Lauren wants to monitor her LDAP servers to identify what types of queries are causing problems. What type of monitoring should she use if she wants to be able to use the production servers and actual traffic for her testing?

A. Active
B. Real-time
C. Passive
D. Replay


Answer: C. Passive

Computer Science & Information Technology

You might also like to view...

When you used JPA in this chapter, you interacted with an existing database via classes that the NetBeans IDE generated from the database’s schema. You used the NetBeans Entity Classes from Database… option to add to your project classes that represented the database tables. Together, these classes and the corresponding settings are known as a ________ unit.

a. perseverance b. perpetual c. sticky d. persistence.

Computer Science & Information Technology

Describe forged deauthentication.

What will be an ideal response?

Computer Science & Information Technology

A standard user cannot view permissions.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Case-Based Critical Thinking Question ? Patrice hosts a radio show on his college station. He wants to post clips from some of his shows on his website for review by potential employers. Patrice specifies a MIME type ofaudio/mpegfor each of his clips. This is because the clips are encoded in which audio format?

A. AAC B. mp3 C. Opus D. Vorbis

Computer Science & Information Technology