The following are examples of proactive network management
except:

A. Allocate sufficient staff time

B. Troubleshooting and solving system problems

C. Generate reports

D. Identify Problems



The following are examples of proactive network management except: A. Allocate sufficient staff ..

Answer / guest

Answer: A

Proactive network management should include troubleshooting,
setting goals, generating reports, identifying problems, and
responding to change.

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCDA Interview Questions

What set of Frame Relay enhancements offer extensions for managing complex internetworks? A. CMT B. SNMP C. LMI D. RMON

1 Answers  


What protocol advertises Netware services to network clients? (Type acronym).

1 Answers  


Match the following devices with the correct description. A. Switch 1. Operates at the physical layer and extends the cable as if it is a single cable. B. Router 2. Operates at the physical layer and connects all connections into one device or concentrator. C. Repeater 3. Operates at the network layer and can filter both hardware and network addresses. D. Hub 4. Works at the Data-Link layer and transmits a digital signal only to the specific port where the destination MAC address is located.

1 Answers  


Which of the following does not specify an application requirement that affects your network design? A. The number of users B. The peak hours that the applications are used C. The types of applications used D. Security risks

1 Answers  


What is not a function of the distribution layer? A. Routing between VLANs B. Implement tools such as access lists, packet filtering, and queuing C. Implement security and network policies D. Provide workgroup/user access to the network

1 Answers  






What is an advantage of CHAP over PAP? A. Passwords are stored on separate servers in encrypted form B. CHAP sends passwords unencrypted to save connection time C. CHAP does not attempt to verify whether the user is authorized to access the requested resource D. ID?s and passwords are automatically stored in cache

1 Answers  


What network design is becoming common when there is a central office with one or more remote locations? A. ISDN PRI at the central location and ISDN BRI at the remote locations. B. Using core routers at all sites C. Only using access routers D. Using a full mesh network

1 Answers  


How can change k-value in EIGRP configuration.

1 Answers  


You may receive a case study including Token Ring and Ethernet, so you may want to look at any constraints with cabling between Token Ring and Ethernet networks. Which statement describes the constraints imposed by the existing network? A. Replace all cabling B. Test all cabling C. Do not replace cabling D. Use microwave instead of cabling

1 Answers  


What are two ways to connect a PC to a LAN when using ATM (Asynchronous Transfer Mode)? A. ATM endpoint B. ATM LAPB C. ATM router D. ATM switch

1 Answers  


What is the standard ethernet cabling specification? (not IEEE 802.3) A. STP B. Coax (thin) C. Coax (thick) D. UTP

1 Answers  


When designing a flat switched network you can have: A. the same number of IP and IPX nodes without performance degradation B. more IP than IPX nodes on the same segment C. more IPX than IP nodes on the same segment D. more AppleTalk than IP nodes on the same segment

1 Answers  


Categories