The IT manager at a small firm is in the process of renegotiating an SLA with the organization's ISP.
As part of the agreement, the organization will agree to a dynamic bandwidth plan to provide 150Mbps of bandwidth.
However, if the ISP determines that a host on the organization's internal network produces malicious traffic, the ISP reserves the right to reduce available bandwidth to 1.5 Mbps.
Which of the following policies is being agreed to in the SLA?
A.
Session hijacking B.
Blocking C.
Throttling D.
Data usage limits E.
Bandwidth quotas.
C.
The IT manager at a small firm is in the process of renegotiating an SLA with the organization's ISP.
As part of the agreement, the organization will agree to a dynamic bandwidth plan to provide 150Mbps of bandwidth.
However, if the ISP determines that a host on the organization's internal network produces malicious traffic, the ISP reserves the right to reduce available bandwidth to 1.5 Mbps.
Which of the following policies is being agreed to in the SLA?
A.
Session hijacking
B.
Blocking
C.
Throttling
D.
Data usage limits
E.
Bandwidth quotas.
C.
The policy being agreed to in the SLA is "throttling," which is option C. Throttling is the practice of intentionally slowing down or reducing the speed of internet traffic. In this case, the ISP reserves the right to reduce available bandwidth to 1.5 Mbps if they determine that a host on the organization's internal network is producing malicious traffic.
The dynamic bandwidth plan mentioned in the scenario means that the organization's internet speed will vary depending on its usage. So, if the organization is not using much bandwidth, it will have more available bandwidth to use. However, if the ISP detects malicious traffic from one of the organization's internal hosts, they will reduce the bandwidth available to the organization to 1.5 Mbps.
This policy of throttling is a way for the ISP to control the network traffic and prevent malicious traffic from affecting other customers on their network. By reducing the available bandwidth to the organization, the ISP can limit the impact of the malicious traffic on their network.
It's worth noting that this policy may also affect legitimate traffic from the organization. If the ISP throttles the bandwidth, the organization may experience slower internet speeds, which could impact their business operations. Therefore, it's essential for the organization to ensure that their internal network is secure and free from any malicious traffic to avoid triggering this policy.