An administrator would like to monitor the network to evaluate which employees are using an excessive amount of bandwidth on peer to peer sharing services. Which of the following monitoring techniques would BEST be used?
A. Stateful packet inspection
B. Load balancing
C. Packet sniffing
D. Throughput testing
Answer: C. Packet sniffing
You might also like to view...
External SSDs usually connect to a computer via USB
Indicate whether the statement is true or false
Suppose that an application has four dimension tables, each of which contains 100 rows.
a. Determine the maximum number of rows in the fact table. b. Suppose that a one-dimension table has an attribute that can take on 10 values. Determine the size in bytes of a bit index on that attribute. c. Determine the maximum number of tuples in a join index for a join between one of the dimension tables and the fact table. d. Suppose that we use the CUBE operator on this fact table to perform aggregations on all four dimensions. Determine the number of rows in the resulting table. e. Suppose that we use the ROLLUP operator on this fact table. Determine the number of rows in the resulting table.