Which one of the following tools may be used to directly violate the confidentiality of communications on an unencrypted VoIP network?
A. Nmap
B. Nessus
C. Wireshark
D. Nikto
Answer: C. Wireshark
You might also like to view...
The following sentence applies number rules correctly. Mr. Rios invested nearly 50 percent of the startup capital.?
Answer the following statement true (T) or false (F)
The transition from ____ is initiated by the Job Scheduler according to some predefined policy. At this point, the availability of enough main memory and any requested devices is checked.
A. READY to RUNNING B. RUNNING to WAITING C. RUNNING back to READY D. HOLD to READY
Which of the following is a document that is used in cyber forensics that lists everywhere evidence has been?
A. Warrant B. Legal document C. Chain of custody D. Forensic report E. Documentation of the scene
Which protocol enables DNS servers to get automatic updates of IP addresses of computers in their forward lookup zones, mainly by talking to the local DHCP server?
A. NetBIOS over TCP/IP B. Dynamic DNS C. ARP D. WINS