Pete, an administrator, captures traffic sent between a router and a monitoring server on port 161. The packet payload contains the strings 'PUBLIC and 'PRIVATE1. Which of the following was MOST likely used to capture this traffic?

A. Vulnerability scanner
B. Protocol analyzer
C. SNMPv3
D. SNMPv2c


Answer: B. Protocol analyzer

Computer Science & Information Technology

You might also like to view...

Which type of memory is non-volatile?

A) DDR2 B) RAM C) SDRAM D) ROM

Computer Science & Information Technology

Which of the following chart elements can have titles?

A. Chart wall B. Chart floor C. Legend D. Horizontal axis

Computer Science & Information Technology

Which statement is a true when adding a VM to a Resource Pool?

a. The VM share value (%Shares) adjusts to the Resource Pool b. The VM share value (%Shares) remains unchanged. c. The VM limit changes d. the VM reservation changes

Computer Science & Information Technology

The ________ approach to systems implementation is used only in cases in which the cost of failure or of interrupted operation is great.

A. pilot B. direct C. phased D. parallel

Computer Science & Information Technology