A network administrator notices that there has been an unusually high amount of network traffic on the company's internal network. The administrator has confirmed that this increase is not due to any recently added legitimate business applications or increased user activity. What should be the administrator's first step in troubleshooting this issue?
Schedule a system downtime to restart all devices
Verify for any unauthorized applications or users on the network
Perform a full vulnerability scan on all network devices
Verifying the presence of unauthorized applications or users is essential because unexpected, high network traffic often indicates background activities from unwanted or malicious software, or unauthorized access which could be causing the traffic spike. Checking for updates and restarting devices, while necessary maintenance actions, are not directly focused on identifying the root cause of sudden spikes in traffic. Scanning network devices for vulnerabilities is important for overall security but would generally follow the essential step of checking for suspicious applications or user activities that could be the immediate cause of the traffic issue.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What are some signs of unauthorized applications on a network?
Open an interactive chat with Bash
How can an administrator check for unauthorized users on the network?
Open an interactive chat with Bash
What tools or methods can be used to identify unauthorized applications?