A VACL is sometimes used in which way for network performance monitoring:
Cascade is being used to detect application traffic using both Layer 7 fingerprinting technology and Layer 4 mappings. Which statement below best characterizes the priority of traffic being tagged?
Within Cascade Profiler, what can be done to prevent a data resolution from being available for selection on the Report Criteria section of traffic reports?
Which of the following is valid syntax for defining host groups? (Select 3)
What protocol/port does the Gateway use to collect NetFlow?
In order for the Cascade solution to track an application based on its fingerprint, data can be used from which devices? (Select 3)
Cascade provides a means for contacting other network devices for additional information about a host or user of interest. Right-clicking a host name, IP address, MAC address or port number and choosing _________________ from the shortcut menu sends a query to the other network device.
Cascade Profiler is able to report traffic using two different approaches (centricities). Two approaches can result in different results when using the same report criteria due to the way data is aggregated and counted. What are these two approaches? (Select 2)
Within Cascade Profiler the Event Policy categories for which you can receive alerts includE. (Select 4)
What can be configured on the Cascade Profiler to detect utilization for an interface? (Select 2)