A network administrator wants to monitor traffic by deploying MIBs. Which of the follow network monitoring resources would be used?
A. SCTP
B. Packet sniffer
C. DCCP
D. SNMP
Answer: D. SNMP
Computer Science & Information Technology
You might also like to view...
Give a command for viewing the size of your home directory?Give a command for displaying the sizes of all the files in your home directory
What will be an ideal response?
Computer Science & Information Technology
Which of the following frames is the one not affected by any mouse movement?
A. Over B. Up C. Hit D. Down
Computer Science & Information Technology
The ________ contextual tab appears when a table is selected
A) Layout B) Format C) Design D) Insert
Computer Science & Information Technology
When an attacker chooses to combine social engineering with exploiting vulnerabilities carried out by e-mail, what type of attack is being performed?
A. spear phishing B. email surfing C. personal D. email phishing
Computer Science & Information Technology