1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erica [24]
3 years ago
9

A network engineer arrives at work and discovers that many users are having problems when attempting to connect to the company n

etwork shared drives. The network operations center (NOC) technician just completed server upgrades the night before. To which of the following documents should the NOC technician refer to determine what potentially caused the connectivity problem?
A. Network maps
B. Cable management
C. Release notes
D. Change management
Computers and Technology
2 answers:
skad [1K]3 years ago
4 0

Answer: Change management

Explanation:

The change management document contains the entire details regarding the changes that could be brought about in the network. It starts with identifying the change, Then it goes for approval of the change and finally if it is approved then the change is implemented in the final step.

Some of the documents in change management are:

1. change management planning

2. the scope of the change

3. create the project plan for the identified scope.

4. The associated risk management plan.

S consulting the change management the NOC technician could know where the problem is as it contains detail of the data entry and the related risk  and mitigation's in the change management document.

Airida [17]3 years ago
3 0

Answer:

Change management is the correct answer.

Explanation:

In this case, it is necessary to mention that the change management document has the details that refer to the potential changes that can be applied in the network. First, it identifies the change; after that, it asks for approval of this change; in third and last, the change is put in practice whether it is approved.

You might be interested in
Creating a Numpy Array
jekas [21]
Oh my god that’s a lot did you find the answer tho???
3 0
2 years ago
Dave has to create animations for a game. Which tool can Dave use?
Shtirlitz [24]
What are your answer choices?
8 0
2 years ago
Terminal emulation, especially the unprotected ____________________ protocol, should be blocked from any access to all internal
Ivahew [28]

Answer:

telnet

Explanation:

<h2><u>Fill in the blanks </u></h2>

Terminal emulation, especially the unprotected <u>telnet </u>protocol, should be blocked from any access to all internal servers from the public network.

4 0
2 years ago
The latest form of personal communication that most resembles a public journal is a _____.
Airida [17]
The answer is b becuase a daily blog is a daily journal
8 0
2 years ago
Read 2 more answers
What kind of physical device is an evil twin access point? What does the evil twin do after initial association when the victim
Rufina [12.5K]

Answer:

A PC such as a notebook computer.The evil twin gets the encrypted frame from the affected host,A VPN  encrypts a  frame with its own VPN key.

Explanation:

The evil twin after initial association when the victim client will establish a secure wireless connection with the victim client. The connection uses a key client-EF for encryption such that when the host transmits an encrypted frame it is transmitted to the evil twin. A VPN is an encrypted virtual private network used to access networks that are not trusted. The client encrypts a frame with a VPN key (Key Client-Server) which it shares with the server. The frame is further encrypted by the key it shares with the evil twin (Victim Client-ET) The evil twin will then receive a double encrypted frame. However, it will only be able to decrypt the Victim Client-ET key but not the VPN key hence it will not be able to read the message sent through the frame.

7 0
3 years ago
Other questions:
  • .in the array based list implementation of the ADT what is the worst case time efficiency of the remove method?
    6·1 answer
  • Which type of styles can be applied to a word, phrase, or sentence?
    7·1 answer
  • Array testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full cre
    11·1 answer
  • How many of the colonists of Jamestown died before they made it to shore, due to the difficult voyage?
    15·1 answer
  • Plzz help.... <br><br>i will mark u as brainliest if u answer correct
    10·1 answer
  • A user tells a help desk technician that their browser is displaying a message that a site can't be
    14·1 answer
  • Who plays oblox .............................
    8·2 answers
  • The function below takes two arguments: a string (name) and an integer (position). Complete the function so that it prints out t
    7·1 answer
  • A timer is set after each frame is sent before waiting an ACK for that frame, how long does the timer take to be expired?
    10·1 answer
  • Which tools can help you gather information about the processes running on a windows operating system?
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!