Which of the following BEST allows Pete, a security administrator, to determine the type, source, and flags of the packet traversing a network for troubleshooting purposes?

A. Switches
B. Protocol analyzers
C. Routers
D. Web security gateways


Answer: B. Protocol analyzer

Computer Science & Information Technology

You might also like to view...

Which of the following is not one of the six logical units of a computer?

a. Input unit. b. Output unit. c. Central processing unit. d. Printer.

Computer Science & Information Technology

A total row appears as the last row of a table to:

A) highlight or emphasize cells that meet certain conditions. B) format cells based upon their value in reference to the value of other cells. C) display summary statistics, such as a sum. D) tag a table element as a reference in a formula.

Computer Science & Information Technology

A good thing about the ADT implementation is that the traverse function knows how to process the data as it traverses the tree.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Describe the purpose of an adapter card. List examples of adapter cards and what the purpose of each is.

What will be an ideal response?

Computer Science & Information Technology