Which of the following is a security-related reason for monitoring and evaluating network traffic?
A. to determine if your IDPS signatures are working well
B. to create substantial data to analyze
C. to optimize your router and switch protocols
D. to see how many files employees download form the Internet
Answer: A
You might also like to view...
Similar to video production, which is now accessible to many nonprofessionals, name two other things that over time have been made more accessible due to computer software.
What will be an ideal response?
Movingan item to a subordinate level in a document outline is called_____the heading.?
A. ?pipelining B. ?demoting C. ?decentralizing D. ?bounding
You have two frames on your page, one in front of the other. How can you select the frame below without moving them?
What will be an ideal response?
Which of the following allows all VMs to communicate with each other, the host, and the network?
A. hypervisors B. virtual switches C. Virtual PBX D. Virtual Machine Manager