Pete, an administrator, captures traffic sent between a router and a monitoring server on port 161. The packet payload contains the strings 'PUBLIC and 'PRIVATE1. Which of the following was MOST likely used to capture this traffic?
A. Vulnerability scanner
B. Protocol analyzer
C. SNMPv3
D. SNMPv2c
Answer: B. Protocol analyzer
Computer Science & Information Technology
You might also like to view...
Which type of memory is non-volatile?
A) DDR2 B) RAM C) SDRAM D) ROM
Computer Science & Information Technology
Which of the following chart elements can have titles?
A. Chart wall B. Chart floor C. Legend D. Horizontal axis
Computer Science & Information Technology
Which statement is a true when adding a VM to a Resource Pool?
a. The VM share value (%Shares) adjusts to the Resource Pool b. The VM share value (%Shares) remains unchanged. c. The VM limit changes d. the VM reservation changes
Computer Science & Information Technology
The ________ approach to systems implementation is used only in cases in which the cost of failure or of interrupted operation is great.
A. pilot B. direct C. phased D. parallel
Computer Science & Information Technology