____________________ can "listen" to traffic on a network and determine if invalid messages are being transmitted, report network problems such as malfunctioning NICs, and detect traffic congestion problems.?

Fill in the blank(s) with the appropriate word(s).


Sniffers

Computer Science & Information Technology

You might also like to view...

Business reports printed by computers are normally divided into three parts:

a. Introduction, body, conclusion b. Initialization, process, termination c. Heading, Detail lines, Summary d. Input, process, output e. None of the above.

Computer Science & Information Technology

Kerberos relies exclusively on __________ .

A. symmetric encryption B. asymmetric encryption C. private key encryption D. public key encryption

Computer Science & Information Technology

How would you return to the default installation settings of the Ribbon?

A) Click Reset in the customize Ribbon tab of the Excel Options dialog box, and then select Reset Group customizations, and then click Yes. B) Click Reset in the Customize Ribbon tab of the ExcelOptions dialog box, and then select Reset all customizations, and then click Yes. C) Right Click on the Ribbon and select return to default. D) Reinstall Excel.

Computer Science & Information Technology

Each time the _____ key is pressed, the paragraph formatting in the previous paragraph is carried forward to the next paragraph.

A. ENTER B. SHIFT C. CTRL D. ALT

Computer Science & Information Technology