Question

Which tools are best for continuous monitoring of network with new code over a time period to und...

Which tools are best for continuous monitoring of network with new code over a time period to understand how well a network is working? Explain why.

Network Monitoring Tools to choose from: NagiosCore; Cacti; Zabbix; ntop; Icinga; Spiceworks; Wireshark; Nmap; Traceroute NG

0 0
Add a comment Improve this question Transcribed image text
Answer #1

NagiosCore is good for continuous monitoring of network with new code over a time period to understand how well a network is working as it offers a centralized visibility and detailed awareness, it helps in problem remediation, it helps in proactive planning with the helps of trending and capacity planning tools, ease in reporting, full access to the code and support larger community, automatically fix issues, coordination is easy and helpful in distributed monitoring.

Add a comment
Know the answer?
Add Answer to:
Which tools are best for continuous monitoring of network with new code over a time period to und...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Identify the latency of a host over the local network, it should typically be in milliseconds; • Use the tools tracepath...

    Identify the latency of a host over the local network, it should typically be in milliseconds; • Use the tools tracepath, traceroute and ping to determine the route trip times of packets to a host • Install the above tools if not on your system already Q) Can you run the following commands and compare the resulting times to the host www.flinders.edu.au; $ tracepath www.flinders.edu.au $ traceroute www.flinders.edu.au $ ping -c 10 www.flinders.edu.au Q) Identify which hosts/routers create the largest...

  • The new Chief Technology Officer (CTO) is seeking recommendations for network monitoring services for the local...

    The new Chief Technology Officer (CTO) is seeking recommendations for network monitoring services for the local intranet. The CTO would like the capability to monitor all traffic to and from the gateway, as well as the capability to block certain content. Which of the following recommendations would meet the needs of the organization? (Choose one and why) Recommend setup of IP filtering on both the internal and external interfaces of the gateway router. Recommend installation of an IDS on the...

  • Network Security Class Questions Which statement best describe the term “Network Enumeration”? (...

    Network Security Class Questions Which statement best describe the term “Network Enumeration”? (NOT SURE) Network Enumeration means by hackers scout target leverage techniques over the phone to make the target reveal critical information such as SSN, credit information Network Enumeration means “case the joint” this is another form of intelligence gathering Enumeration identifies and poorly protected resource shares are exploited to gain access Network Enumeration describe the motivation of a hacker and the level of ingenuity of the hackers All...

  • Please help with this problem I am new to circuits and capacitors and do not understand....

    Please help with this problem I am new to circuits and capacitors and do not understand. When working out please write all formulas used and the steps took and why so I can learn as I follow along why you did what. Also, make sure to plot on a graph as well as the voltage goes to 0 over a time period ****Please do not turn in Laplace domain. Use tools that are basic so I can better understand Problem...

  • I had tried to work with the wireshark interface and cannot navigate it due to network problems a...

    I had tried to work with the wireshark interface and cannot navigate it due to network problems and cannot find the question solutions, if any one can help with detailed steps it would be a great help. Wireshark Lab #2: Ethernet In this lab, we'll investigate the Ethernet protocol and the ARP protocol. Before beginning this lab, you'l1 probably want to review sections 6.4.1 (Link-layer addressing and ARP) and 6.4.2 (Ethernet) in the text. RFC 826 (ftp://ftp.rfc-editor.org/in- notes/std/std37.txt) contains the...

  • 1. a. Upon a risk analysis on a company's site network, some threats are identified. These include threats from malicious code (i.e. virus, worms and Trojan horse) and threats from denial of...

    1. a. Upon a risk analysis on a company's site network, some threats are identified. These include threats from malicious code (i.e. virus, worms and Trojan horse) and threats from denial of service (DoS) attacks. To address these threats, an administrator in the company, Bob, has suggested using a firewall to control the access of the site network from the Internet. i. Contrast the three types of malicious code, virus, worms and Trojan horse. ii. There are three types of...

  • Sustainable competitive advantage means a firm outperforms its peers over a sustained period of time. Such...

    Sustainable competitive advantage means a firm outperforms its peers over a sustained period of time. Such superior performance is noticed by the peer group that attempts to identify the source of the performance and copy it. This concept is called “benchmarking.” Which of the following demonstrates a benchmarking process? 1) Is SiriusXM’s business model working? Explain your answer. Go to investor.siriusxm.com and check whether SiriusXM’s recent financial reports indicate that its business model is working. Are its subscription fees increasing...

  • case project 11-1 select a WAN solution for business. book network+ 1- which WAN solution is...

    case project 11-1 select a WAN solution for business. book network+ 1- which WAN solution is best suited for customer service reps working at a customer site? 2- which WAN solution does not allow Qos specification so that voice and video take precedence over email messaging when competing for band width? 3- which WAN solution can tunnel frame relay,ATM, and Ethernet traffic, allowing the company to have consistent? 4- which WAN solution offers continuous and consistent bandwidth at all times...

  • Which of the Seven QC Tools would be most useful in addressing each of the following...

    Which of the Seven QC Tools would be most useful in addressing each of the following situations? Explain yourreasoning.   a.     A copy machine suffers frequent paper jams and users are often confused as to how to fix the problem.   b.      The publication team for an engineering department wants to improve the accuracy of its user documentation but is unsure of why documents are not error-free.   c.    A bank needs to determine how many teller positions, drive-through stations, and ATM machines it needs...

  • In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions...

    In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions 7 - 10. http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT