Describe three security policy decisions that can be implemented to prevent departmental bandwidth consumption that compromises network operations.

What will be an ideal response?


Three security policy decisions that can be implemented to prevent departmental bandwidth consumption that compromises network operations are:
•       First, the technician needs to set up a throttling policy that defines in terms of megabits per second the maximum amount of bandwidth any single department can use per day.
•       Second, the technician needs to add a blocking policy. If anyone goes over this limit, the company will block all traffic of that type for a certain amount of time (one hour).
•       Third, the technician needs to update his company's fair access policy or utilization limits security policies to reflect these new limits. This lets employees, especially those pesky sales folks, know what the new rules are.
 

Computer Science & Information Technology

You might also like to view...

The intersection of each row and column is called a _____.

A. block B. box C. location D. cell

Computer Science & Information Technology

You have a program with a class that is separated into files. The implementation has been changed. Of the interface file, the implementation file and the application file, which must be recompiled?

a) Only the interface? b) Only the implementation? c) Only the Application? d) None of the above? e) Some of the above?

Computer Science & Information Technology

What is printed by the program that follows?

What will be an ideal response?

Computer Science & Information Technology

Footnotes in a Word document can only be labeled with numbers

Indicate whether the statement is true or false

Computer Science & Information Technology