Describe three security policy decisions that can be implemented to prevent departmental bandwidth consumption that compromises network operations.

What will be an ideal response?

Three security policy decisions that can be implemented to prevent departmental bandwidth consumption that compromises network operations are:
•       First, the technician needs to set up a throttling policy that defines in terms of megabits per second the maximum amount of bandwidth any single department can use per day.
•       Second, the technician needs to add a blocking policy. If anyone goes over this limit, the company will block all traffic of that type for a certain amount of time (one hour).
•       Third, the technician needs to update his company's fair access policy or utilization limits security policies to reflect these new limits. This lets employees, especially those pesky sales folks, know what the new rules are.
 

Computer Science & Information Technology

You might also like to view...

What does a sizing pointer look like?

A) Small image of a hand B) Four-headed arrow C) Double-headed arrow D) Single-headed arrow

Computer Science & Information Technology

The password policy setting that determines the number of days to use a password before a user is required to specify a new password is _____________________

a. Enforce Password History b. Maximum Password Age c. Minimum Password Age d. Password Must Meet Complexity Requirements

Computer Science & Information Technology