Which security procedure is being demonstrated if an administrator is using Wireshark to watch for specific inbound and outbound traffic?

A. application search
B. application control
C. firewall monitoring
D. virus control


Answer: C

Computer Science & Information Technology

You might also like to view...

When drawing a table, the pointer is displayed as a(n) ________

A) pencil B) cross-hair C) I-beam D) pen

Computer Science & Information Technology

Visual Basic, C, C++, and Java are all examples of ____ languages.

a. assembly b. machine-level c. low-level d. high-level

Computer Science & Information Technology

What are the most limiting factors in a host?s ability to run virtual machines?

A. Hard disk space and RAM B. Network bandwidth and driver C. CPU and RAM D. Hard disk space and router

Computer Science & Information Technology

Access includes a Database Splitter tool that analyzes objects in the database and suggests potential solutions to improve performance.

a. true b. false

Computer Science & Information Technology