An administrator would like to monitor the network to evaluate which employees are using an excessive amount of bandwidth on peer to peer sharing services. Which of the following monitoring techniques would BEST be used?

A. Stateful packet inspection
B. Load balancing
C. Packet sniffing
D. Throughput testing

Answer: C. Packet sniffing

Computer Science & Information Technology

You might also like to view...

External SSDs usually connect to a computer via USB

Indicate whether the statement is true or false

Computer Science & Information Technology

Suppose that an application has four dimension tables, each of which contains 100 rows.

a. Determine the maximum number of rows in the fact table. b. Suppose that a one-dimension table has an attribute that can take on 10 values. Determine the size in bytes of a bit index on that attribute. c. Determine the maximum number of tuples in a join index for a join between one of the dimension tables and the fact table. d. Suppose that we use the CUBE operator on this fact table to perform aggregations on all four dimensions. Determine the number of rows in the resulting table. e. Suppose that we use the ROLLUP operator on this fact table. Determine the number of rows in the resulting table.

Computer Science & Information Technology