Describe the divide and conquer method for tackling multiple options.
What will be an ideal response?
Divide and conquer is a time saver that comes into play as part of developing a theory of probable cause. As you gather information for troubleshooting, a general sense of where the problem lies should manifest. Place this likely cause at the appropriate layer of the OSI model and begin to test the theory and related theories at that layer. If the theory bears out, follow the appropriate troubleshooting steps. If the theory is wrong, move up or down the OSI model with new theories of probable causes.
You might also like to view...
Security permissions are more granular than Share permissions
Indicate whether the statement is true or false
The altering of data so that it is not usable unless the changes are undone is:
A) Biometrics B) Compression C) Encryption D) Ergonomics E) None of the above