Which of the following documents the cabling runs of a network, defining the type of connections, such as Gigabit Ethernet, T1, and so on?

A. configuration management
B. network diagram
C. wiring scheme
D. network map


Answer: C

Computer Science & Information Technology

You might also like to view...

In a struct, all members are ____________ by default

a. public b. private c. global d. all of the above

Computer Science & Information Technology

Give three examples of poor password choices. What is wrong with each? Include one that is too short. Give the error message the system displays.

What will be an ideal response?

Computer Science & Information Technology

Referring to the keysToIndexes function, what is the result of the following statement? keysToIndexes([39, 18, 4, 51, 6, 28], 9)

A. [4, 1, 5, 7, 6, 2] B. [3, 0, 4, 6, 6, 1] C. [2, 0, 3, 5, 5, 0] D. [8, 3, 6, 0, 1, 4]

Computer Science & Information Technology

To determine if the risk to an information asset is acceptable or not, you estimate the expected loss the organization will incur if the risk is exploited.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology