Deck 12: Maintaining and Troubleshooting Your Network

Full screen (f)
exit full mode
Question
A ____ is an indicator of a quantity of an object that can be measured in some unit, such as percent, bytes sent per second, or number of reset connections, depending on what is appropriate to the object.

A)flag
B)counter
C)marker
D)delimiter
Use Space or
up arrow
down arrow
to flip the card.
Question
As defined in System Monitor, a(n)____ is a running line chart of the object that shows distinct peaks and valleys.

A)graph
B)histogram
C)report
D)image
Question
SNMP management systems in different communities can communicate with each other.
Question
Network Monitor supports ____ management, which enables a server administrator to set up filters to capture a certain event or type of network activity.

A)packet
B)activity
C)data
D)event
Question
____ is a TCP/IP service that converts a computer or domain name to an IP address, or that converts an IP address to a computer or domain name.

A)RCP
B)Ipconfig
C)ARP
D)DNS
Question
A(n)____ time domain reflectometer transmits a light wave instead of an electrical impulse.

A)sensory
B)scanning
C)sonic
D)optical
Question
The volcopy utility can back up to multiple tape drives.
Question
____ is used for network error reporting particularly through routers, showing whether or not a packet successfully reaches its destination.

A)UDP
B)ICMP
C)TCP
D)IP
Question
The default view of System Monitor is in the histogram mode.
Question
The ping command-line utility is an example of a network program that uses the OSI ____ layer.

A)Session
B)Data Link
C)Application
D)Presentation
Question
Windows XP, Windows Server 2003, and UNIX/Linux systems all support the use of the traceroute command-line utility to trace a network connection.
Question
In Windows XP or Windows Server 2003, type "____" (don't include the quotation marks)at the nslookup command-line prompt and press Enter to view the commands you can use to query the contents of a DNS server.

A)?
B)!
C)&
D)*
Question
A multimeter combines the functions of a voltmeter and an ohm meter.
Question
The SNMP management system (a computer running management software)sends and requests information from an SNMP ____.

A)agent
B)monitor
C)filter
D)protocol
Question
A(n)____ circuit is one where the connection is severed, such as a cable that is inadvertently cut in two.

A)open
B)closed
C)short
D)long
Question
Which of the following commands is used in the Windows version of the traceroute utility?

A)ping
B)netstat
C)tracert
D)tar
Question
With respect to System Monitor, a(n)____ exists when there are different elements to monitor, such as individual processes when you use the Process object.

A)entity
B)thread
C)instance
D)module
Question
A server administrator might regularly use ____ with the -s option to monitor a server during busy and light traffic times to get an idea of the typical number of packets sent at those times.

A)netstat
B)ping
C)traceroute
D)dump
Question
A cable ____ tester enables you to check for opens or breaks in a cable by determining if the signal sent from one end reaches the other end of the cable.

A)signal
B)transmission
C)continuity
D)integrity
Question
____ refers to a property of an Ethernet frame that includes a 2-byte code for the protocol type and is used in Ethernet communications by some vendors, but is not a part of the Ethernet standard.

A)PRE
B)ETYPE
C)SOF
D)DA
Question
Depending on the flavor of UNIX or Linux, a dump is restored via one of ____ commands.

A)two
B)three
C)four
D)five
Question
Available in some UNIX systems, the ____________________ utility is a binary backup that creates a mirror image of a disk onto the backup medium, such as a tape or CD.
Question
In both Windows and UNIX/Linux, ____________________ is used with switches that enable you to view specific network data.
Question
Identify four actions that you can perform using nslookup.
Question
Two of the most common problems on networks that do not use ____ or automatic private addressing are that the IP address or subnet mask are inappropriately configured.

A)SNMP
B)PPTP
C)IPSec
D)DHCP
Question
How does a time domain reflectometer (TDR)work?
Question
The ____ utility is designed for archiving tapes, and includes file information, as well as the archived files, such as security information and dates when files were modified.

A)ifconfig
B)ping
C)tar
D)linkup
Question
A(n)_________________________ is an error-checking technique used in network protocols to signal a communication problem.
Question
A(n)____ backup backs up all files that are marked with an archive attribute (which shows the file needs to be backed up)and removes the archive attribute from each file after the backup.

A)daily
B)periodic
C)incremental
D)comprehensive
Question
If a computer is unable to communicate because TCP/IP addressing is not configured correctly, how do you fix the problem?
Question
A broadcast ____ is a condition in which so many broadcasts are sent at the same time that the network bandwidth is saturated and the network slows significantly or times out.

A)chain
B)storm
C)flood
D)front
Question
Identify four ways to solve wireless networking problems.
Question
Identify seven pieces of information that you can view through netstat .
Question
How do the Network Monitor and Network Monitor Driver collaborate to collect and report information about network performance?
Question
What functions does a protocol analyzer perform at the Physical and Data Link layers of the OSI model?
Question
A ____ backup backs up all files that are marked with an archive attribute by the file system, but does not remove the archive attribute.

A)differential
B)daily
C)copy
D)full
Question
Describe the general techniques for backing up computers on the network.
Question
Cable ____________________, also called cable testers or cable performance testers, are used to test the length and other characteristics of coaxial, twisted-pair, or fiber-optic cable.
Question
Describe the functionality of the traceroute utility.
Question
The _________________________ service provides administrators with a way of centrally managing workstations, servers, hubs, and routers from a single computer running management software.
Question
Match between columns
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
MAU analyzer
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
protocol analyzer
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
nslookup utility
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
System Monitor
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
Network Monitor Driver
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
Service Access Point
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
dump utility
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
labelit utility
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
dropped frames
can be used to determine the primary DNS server on a network.
MAU analyzer
can be used to determine the primary DNS server on a network.
protocol analyzer
can be used to determine the primary DNS server on a network.
nslookup utility
can be used to determine the primary DNS server on a network.
System Monitor
can be used to determine the primary DNS server on a network.
Network Monitor Driver
can be used to determine the primary DNS server on a network.
Service Access Point
can be used to determine the primary DNS server on a network.
dump utility
can be used to determine the primary DNS server on a network.
labelit utility
can be used to determine the primary DNS server on a network.
dropped frames
can be used to monitor server components such as hard disks, memory, and the processor.
MAU analyzer
can be used to monitor server components such as hard disks, memory, and the processor.
protocol analyzer
can be used to monitor server components such as hard disks, memory, and the processor.
nslookup utility
can be used to monitor server components such as hard disks, memory, and the processor.
System Monitor
can be used to monitor server components such as hard disks, memory, and the processor.
Network Monitor Driver
can be used to monitor server components such as hard disks, memory, and the processor.
Service Access Point
can be used to monitor server components such as hard disks, memory, and the processor.
dump utility
can be used to monitor server components such as hard disks, memory, and the processor.
labelit utility
can be used to monitor server components such as hard disks, memory, and the processor.
dropped frames
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
MAU analyzer
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
protocol analyzer
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
nslookup utility
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
System Monitor
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
Network Monitor Driver
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
Service Access Point
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
dump utility
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
labelit utility
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
dropped frames
device used on token ring networks that provides information similar to a cable scanner.
MAU analyzer
device used on token ring networks that provides information similar to a cable scanner.
protocol analyzer
device used on token ring networks that provides information similar to a cable scanner.
nslookup utility
device used on token ring networks that provides information similar to a cable scanner.
System Monitor
device used on token ring networks that provides information similar to a cable scanner.
Network Monitor Driver
device used on token ring networks that provides information similar to a cable scanner.
Service Access Point
device used on token ring networks that provides information similar to a cable scanner.
dump utility
device used on token ring networks that provides information similar to a cable scanner.
labelit utility
device used on token ring networks that provides information similar to a cable scanner.
dropped frames
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
MAU analyzer
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
protocol analyzer
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
nslookup utility
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
System Monitor
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
Network Monitor Driver
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
Service Access Point
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
dump utility
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
labelit utility
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
dropped frames
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
MAU analyzer
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
protocol analyzer
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
nslookup utility
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
System Monitor
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
Network Monitor Driver
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
Service Access Point
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
dump utility
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
labelit utility
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
dropped frames
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
MAU analyzer
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
protocol analyzer
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
nslookup utility
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
System Monitor
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
Network Monitor Driver
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
Service Access Point
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
dump utility
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
labelit utility
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
dropped frames
backs up all files, files that have changed by date, or files that have changed after the previous backup.
MAU analyzer
backs up all files, files that have changed by date, or files that have changed after the previous backup.
protocol analyzer
backs up all files, files that have changed by date, or files that have changed after the previous backup.
nslookup utility
backs up all files, files that have changed by date, or files that have changed after the previous backup.
System Monitor
backs up all files, files that have changed by date, or files that have changed after the previous backup.
Network Monitor Driver
backs up all files, files that have changed by date, or files that have changed after the previous backup.
Service Access Point
backs up all files, files that have changed by date, or files that have changed after the previous backup.
dump utility
backs up all files, files that have changed by date, or files that have changed after the previous backup.
labelit utility
backs up all files, files that have changed by date, or files that have changed after the previous backup.
dropped frames
Question
If a network printing problem is related to the server or workstation, what are four areas you should check?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Maintaining and Troubleshooting Your Network
1
A ____ is an indicator of a quantity of an object that can be measured in some unit, such as percent, bytes sent per second, or number of reset connections, depending on what is appropriate to the object.

A)flag
B)counter
C)marker
D)delimiter
B
2
As defined in System Monitor, a(n)____ is a running line chart of the object that shows distinct peaks and valleys.

A)graph
B)histogram
C)report
D)image
A
3
SNMP management systems in different communities can communicate with each other.
False
4
Network Monitor supports ____ management, which enables a server administrator to set up filters to capture a certain event or type of network activity.

A)packet
B)activity
C)data
D)event
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
____ is a TCP/IP service that converts a computer or domain name to an IP address, or that converts an IP address to a computer or domain name.

A)RCP
B)Ipconfig
C)ARP
D)DNS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
A(n)____ time domain reflectometer transmits a light wave instead of an electrical impulse.

A)sensory
B)scanning
C)sonic
D)optical
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The volcopy utility can back up to multiple tape drives.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
____ is used for network error reporting particularly through routers, showing whether or not a packet successfully reaches its destination.

A)UDP
B)ICMP
C)TCP
D)IP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
The default view of System Monitor is in the histogram mode.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
The ping command-line utility is an example of a network program that uses the OSI ____ layer.

A)Session
B)Data Link
C)Application
D)Presentation
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
Windows XP, Windows Server 2003, and UNIX/Linux systems all support the use of the traceroute command-line utility to trace a network connection.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
In Windows XP or Windows Server 2003, type "____" (don't include the quotation marks)at the nslookup command-line prompt and press Enter to view the commands you can use to query the contents of a DNS server.

A)?
B)!
C)&
D)*
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
A multimeter combines the functions of a voltmeter and an ohm meter.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
The SNMP management system (a computer running management software)sends and requests information from an SNMP ____.

A)agent
B)monitor
C)filter
D)protocol
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
A(n)____ circuit is one where the connection is severed, such as a cable that is inadvertently cut in two.

A)open
B)closed
C)short
D)long
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following commands is used in the Windows version of the traceroute utility?

A)ping
B)netstat
C)tracert
D)tar
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
With respect to System Monitor, a(n)____ exists when there are different elements to monitor, such as individual processes when you use the Process object.

A)entity
B)thread
C)instance
D)module
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
A server administrator might regularly use ____ with the -s option to monitor a server during busy and light traffic times to get an idea of the typical number of packets sent at those times.

A)netstat
B)ping
C)traceroute
D)dump
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
A cable ____ tester enables you to check for opens or breaks in a cable by determining if the signal sent from one end reaches the other end of the cable.

A)signal
B)transmission
C)continuity
D)integrity
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
____ refers to a property of an Ethernet frame that includes a 2-byte code for the protocol type and is used in Ethernet communications by some vendors, but is not a part of the Ethernet standard.

A)PRE
B)ETYPE
C)SOF
D)DA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
Depending on the flavor of UNIX or Linux, a dump is restored via one of ____ commands.

A)two
B)three
C)four
D)five
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
Available in some UNIX systems, the ____________________ utility is a binary backup that creates a mirror image of a disk onto the backup medium, such as a tape or CD.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
In both Windows and UNIX/Linux, ____________________ is used with switches that enable you to view specific network data.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Identify four actions that you can perform using nslookup.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
Two of the most common problems on networks that do not use ____ or automatic private addressing are that the IP address or subnet mask are inappropriately configured.

A)SNMP
B)PPTP
C)IPSec
D)DHCP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
How does a time domain reflectometer (TDR)work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
The ____ utility is designed for archiving tapes, and includes file information, as well as the archived files, such as security information and dates when files were modified.

A)ifconfig
B)ping
C)tar
D)linkup
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
A(n)_________________________ is an error-checking technique used in network protocols to signal a communication problem.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
A(n)____ backup backs up all files that are marked with an archive attribute (which shows the file needs to be backed up)and removes the archive attribute from each file after the backup.

A)daily
B)periodic
C)incremental
D)comprehensive
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
If a computer is unable to communicate because TCP/IP addressing is not configured correctly, how do you fix the problem?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
A broadcast ____ is a condition in which so many broadcasts are sent at the same time that the network bandwidth is saturated and the network slows significantly or times out.

A)chain
B)storm
C)flood
D)front
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
Identify four ways to solve wireless networking problems.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Identify seven pieces of information that you can view through netstat .
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
How do the Network Monitor and Network Monitor Driver collaborate to collect and report information about network performance?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
What functions does a protocol analyzer perform at the Physical and Data Link layers of the OSI model?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
A ____ backup backs up all files that are marked with an archive attribute by the file system, but does not remove the archive attribute.

A)differential
B)daily
C)copy
D)full
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
Describe the general techniques for backing up computers on the network.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Cable ____________________, also called cable testers or cable performance testers, are used to test the length and other characteristics of coaxial, twisted-pair, or fiber-optic cable.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Describe the functionality of the traceroute utility.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
The _________________________ service provides administrators with a way of centrally managing workstations, servers, hubs, and routers from a single computer running management software.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
MAU analyzer
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
protocol analyzer
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
nslookup utility
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
System Monitor
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
Network Monitor Driver
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
Service Access Point
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
dump utility
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
labelit utility
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
dropped frames
can be used to determine the primary DNS server on a network.
MAU analyzer
can be used to determine the primary DNS server on a network.
protocol analyzer
can be used to determine the primary DNS server on a network.
nslookup utility
can be used to determine the primary DNS server on a network.
System Monitor
can be used to determine the primary DNS server on a network.
Network Monitor Driver
can be used to determine the primary DNS server on a network.
Service Access Point
can be used to determine the primary DNS server on a network.
dump utility
can be used to determine the primary DNS server on a network.
labelit utility
can be used to determine the primary DNS server on a network.
dropped frames
can be used to monitor server components such as hard disks, memory, and the processor.
MAU analyzer
can be used to monitor server components such as hard disks, memory, and the processor.
protocol analyzer
can be used to monitor server components such as hard disks, memory, and the processor.
nslookup utility
can be used to monitor server components such as hard disks, memory, and the processor.
System Monitor
can be used to monitor server components such as hard disks, memory, and the processor.
Network Monitor Driver
can be used to monitor server components such as hard disks, memory, and the processor.
Service Access Point
can be used to monitor server components such as hard disks, memory, and the processor.
dump utility
can be used to monitor server components such as hard disks, memory, and the processor.
labelit utility
can be used to monitor server components such as hard disks, memory, and the processor.
dropped frames
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
MAU analyzer
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
protocol analyzer
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
nslookup utility
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
System Monitor
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
Network Monitor Driver
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
Service Access Point
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
dump utility
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
labelit utility
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
dropped frames
device used on token ring networks that provides information similar to a cable scanner.
MAU analyzer
device used on token ring networks that provides information similar to a cable scanner.
protocol analyzer
device used on token ring networks that provides information similar to a cable scanner.
nslookup utility
device used on token ring networks that provides information similar to a cable scanner.
System Monitor
device used on token ring networks that provides information similar to a cable scanner.
Network Monitor Driver
device used on token ring networks that provides information similar to a cable scanner.
Service Access Point
device used on token ring networks that provides information similar to a cable scanner.
dump utility
device used on token ring networks that provides information similar to a cable scanner.
labelit utility
device used on token ring networks that provides information similar to a cable scanner.
dropped frames
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
MAU analyzer
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
protocol analyzer
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
nslookup utility
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
System Monitor
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
Network Monitor Driver
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
Service Access Point
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
dump utility
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
labelit utility
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
dropped frames
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
MAU analyzer
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
protocol analyzer
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
nslookup utility
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
System Monitor
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
Network Monitor Driver
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
Service Access Point
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
dump utility
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
labelit utility
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
dropped frames
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
MAU analyzer
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
protocol analyzer
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
nslookup utility
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
System Monitor
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
Network Monitor Driver
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
Service Access Point
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
dump utility
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
labelit utility
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
dropped frames
backs up all files, files that have changed by date, or files that have changed after the previous backup.
MAU analyzer
backs up all files, files that have changed by date, or files that have changed after the previous backup.
protocol analyzer
backs up all files, files that have changed by date, or files that have changed after the previous backup.
nslookup utility
backs up all files, files that have changed by date, or files that have changed after the previous backup.
System Monitor
backs up all files, files that have changed by date, or files that have changed after the previous backup.
Network Monitor Driver
backs up all files, files that have changed by date, or files that have changed after the previous backup.
Service Access Point
backs up all files, files that have changed by date, or files that have changed after the previous backup.
dump utility
backs up all files, files that have changed by date, or files that have changed after the previous backup.
labelit utility
backs up all files, files that have changed by date, or files that have changed after the previous backup.
dropped frames
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
If a network printing problem is related to the server or workstation, what are four areas you should check?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.