A network administrator wants to monitor traffic by deploying MIBs. Which of the follow network monitoring resources would be used?

A. SCTP
B. Packet sniffer
C. DCCP
D. SNMP


Answer: D. SNMP

Computer Science & Information Technology

You might also like to view...

Give a command for viewing the size of your home directory?Give a command for displaying the sizes of all the files in your home directory

What will be an ideal response?

Computer Science & Information Technology

Which of the following frames is the one not affected by any mouse movement?

A. Over B. Up C. Hit D. Down

Computer Science & Information Technology

The ________ contextual tab appears when a table is selected

A) Layout B) Format C) Design D) Insert

Computer Science & Information Technology

When an attacker chooses to combine social engineering with exploiting vulnerabilities carried out by e-mail, what type of attack is being performed?

A. spear phishing B. email surfing C. personal D. email phishing

Computer Science & Information Technology