Which of the following monitoring resources provides the ability to collect this information encrypted over the network?
Which of the following would allow the network administrator to collect log files on a centralized host?
Which of the following is used to limit the amount of bandwidth used on a link for different applications to improve overall performance?