Which of the following is a security-related  reason for monitoring and evaluating network traffic?

A. to determine if your IDPS signatures are working well
B. to create substantial data to analyze
C. to optimize your router and switch protocols
D. to see how many files employees download form the Internet


Answer: A

Computer Science & Information Technology

You might also like to view...

Similar to video production, which is now accessible to many nonprofessionals, name two other things that over time have been made more accessible due to computer software.

What will be an ideal response?

Computer Science & Information Technology

Movingan item to a subordinate level in a document outline is called_____the heading.?

A. ?pipelining B. ?demoting C. ?decentralizing D. ?bounding

Computer Science & Information Technology

You have two frames on your page, one in front of the other. How can you select the frame below without moving them?

What will be an ideal response?

Computer Science & Information Technology

Which of the following allows all VMs to communicate with each other, the host, and the network?

A. hypervisors B. virtual switches C. Virtual PBX D. Virtual Machine Manager

Computer Science & Information Technology