A large financial institution is experiencing degraded network performance during peak business hours. The CISO needs to implement a solution that ensures critical applications receive necessary resources without hardware upgrades. Which network management technique should be recommended?
Traffic shaping is the correct solution as it allows organizations to control network data flow to optimize performance by allocating resources according to predefined policies. This technique can ensure critical applications receive the necessary resources by controlling packet transmission rates and queuing mechanisms, all without requiring additional hardware investments. In this scenario, traffic shaping would allow the financial institution to maintain service levels for essential functions while limiting resource consumption by less critical applications.
Resource monitoring would simply observe and report on usage but wouldn't actively manage resource allocation. Network segmentation would separate different network areas but wouldn't inherently manage resource distribution during congestion. Full packet capture would collect and store network data for analysis but wouldn't address the resource allocation needs.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is traffic shaping and how does it work?
Open an interactive chat with Bash
What are some common methods of traffic shaping?
Open an interactive chat with Bash
What are the benefits of implementing traffic shaping in a network?
Open an interactive chat with Bash
ISC2 CISSP
Communication and Network Security
Your Score:
Report Issue
Bash, the Crucial Exams Chat Bot
AI Bot
Loading...
Loading...
Loading...
IT & Cybersecurity Package Join Premium for Full Access