When introducing new devices to the network, the organization’s security policy requires that devices be monitored to establish normal traffic patterns for the device.
Which of the following is generated from initial monitoring?
A.
SLA
B.
Baseline
C.
Forensic log
D.
Vulnerability assessment
Explanation:
http://searchnetworking.techtarget.com/How-to-set-a-network-performance-baseline-for-network-monitoring