreachable”. After confirming that the PC is physically connected to the network, which of the following commands should the technician use to get more detailed information?()ATRACERTBGREPCTELNETDDIG