Connect SNMP, flow records, packet capture, baselines, log aggregation, API integration, and port mirroring to real support workflows.
Monitoring questions are really evidence questions. CompTIA is not asking you to name every telemetry source in the abstract. It is asking whether you know what kind of evidence you need before you reach for SNMP, flow data, packet capture, log aggregation, or mirrored traffic.
SPAN: Switch port analyzer, a feature that mirrors traffic to another port for inspection.
Baseline: A record of normal behavior that lets you tell the difference between expected variation and real trouble.
The best answers usually come from one clean distinction:
| Need | Best first source |
|---|---|
| interface health, utilization, status | SNMP or platform counters |
| who is talking to whom at a pattern level | flow data |
| exact headers, handshakes, or retransmissions | packet capture |
| event history and timestamps | logs / syslog |
| traffic from a specific switch port | SPAN or another mirroring method |
flowchart TD
A["Alert or complaint"] --> B["Check counters and health"]
B --> C["Check flow summaries or logs"]
C --> D["Use packet capture only if packet detail is now required"]
What to notice:
Without a baseline, normal spikes look like incidents and small degradations get ignored too long. Network+ wants you to understand that monitoring becomes useful only when:
110:02 interface utilization rises to 92%
210:03 flow data shows one backup target receiving most traffic
310:05 users report slow file access
What to notice:
1evidence_path:
2 - interface_utilization: high
3 - flow_summary: "backup server is top talker"
4 - syslog: "no link flap events"
5 - packet_capture: "only if retransmission or handshake detail is still needed"
What to notice:
Users report intermittent slowness to a file service every afternoon. SNMP shows rising uplink utilization, and flow data shows one backup target receiving most of the traffic during the same period. Logs show no interface flaps. What is the strongest next move?
A. Rebuild DNS because file shares are usually name-resolution problems B. Start full packet capture on every switch uplink immediately C. Treat the backup flow as the leading pressure source and verify whether the backup window is creating congestion D. Replace the core switch because utilization increased
Best answer: C
Why: The telemetry already points to a likely cause. Counters show pressure, flow data shows concentration, and logs do not show a physical flap pattern. The next strong step is to validate the backup-driven congestion theory before jumping to packet capture or hardware replacement.
Continue with 3.6 Disaster Recovery, RTO/RPO & Testing if your visibility model is solid.