There is suspected virus activity on the network. Which of the following would Lisa, a technician, use to study network traffic?

A. Protocol analyzer
B. Cable tester
C. Cable certifier
D. Environmental monitor


Answer: A. Protocol analyzer

Computer Science & Information Technology

You might also like to view...

MC The __slots__ method:

a) specifies the number of attributes an object may have. b) specifies the only attributes an object is allowed to have. c) contains the attributes that have been dynamically added. d) None of the above.

Computer Science & Information Technology

This is used to hold arbitrary text information of the domain.

What will be an ideal response?

Computer Science & Information Technology

A form is an interface used to enter or modify data in a field or record

Indicate whether the statement is true or false

Computer Science & Information Technology

Discuss the policy sets that an organization might consider when planning fine-grained password policies.

What will be an ideal response?

Computer Science & Information Technology