Users have been experiencing connection timeout issues when using a web-based program.
The network technician determines the problem happened due to a TTL setting that was set too low on the firewall.
Which of the following BEST enabled the network technician to reach this conclusion?
A.
Reviewing application logs B.
Reviewing a baseline report C.
Reviewing a vulnerability scan D.
Reviewing SLA requirements.
A.
Users have been experiencing connection timeout issues when using a web-based program.
The network technician determines the problem happened due to a TTL setting that was set too low on the firewall.
Which of the following BEST enabled the network technician to reach this conclusion?
A.
Reviewing application logs
B.
Reviewing a baseline report
C.
Reviewing a vulnerability scan
D.
Reviewing SLA requirements.
A.
The network technician was able to reach the conclusion that the connection timeout issues were caused by a TTL setting that was set too low on the firewall by reviewing application logs.
TTL (Time to Live) is a value in the IP header of packets that determines how long a packet can remain in the network before it is discarded. The purpose of TTL is to prevent packets from circulating endlessly in a network.
When a packet passes through a router, the TTL value is decreased by one. If the TTL value reaches zero, the packet is discarded. In the case of the connection timeout issues, the packets were not reaching their destination because their TTL value was reaching zero before they arrived.
Application logs contain detailed information about the events and transactions that occur within an application. By reviewing the application logs, the network technician could determine the source of the connection timeout issues and identify any errors or abnormalities that may have occurred. In this case, the technician may have noticed that the TTL value of the packets was reaching zero before they arrived at their destination, indicating that the TTL value was set too low on the firewall.
Reviewing a baseline report, a vulnerability scan, or SLA requirements would not provide the necessary information to identify the cause of the connection timeout issues. A baseline report provides a comparison of system performance over time, a vulnerability scan checks for security weaknesses, and SLA requirements define the level of service that is expected from a service provider.