Which of the following is NOT one of the recommended steps to take in troubleshooting a networking problem?

A) Isolate and document the problem.
B) Escalate the problem to someone who can resolve it.
C) Resolve the problem.
D) Monitor the problem for an extended period.


D
Explanation: D) The three steps are problem isolation and documentation, resolve or escalate, and verify or monitor. The verification and monitoring are part of the solution, not the problem itself.

Computer Science & Information Technology

You might also like to view...

The________is the process that invokes os.fork.

a) child process. b) parent process. c) master process. d) None of the above.

Computer Science & Information Technology

Which of the following is not a disadvantage of trying to modify a sequential access file?

a. Modifying data can potentially destroy other data. b. It may be necessary to rewrite every record in the file to make a slight change. c. Things that are stored in the same number of “raw data” bytes internally may not take up the same amount of space in a file. d. Overwriting a record with another record of the same size is very difficult.

Computer Science & Information Technology

The computer that made personal computing legitimate in business and industry was the _________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Use the ____ style for side headings of reports.

A. Heading 1 B. Heading 2 C. Subtitle D. Title

Computer Science & Information Technology