menu
bartleby
search
close search
Hit Return to see all results
close solutoin list

A regional bank manager asks you to help with an urgent network problem. Because of a sudden and severe network performance decline, the manager worries that the bank’s network might be suffering a DoS attack. Viewing which of the following types of network documentation would probably give you the quickest insight into what’s causing this problem? a. Wiring schematic b. Firewall log c. Logical network diagram d. The main file server’s system log e. Physical network diagram

BuyFindarrow_forward

Network+ Guide to Networks (MindTa...

8th Edition
Jill West + 2 others
Publisher: Cengage Learning
ISBN: 9781337569330

Solutions

Chapter
Section
BuyFindarrow_forward

Network+ Guide to Networks (MindTa...

8th Edition
Jill West + 2 others
Publisher: Cengage Learning
ISBN: 9781337569330
Chapter C, Problem 76MC
Textbook Problem
1 views

A regional bank manager asks you to help with an urgent network problem. Because of a sudden and severe network performance decline, the manager worries that the bank’s network might be suffering a DoS attack. Viewing which of the following types of network documentation would probably give you the quickest insight into what’s causing this problem?

  1. a. Wiring schematic
  2. b. Firewall log
  3. c. Logical network diagram
  4. d. The main file server’s system log
  5. e. Physical network diagram

Program Description Answer

The type of network documentation that provides insight of causing the problem is “Firewall log”.

Hence, the correct answer is option “B”.

Explanation of Solution

Given scenario and its recommendations:

A regional bank manager finds some network issues and on he asks help to clear the issue. Due to the severe network performance issue, the manager things that the bank’s network might be suffer from a DoS attack. The type of network documentation that provides insight of causing the problem is Firewall log.

Firewall log:

Firewall logs helps in filtering the internet traffic. It includes information about the source and destination IP address, protocol and port numbers.

  • It helps to determine the whether the Windows Firewall has any application failure.
  • With this, it is easy for the network administrator to identify the malicious activity occurring on the Internet.

Explanation for incorrect options:

Wiring schematic:

  • It is a pictorial representation of an electric circuit and it represents the components present in the circuit in required shapes...

Still sussing out bartleby?

Check out a sample textbook solution.

See a sample solution

The Solution to Your Study Problems

Bartleby provides explanations to thousands of textbook problems written by our experts, many with advanced degrees!

Get Started

Chapter C Solutions

Network+ Guide to Networks (MindTap Course List)
Show all chapter solutions
add
Ch. C - When using NAT, how does an IP gateway ensure that...Ch. C - Which of these authentication techniques only...Ch. C - You are a networking technician in a radiology...Ch. C - The software on a firewall you recently installed...Ch. C - Suppose you have created six subnets on a network...Ch. C - What would the command route del default gw...Ch. C - From your laptop, you need to remote into a switch...Ch. C - Recently, your companys WAN experienced a...Ch. C - Which of the following routing protocols offer...Ch. C - A friend calls you for help with his home office...Ch. C - Your organization contracts with a cloud computing...Ch. C - Ethernet and ATM both specify Data Link layer...Ch. C - What STP configuration ensures that a laptop...Ch. C - What is the default subnet mask for the IP address...Ch. C - Your CFO has approved installing new backbone...Ch. C - Which of the following is often used to secure...Ch. C - You are a support technician working in a data...Ch. C - You have purchased an outdoor access point capable...Ch. C - Which of the following is a single sign-on...Ch. C - Your organization has just ordered its first T1...Ch. C - Your friends printer isnt printing the document...Ch. C - A CEO fires her administrative assistant after the...Ch. C - What is the network ID for a class C network that...Ch. C - Your organization is reassessing its WAN...Ch. C - You are creating a new Linux server as a virtual...Ch. C - Which of the following requirements provide...Ch. C - You are rearranging nodes on your Gigabit Ethernet...Ch. C - As youre setting up APs in your clients office...Ch. C - Which of the following protocols encapsulates data...Ch. C - Which of the following is a valid MAC address? a....Ch. C - Which of the following services would be most...Ch. C - Its Friday night, and you have just settled in...Ch. C - A SIP trunk would most likely work in conjunction...Ch. C - Which technology can SIP trunking most adequately...Ch. C - Your network manager has purchased a dozen new,...Ch. C - You suspect that a machine on your network with...Ch. C - Youre installing a network management system and...Ch. C - You work for a small ISP. Several of your...Ch. C - You are a network administrator for a WAN that...Ch. C - In IPv6, which of the following is the loopback...Ch. C - In the process of troubleshooting an intermittent...Ch. C - You are setting up a new Windows 10 client to...Ch. C - Due to popular demand from employees who need to...Ch. C - You have installed a protocol analyzer on your...Ch. C - Which of the following does not accurately...Ch. C - You are pan of a team participating in a posture...Ch. C - Which of the following devices separates broadcast...Ch. C - About a year ago, you purchased and installed a...Ch. C - You have just returned from a business conference...Ch. C - Which of the following figures reflects the type...Ch. C - Your study partner is trying to access the...Ch. C - You work for a small fashion design firm. Because...Ch. C - You have just installed Linux on an old laptop to...Ch. C - You are the network administrator for a large...Ch. C - Which of the following devices operate only at the...Ch. C - While making some configuration changes to a...Ch. C - You have connected to your banks home page. Its...Ch. C - Which of the following routing protocols has the...Ch. C - You need to gather some information about the...Ch. C - To provide redundancy, you have set up three links...Ch. C - A Windows workstation is configured to use DHCP,...Ch. C - Used side-by-side with Kerberos, what service does...Ch. C - In the following figure, if switch A suffers a...Ch. C - A file server on your network is running Ubuntu...Ch. C - You want to add the five virtual machines that...Ch. C - A regional bank manager asks you to help with an...Ch. C - While troubleshooting a computers connection to...Ch. C - Which of the following commands lists active...Ch. C - On which of the following devices should you...Ch. C - Which of the following transmission media is most...Ch. C - Which of the following cellular technologies uses...Ch. C - While troubleshooting a printer problem, you...Ch. C - How does STP prevent or stop broadcast storms? a....Ch. C - What is the function of protocols and services at...Ch. C - You have created a new web server on a computer...Ch. C - Your 1000Base-T network is wired following the...Ch. C - Which authentication technology issues tickets to...Ch. C - Suppose your Windows laptops wireless network...Ch. C - You have just rearranged the access points on your...Ch. C - With which of these utilities can you require a...Ch. C - Which WAN technology uses a fixed message size but...Ch. C - Which of the following is a likely reason for...Ch. C - Which of the following wireless security...Ch. C - Your company is experiencing a growth spurt and is...Ch. C - A virtual switch includes several virtual ports,...Ch. C - Which OSI layer(s) operate differently in wired...Ch. C - As a networking professional, you might use a...Ch. C - Youre setting up a wireless network for a coffee...Ch. C - What type of device does this icon represent on a...Ch. C - While configuring your new SOHO router, youre...

Additional Engineering Textbook Solutions

Find more solutions based on key concepts
Show solutions add
What is meant by the phrase consumerization of IT?

Principles of Information Systems (MindTap Course List)

Explain the relationship between logical and physical design.

Systems Analysis and Design (Shelly Cashman Series) (MindTap Course List)

Determine the axial force in member BC of the frame. Note the joint D is a sliding pin.

International Edition---engineering Mechanics: Statics, 4th Edition

What is projectitis? How is it cured or its impact minimized?

Principles of Information Security (MindTap Course List)

With third-party extended warranties, it is easier to obtain quick service for your device than returning it to...

Enhanced Discovering Computers 2017 (Shelly Cashman Series) (MindTap Course List)

Briefly discuss the advantages and disadvantages of frequent software upgrades.

Principles of Information Systems (MindTap Course List)

Repeal Problem 5.4-1 for steel with Fy=65 ksi.

Steel Design (Activate Learning with these NEW titles from Engineering!)

VocabularyState the meaning of the following terms: Kilowatt-hour _____ Power _____ Kilowatt _____ Horsepower _...

Engineering Fundamentals: An Introduction to Engineering (MindTap Course List)

If your motherboard supports ECC DDR3 memory, can you substitute non-ECC DDR3 memory?

A+ Guide to Hardware (Standalone Book) (MindTap Course List)

What are some of the applications for the circular pattern in the flat position?

Welding: Principles and Applications (MindTap Course List)