T/F: Documenting and capturing an accurate picture of a network's physical and logical elements are initial steps in understanding the network.
T/F: The more data you gather while establishing your network's baseline, the less accurate your prediction will be.
T/F: The first step in configuration management is to take an inventory of each node on the network.
T/F: For a cabling upgrade, the best way to ensure that future upgrades go smoothly is to carefully document the existing cable after making any upgrades.
____ management is the collection, storage, and assessment of information related to the versions of software installed on every network device and every device's hardware configuration.
____ management refers to monitoring how well links and devices are keeping up with the demands placed on them.
The process where one network management console collects data from multiple networked devices at regular intervals is known as ____.
A network management agent is a ____ that collects information about a device's operation and provides it to the network management application.
____ involves manipulating certain characteristics of packets, data streams, or connections to manage the type and amount of traffic traversing a network or interface at any moment.
____is the local storage of frequently needed files that would otherwise be obtained from an external source.
A ____ is a network device devoted to storage and delivery of frequently requested files.
A key component in managing networks is identifying and tracking its hardware and software through ____ management.
A ____ is a correction, improvement, or enhancement to a particular piece of a software application.
____ upgrades represent modifications to all or part of an application that are designed to enhance functionality or fix problems related to software.
The process of reverting to a previous version of software after attempting to upgrade it is known as ____.
The most comprehensive and complex upgrade involving network hardware is a(n) ____ upgrade.
Because backbone upgrades are expensive and time consuming, the first step in approaching such a project is to ____ it.
____ refers to the assessment, monitoring, and maintenance of all aspects of a network.
On Windows-based computers an event log can be easily viewed with the GUI ___ application.
Describes a flaw in a software application that causes some part of the application to malfunction.
Requires telecommunications carriers and equipment manufacturers to provide for surveillance capabilities.