Chris uses a packet sniffer to capture traffic from a TACACS+ server. What protocol should he monitor, and what data should he expect to be readable?

A. UDP; none—TACACS+ encrypts the full session
B. TCP; none—TACACS+ encrypts the full session
C. UDP; all but the username and password, which are encrypted
D. TCP; all but the username and password, which are encrypted


Answer: B. TCP; none—TACACS+ encrypts the full session

Computer Science & Information Technology

You might also like to view...

Which of the following is true about naming objects?

A. the database management system provides strict rules B. Camel case does not use special characters to link words C. tables should always be named with a character prefix D. A column name of Last Name is preferable to LastName

Computer Science & Information Technology

Create a new class called Dog that is derived from the Pet class given in Listing 6.1 of Chapter 6. The new class has the additional attributes of breed (type String) and boosterShot (type boolean), which is true if the pet has had its booster shot and false if not. Give your classes a reasonable complement of constructors and accessor methods. Write a driver program to test all your methods, then write a program that reads in five pets of type Dog and displays the name and breed of all dogs that are over two years old and have not had their booster shots.

This project would be easier to do with an array of type Dog, but how to write class constructors for arrays has not been covered, so the code to process one dog has to be repeated five times.

Computer Science & Information Technology

Similar to videos, the options for changing how the sound plays during the slide show appear on the _____ Tools Playback tab.

A. Audio B. Video C. Media D. 3D

Computer Science & Information Technology

?You had used an online service to apply for a credit card. As part of the process, you submitted your personal information such as SSN, date of birth, employer information, etc. Soon after you started receiving bills for items you did not purchase. You have become a victim of ________.

A. ?cyberterrorism B. ?ransomware C. identity theft D. cyber espionage

Computer Science & Information Technology