Deck 12: Maintaining and Troubleshooting Your Network

ملء الشاشة (f)
exit full mode
سؤال
A ____ is an indicator of a quantity of an object that can be measured in some unit, such as percent, bytes sent per second, or number of reset connections, depending on what is appropriate to the object.

A)flag
B)counter
C)marker
D)delimiter
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
As defined in System Monitor, a(n)____ is a running line chart of the object that shows distinct peaks and valleys.

A)graph
B)histogram
C)report
D)image
سؤال
SNMP management systems in different communities can communicate with each other.
سؤال
Network Monitor supports ____ management, which enables a server administrator to set up filters to capture a certain event or type of network activity.

A)packet
B)activity
C)data
D)event
سؤال
____ is a TCP/IP service that converts a computer or domain name to an IP address, or that converts an IP address to a computer or domain name.

A)RCP
B)Ipconfig
C)ARP
D)DNS
سؤال
A(n)____ time domain reflectometer transmits a light wave instead of an electrical impulse.

A)sensory
B)scanning
C)sonic
D)optical
سؤال
The volcopy utility can back up to multiple tape drives.
سؤال
____ is used for network error reporting particularly through routers, showing whether or not a packet successfully reaches its destination.

A)UDP
B)ICMP
C)TCP
D)IP
سؤال
The default view of System Monitor is in the histogram mode.
سؤال
The ping command-line utility is an example of a network program that uses the OSI ____ layer.

A)Session
B)Data Link
C)Application
D)Presentation
سؤال
Windows XP, Windows Server 2003, and UNIX/Linux systems all support the use of the traceroute command-line utility to trace a network connection.
سؤال
In Windows XP or Windows Server 2003, type "____" (don't include the quotation marks)at the nslookup command-line prompt and press Enter to view the commands you can use to query the contents of a DNS server.

A)?
B)!
C)&
D)*
سؤال
A multimeter combines the functions of a voltmeter and an ohm meter.
سؤال
The SNMP management system (a computer running management software)sends and requests information from an SNMP ____.

A)agent
B)monitor
C)filter
D)protocol
سؤال
A(n)____ circuit is one where the connection is severed, such as a cable that is inadvertently cut in two.

A)open
B)closed
C)short
D)long
سؤال
Which of the following commands is used in the Windows version of the traceroute utility?

A)ping
B)netstat
C)tracert
D)tar
سؤال
With respect to System Monitor, a(n)____ exists when there are different elements to monitor, such as individual processes when you use the Process object.

A)entity
B)thread
C)instance
D)module
سؤال
A server administrator might regularly use ____ with the -s option to monitor a server during busy and light traffic times to get an idea of the typical number of packets sent at those times.

A)netstat
B)ping
C)traceroute
D)dump
سؤال
A cable ____ tester enables you to check for opens or breaks in a cable by determining if the signal sent from one end reaches the other end of the cable.

A)signal
B)transmission
C)continuity
D)integrity
سؤال
____ refers to a property of an Ethernet frame that includes a 2-byte code for the protocol type and is used in Ethernet communications by some vendors, but is not a part of the Ethernet standard.

A)PRE
B)ETYPE
C)SOF
D)DA
سؤال
Depending on the flavor of UNIX or Linux, a dump is restored via one of ____ commands.

A)two
B)three
C)four
D)five
سؤال
Available in some UNIX systems, the ____________________ utility is a binary backup that creates a mirror image of a disk onto the backup medium, such as a tape or CD.
سؤال
In both Windows and UNIX/Linux, ____________________ is used with switches that enable you to view specific network data.
سؤال
Identify four actions that you can perform using nslookup.
سؤال
Two of the most common problems on networks that do not use ____ or automatic private addressing are that the IP address or subnet mask are inappropriately configured.

A)SNMP
B)PPTP
C)IPSec
D)DHCP
سؤال
How does a time domain reflectometer (TDR)work?
سؤال
The ____ utility is designed for archiving tapes, and includes file information, as well as the archived files, such as security information and dates when files were modified.

A)ifconfig
B)ping
C)tar
D)linkup
سؤال
A(n)_________________________ is an error-checking technique used in network protocols to signal a communication problem.
سؤال
A(n)____ backup backs up all files that are marked with an archive attribute (which shows the file needs to be backed up)and removes the archive attribute from each file after the backup.

A)daily
B)periodic
C)incremental
D)comprehensive
سؤال
If a computer is unable to communicate because TCP/IP addressing is not configured correctly, how do you fix the problem?
سؤال
A broadcast ____ is a condition in which so many broadcasts are sent at the same time that the network bandwidth is saturated and the network slows significantly or times out.

A)chain
B)storm
C)flood
D)front
سؤال
Identify four ways to solve wireless networking problems.
سؤال
Identify seven pieces of information that you can view through netstat .
سؤال
How do the Network Monitor and Network Monitor Driver collaborate to collect and report information about network performance?
سؤال
What functions does a protocol analyzer perform at the Physical and Data Link layers of the OSI model?
سؤال
A ____ backup backs up all files that are marked with an archive attribute by the file system, but does not remove the archive attribute.

A)differential
B)daily
C)copy
D)full
سؤال
Describe the general techniques for backing up computers on the network.
سؤال
Cable ____________________, also called cable testers or cable performance testers, are used to test the length and other characteristics of coaxial, twisted-pair, or fiber-optic cable.
سؤال
Describe the functionality of the traceroute utility.
سؤال
The _________________________ service provides administrators with a way of centrally managing workstations, servers, hubs, and routers from a single computer running management software.
سؤال
Match between columns
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
MAU analyzer
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
protocol analyzer
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
nslookup utility
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
System Monitor
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
Network Monitor Driver
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
Service Access Point
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
dump utility
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
labelit utility
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
dropped frames
can be used to determine the primary DNS server on a network.
MAU analyzer
can be used to determine the primary DNS server on a network.
protocol analyzer
can be used to determine the primary DNS server on a network.
nslookup utility
can be used to determine the primary DNS server on a network.
System Monitor
can be used to determine the primary DNS server on a network.
Network Monitor Driver
can be used to determine the primary DNS server on a network.
Service Access Point
can be used to determine the primary DNS server on a network.
dump utility
can be used to determine the primary DNS server on a network.
labelit utility
can be used to determine the primary DNS server on a network.
dropped frames
can be used to monitor server components such as hard disks, memory, and the processor.
MAU analyzer
can be used to monitor server components such as hard disks, memory, and the processor.
protocol analyzer
can be used to monitor server components such as hard disks, memory, and the processor.
nslookup utility
can be used to monitor server components such as hard disks, memory, and the processor.
System Monitor
can be used to monitor server components such as hard disks, memory, and the processor.
Network Monitor Driver
can be used to monitor server components such as hard disks, memory, and the processor.
Service Access Point
can be used to monitor server components such as hard disks, memory, and the processor.
dump utility
can be used to monitor server components such as hard disks, memory, and the processor.
labelit utility
can be used to monitor server components such as hard disks, memory, and the processor.
dropped frames
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
MAU analyzer
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
protocol analyzer
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
nslookup utility
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
System Monitor
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
Network Monitor Driver
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
Service Access Point
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
dump utility
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
labelit utility
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
dropped frames
device used on token ring networks that provides information similar to a cable scanner.
MAU analyzer
device used on token ring networks that provides information similar to a cable scanner.
protocol analyzer
device used on token ring networks that provides information similar to a cable scanner.
nslookup utility
device used on token ring networks that provides information similar to a cable scanner.
System Monitor
device used on token ring networks that provides information similar to a cable scanner.
Network Monitor Driver
device used on token ring networks that provides information similar to a cable scanner.
Service Access Point
device used on token ring networks that provides information similar to a cable scanner.
dump utility
device used on token ring networks that provides information similar to a cable scanner.
labelit utility
device used on token ring networks that provides information similar to a cable scanner.
dropped frames
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
MAU analyzer
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
protocol analyzer
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
nslookup utility
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
System Monitor
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
Network Monitor Driver
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
Service Access Point
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
dump utility
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
labelit utility
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
dropped frames
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
MAU analyzer
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
protocol analyzer
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
nslookup utility
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
System Monitor
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
Network Monitor Driver
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
Service Access Point
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
dump utility
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
labelit utility
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
dropped frames
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
MAU analyzer
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
protocol analyzer
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
nslookup utility
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
System Monitor
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
Network Monitor Driver
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
Service Access Point
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
dump utility
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
labelit utility
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
dropped frames
backs up all files, files that have changed by date, or files that have changed after the previous backup.
MAU analyzer
backs up all files, files that have changed by date, or files that have changed after the previous backup.
protocol analyzer
backs up all files, files that have changed by date, or files that have changed after the previous backup.
nslookup utility
backs up all files, files that have changed by date, or files that have changed after the previous backup.
System Monitor
backs up all files, files that have changed by date, or files that have changed after the previous backup.
Network Monitor Driver
backs up all files, files that have changed by date, or files that have changed after the previous backup.
Service Access Point
backs up all files, files that have changed by date, or files that have changed after the previous backup.
dump utility
backs up all files, files that have changed by date, or files that have changed after the previous backup.
labelit utility
backs up all files, files that have changed by date, or files that have changed after the previous backup.
dropped frames
سؤال
If a network printing problem is related to the server or workstation, what are four areas you should check?
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Maintaining and Troubleshooting Your Network
1
A ____ is an indicator of a quantity of an object that can be measured in some unit, such as percent, bytes sent per second, or number of reset connections, depending on what is appropriate to the object.

A)flag
B)counter
C)marker
D)delimiter
B
2
As defined in System Monitor, a(n)____ is a running line chart of the object that shows distinct peaks and valleys.

A)graph
B)histogram
C)report
D)image
A
3
SNMP management systems in different communities can communicate with each other.
False
4
Network Monitor supports ____ management, which enables a server administrator to set up filters to capture a certain event or type of network activity.

A)packet
B)activity
C)data
D)event
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
5
____ is a TCP/IP service that converts a computer or domain name to an IP address, or that converts an IP address to a computer or domain name.

A)RCP
B)Ipconfig
C)ARP
D)DNS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
6
A(n)____ time domain reflectometer transmits a light wave instead of an electrical impulse.

A)sensory
B)scanning
C)sonic
D)optical
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
7
The volcopy utility can back up to multiple tape drives.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
8
____ is used for network error reporting particularly through routers, showing whether or not a packet successfully reaches its destination.

A)UDP
B)ICMP
C)TCP
D)IP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
9
The default view of System Monitor is in the histogram mode.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
10
The ping command-line utility is an example of a network program that uses the OSI ____ layer.

A)Session
B)Data Link
C)Application
D)Presentation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
11
Windows XP, Windows Server 2003, and UNIX/Linux systems all support the use of the traceroute command-line utility to trace a network connection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
12
In Windows XP or Windows Server 2003, type "____" (don't include the quotation marks)at the nslookup command-line prompt and press Enter to view the commands you can use to query the contents of a DNS server.

A)?
B)!
C)&
D)*
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
13
A multimeter combines the functions of a voltmeter and an ohm meter.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
14
The SNMP management system (a computer running management software)sends and requests information from an SNMP ____.

A)agent
B)monitor
C)filter
D)protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
15
A(n)____ circuit is one where the connection is severed, such as a cable that is inadvertently cut in two.

A)open
B)closed
C)short
D)long
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following commands is used in the Windows version of the traceroute utility?

A)ping
B)netstat
C)tracert
D)tar
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
17
With respect to System Monitor, a(n)____ exists when there are different elements to monitor, such as individual processes when you use the Process object.

A)entity
B)thread
C)instance
D)module
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
18
A server administrator might regularly use ____ with the -s option to monitor a server during busy and light traffic times to get an idea of the typical number of packets sent at those times.

A)netstat
B)ping
C)traceroute
D)dump
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
19
A cable ____ tester enables you to check for opens or breaks in a cable by determining if the signal sent from one end reaches the other end of the cable.

A)signal
B)transmission
C)continuity
D)integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
20
____ refers to a property of an Ethernet frame that includes a 2-byte code for the protocol type and is used in Ethernet communications by some vendors, but is not a part of the Ethernet standard.

A)PRE
B)ETYPE
C)SOF
D)DA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
21
Depending on the flavor of UNIX or Linux, a dump is restored via one of ____ commands.

A)two
B)three
C)four
D)five
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
22
Available in some UNIX systems, the ____________________ utility is a binary backup that creates a mirror image of a disk onto the backup medium, such as a tape or CD.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
23
In both Windows and UNIX/Linux, ____________________ is used with switches that enable you to view specific network data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
24
Identify four actions that you can perform using nslookup.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
25
Two of the most common problems on networks that do not use ____ or automatic private addressing are that the IP address or subnet mask are inappropriately configured.

A)SNMP
B)PPTP
C)IPSec
D)DHCP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
26
How does a time domain reflectometer (TDR)work?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
27
The ____ utility is designed for archiving tapes, and includes file information, as well as the archived files, such as security information and dates when files were modified.

A)ifconfig
B)ping
C)tar
D)linkup
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
28
A(n)_________________________ is an error-checking technique used in network protocols to signal a communication problem.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
29
A(n)____ backup backs up all files that are marked with an archive attribute (which shows the file needs to be backed up)and removes the archive attribute from each file after the backup.

A)daily
B)periodic
C)incremental
D)comprehensive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
30
If a computer is unable to communicate because TCP/IP addressing is not configured correctly, how do you fix the problem?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
31
A broadcast ____ is a condition in which so many broadcasts are sent at the same time that the network bandwidth is saturated and the network slows significantly or times out.

A)chain
B)storm
C)flood
D)front
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
32
Identify four ways to solve wireless networking problems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
33
Identify seven pieces of information that you can view through netstat .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
34
How do the Network Monitor and Network Monitor Driver collaborate to collect and report information about network performance?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
35
What functions does a protocol analyzer perform at the Physical and Data Link layers of the OSI model?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
36
A ____ backup backs up all files that are marked with an archive attribute by the file system, but does not remove the archive attribute.

A)differential
B)daily
C)copy
D)full
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
37
Describe the general techniques for backing up computers on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
38
Cable ____________________, also called cable testers or cable performance testers, are used to test the length and other characteristics of coaxial, twisted-pair, or fiber-optic cable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
39
Describe the functionality of the traceroute utility.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
40
The _________________________ service provides administrators with a way of centrally managing workstations, servers, hubs, and routers from a single computer running management software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
41
Match between columns
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
MAU analyzer
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
protocol analyzer
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
nslookup utility
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
System Monitor
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
Network Monitor Driver
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
Service Access Point
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
dump utility
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
labelit utility
frames that are discarded because they are improperly formed, such as failing to meet the appropriate packet size.
dropped frames
can be used to determine the primary DNS server on a network.
MAU analyzer
can be used to determine the primary DNS server on a network.
protocol analyzer
can be used to determine the primary DNS server on a network.
nslookup utility
can be used to determine the primary DNS server on a network.
System Monitor
can be used to determine the primary DNS server on a network.
Network Monitor Driver
can be used to determine the primary DNS server on a network.
Service Access Point
can be used to determine the primary DNS server on a network.
dump utility
can be used to determine the primary DNS server on a network.
labelit utility
can be used to determine the primary DNS server on a network.
dropped frames
can be used to monitor server components such as hard disks, memory, and the processor.
MAU analyzer
can be used to monitor server components such as hard disks, memory, and the processor.
protocol analyzer
can be used to monitor server components such as hard disks, memory, and the processor.
nslookup utility
can be used to monitor server components such as hard disks, memory, and the processor.
System Monitor
can be used to monitor server components such as hard disks, memory, and the processor.
Network Monitor Driver
can be used to monitor server components such as hard disks, memory, and the processor.
Service Access Point
can be used to monitor server components such as hard disks, memory, and the processor.
dump utility
can be used to monitor server components such as hard disks, memory, and the processor.
labelit utility
can be used to monitor server components such as hard disks, memory, and the processor.
dropped frames
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
MAU analyzer
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
protocol analyzer
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
nslookup utility
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
System Monitor
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
Network Monitor Driver
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
Service Access Point
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
dump utility
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
labelit utility
enables computer's NIC to collect statistics about network performance, such as the number of packets sent and received at that computer.
dropped frames
device used on token ring networks that provides information similar to a cable scanner.
MAU analyzer
device used on token ring networks that provides information similar to a cable scanner.
protocol analyzer
device used on token ring networks that provides information similar to a cable scanner.
nslookup utility
device used on token ring networks that provides information similar to a cable scanner.
System Monitor
device used on token ring networks that provides information similar to a cable scanner.
Network Monitor Driver
device used on token ring networks that provides information similar to a cable scanner.
Service Access Point
device used on token ring networks that provides information similar to a cable scanner.
dump utility
device used on token ring networks that provides information similar to a cable scanner.
labelit utility
device used on token ring networks that provides information similar to a cable scanner.
dropped frames
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
MAU analyzer
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
protocol analyzer
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
nslookup utility
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
System Monitor
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
Network Monitor Driver
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
Service Access Point
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
dump utility
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
labelit utility
device that works in promiscuous mode to capture detailed information about the traffic moving across a network, including protocol and OSI layer information.
dropped frames
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
MAU analyzer
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
protocol analyzer
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
nslookup utility
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
System Monitor
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
Network Monitor Driver
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
Service Access Point
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
dump utility
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
labelit utility
can label file systems or unmounted volumes to provide unique identification for each one copied in the backup.
dropped frames
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
MAU analyzer
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
protocol analyzer
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
nslookup utility
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
System Monitor
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
Network Monitor Driver
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
Service Access Point
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
dump utility
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
labelit utility
specifies the network process that should accept a frame at the destination, such as TCP/IP, BPDU, or IPX/SPX.
dropped frames
backs up all files, files that have changed by date, or files that have changed after the previous backup.
MAU analyzer
backs up all files, files that have changed by date, or files that have changed after the previous backup.
protocol analyzer
backs up all files, files that have changed by date, or files that have changed after the previous backup.
nslookup utility
backs up all files, files that have changed by date, or files that have changed after the previous backup.
System Monitor
backs up all files, files that have changed by date, or files that have changed after the previous backup.
Network Monitor Driver
backs up all files, files that have changed by date, or files that have changed after the previous backup.
Service Access Point
backs up all files, files that have changed by date, or files that have changed after the previous backup.
dump utility
backs up all files, files that have changed by date, or files that have changed after the previous backup.
labelit utility
backs up all files, files that have changed by date, or files that have changed after the previous backup.
dropped frames
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
42
If a network printing problem is related to the server or workstation, what are four areas you should check?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 42 في هذه المجموعة.