A security analyst is required to collect detailed network traffic on a virtual machine. Which of the following tools could the analyst use?
A system administrator identifies unusual network traffic from outside the local network. Which of the following
is the BEST method for mitigating the threat?
Which of the following is BEST suited to prevent piggybacking into a sensitive or otherwise restricted area of a facility?
A network administrator has determined that network performance has degraded due to excessive use of
social media and Internet streaming services. Which of the following would be effective for limiting access to these types of services, without completely restricting access to a site?