You are a security administrator for your company. You need to develop a body of knowledge to enable heuristic- and behavior-based security event monitoring on a geographically distributed network. Instrumentation is chosen to allow for monitoring and measuring the network. What is the BEST methodology to use in establishing this baseline?

A. Schedule testing on operational systems when users are not present. Instrument the systems to log all network traffic. Monitor the network for at least eight hours. Analyze the results. Document the established baseline.
B. Model the network in a series of VMs. Instrument the systems to record comprehensive metrics. Run a large volume of simulated data through the model. Record and analyze the results. Document expected future behavior.
C. Instrument the operational network. Simulate extra traffic on the network. Analyze network flow information from all network devices. Document the baseline volume of traffic.
D. Completely duplicate the network on VMs. Replay eight hours of captured corporate network traffic through the duplicate network. Instrument the network. Analyze the results. Document the baseline.


B
Explanation: You should model the network in a series of VMs, instrument the systems to record comprehensive metrics, run a large volume of simulated data through the model, record and analyze results, and document expected future behavior.
Operational systems are not the best to use in this situation, especially when users are not present. The whole point is to test the current network baseline.

Computer Science & Information Technology

You might also like to view...

The number and type of arguments in a Call statement must be the same as the __________ and __________ of parameters in the corresponding subprogram header.

Fill in the blank(s) with correct word

Computer Science & Information Technology

Deadlock will continue to be an important area of research in current and future systems because ________.

a) large-scale systems are becoming more oriented toward asynchronous parallel operations b) small, portable devices, for which users cannot rely on an administrator to detect and rid a system of deadlock, are becoming more prevalent c) there is an increasing tendency of operating systems designers to view data as a resource that must be managed carefully d) all of the above

Computer Science & Information Technology

Proxies functioning as ____-level gateways create a virtual tunnel between the proxy and an external computer, such as a Web server.

A. network B. presentation C. presentation D. circuit

Computer Science & Information Technology

When you copy a selection of cells using drag and drop, which appears before you release the mouse button?

A. an outline of the new location of the selected range B. the range C. a cell reference of the old location D. shortcut tip

Computer Science & Information Technology