Matt, an administrator, captures malicious DNS traffic on the network. Which of the following tools would be used to analyze the nature of this traffic?

A. Sniffer
B. Zone transfer
C. Network tap
D. Application firewall


Answer: A. Sniffer

Computer Science & Information Technology

You might also like to view...

To add Mark of the Web to a Web page, you must be in ____ view.

A. Code B. Design C. Layout D. Web

Computer Science & Information Technology

Which type of loop can be nested in a for loop?

a. for b. while c. do...while d. any of these

Computer Science & Information Technology

Unlike notebook computers, tablet computers, and other portable computers, smartphones and other mobileĀ devices (such as iPads and other tablets) typically require ____________________; that is, software specifically designed for a specific type of mobile deviceĀ and operating system.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

XML Schema was created to replicate all DTD functionality in a schema; it does not support any data types beyond what can be found in DTDs.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology