Which one of the following tools may be used to directly violate the confidentiality of communications on an unencrypted VoIP network?

A. Nmap
B. Nessus
C. Wireshark
D. Nikto


Answer: C. Wireshark

Computer Science & Information Technology

You might also like to view...

The following sentence applies number rules correctly. Mr. Rios invested nearly 50 percent of the startup capital.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The transition from ____ is initiated by the Job Scheduler according to some predefined policy. At this point, the availability of enough main memory and any requested devices is checked.

A. READY to RUNNING B. RUNNING to WAITING C. RUNNING back to READY D. HOLD to READY

Computer Science & Information Technology

Which of the following is a document that is used in cyber forensics that lists everywhere evidence has been?

A. Warrant B. Legal document C. Chain of custody D. Forensic report E. Documentation of the scene

Computer Science & Information Technology

Which protocol enables DNS servers to get automatic updates of IP addresses of computers in their forward lookup zones, mainly by talking to the local DHCP server?

A. NetBIOS over TCP/IP B. Dynamic DNS C. ARP D. WINS

Computer Science & Information Technology