The following are examples of proactive network management
except:

A. Allocate sufficient staff time

B. Troubleshooting and solving system problems

C. Generate reports

D. Identify Problems



The following are examples of proactive network management except: A. Allocate sufficient staff ..

Answer / guest

Answer: A

Proactive network management should include troubleshooting,
setting goals, generating reports, identifying problems, and
responding to change.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCDA Interview Questions

What are two services that the OSPF Hello protocol provides? A. It discovers neighbor routers B. It gets routes from neighbors during startup C. It helps elect a designated router D. It allows administrator to test for connectivity between two devices

1 Answers  


What happens when the hold-down timer expires? A. Routes are flushed from the routing table after the flush timer expires B. Routes are flushed from the routing table immediately C. Routes are never flushed D. A triggered update will reset the hold-down timer

1 Answers  


A device has 2 synchronous ports, 16 asynchronous ports, and one ethernet port. What is this device most likely to be? A. CSU/DSU B. Access Server C. Multiplexer D. ISDN Terminal Adapter

2 Answers  


Which condition does not create LAN media problems? A. Protocol doesn?t scale well B. Long wait for the token C. Excessive collisions D. Too many devices

1 Answers  


Which address is updated at each hop in the path in path switching?

1 Answers  






What should be looked at first to determine if a customer should switch from a hub environment to a switched environment? A. Investigate the number of broadcasts B. Investigate the number of collisions C. Determine what routing loops are present D. Determine which switching type is being used by the hubs

1 Answers  


What is an advantage of CHAP over PAP? A. Passwords are stored on separate servers in encrypted form B. CHAP sends passwords unencrypted to save connection time C. CHAP does not attempt to verify whether the user is authorized to access the requested resource D. ID?s and passwords are automatically stored in cache

1 Answers  


5. Which Two Settings must be configured in order to use the GUI to configure Call Admission Control with voice Applications

1 Answers   Pari Networks,


Diagramming application information flow is important because: A. it helps identify heavy traffic paths B. it helps figure out why email gets from one place to another C. it can tell you when to purchase a new router D. it can tell you when to purchase a new switch

2 Answers  


When designing a flat switched network you can have: A. the same number of IP and IPX nodes without performance degradation B. more IP than IPX nodes on the same segment C. more IPX than IP nodes on the same segment D. more AppleTalk than IP nodes on the same segment

1 Answers  


The following are the four steps in establishing an X.25 virtual circuit. Place them in the correct order. A. The PSE (Packet Switch Exchange) passes the packet to the next remote DCE B. The local DCE packet binder sends packet to the closest PSE (Packet Switch Exchange) C. The source DTE sends packet to the local DCE D. The remote DCE examines the packet header of destination DTE

1 Answers  


6. Which of these statements best describes VPLS ?

1 Answers   Pari Networks,


Categories