An administrator would like to monitor the network to evaluate which employees are using an
excessive amount of bandwidth on peer to peer sharing services. Which of the following
monitoring techniques would BEST be used?
A.
Stateful packet inspection
B.
Load balancing
C.
Packet sniffing
D.
Throughput testing