what triggers an incident?
According to the ITIL® v3 framework, what triggers an incident?
what is the primary reason for implementing SLAs?
According to the ITIL® v3 framework, what is the primary reason for implementing SLAs?
Which of these messages has the highest numeric severity level?
Each syslog message has a numerical severity level assigned to generate error messages about
software or hardware malfunctions. Which of these messages has the highest numeric severity
level?
Which three of these methods can you use to back up a configuration running Cisco IOS Software Release 12.2 Ma
Which three of these methods can you use to back up a configuration running Cisco IOS Software
Release 12.2 Mainline? (Choose three)
What command would you type at the CLI of the router to capture information that would be lost when the router
A router is causing problems in the network and you want to capture as much information as you
can before you manually reload or power-cycle the router. What command would you type at the
CLI of the router to capture information that would be lost when the router is rebooted?
Which three steps are best practices in accurately documenting a network?
Which three steps are best practices in accurately documenting a network? (Choose three).
Which three steps would you use to troubleshoot a performance-related problem in the network core?
Which three steps would you use to troubleshoot a performance-related problem in the network
core? (Choose three.)
(Choose two.)
Which two steps are best practices to be followed while documenting a network. (Choose two.)
What is the advantage of using a passive monitoring technique?
What is the advantage of using a passive monitoring technique?