This is used to collect information such as packets per second, errors per second, unicast per second, multicast per second, broadcast per second, and so on.

What will be an ideal response?

SNMP monitors

Computer Science & Information Technology

You might also like to view...

Remote access Trojans typically have two components: a client and a server

Indicate whether the statement is true or false.

Computer Science & Information Technology

One of your customers reports that she walked away from her laptop for 30 minutes. When she returned, the display was very dim. She increased the brigthness setting and moved the mouse but to no effect. What should you do first?

a. Replace the LCD screen. b. Check the operating system for corruption. c. Connect an external monitor to verify that video card works. d. check wheter the laptop is now on battery power.

Computer Science & Information Technology