A new vendor has asked your permission to use a protocol analyzer on your network. Which of the following would NOT be a potential use of this software?

A. Verify that a specific traffic type is encrypted on the network.
B. Identify the computers currently connected to the network,
C. Identify the potential for a web application to suffer a buffer overflow.
D. Identify the manufacturer of the wireless devices on the network.


C
Explanation: Protocol analyzers can only capture raw packets from the network. They cannot examine the inner workings of an application, web or otherwise.

Computer Science & Information Technology

You might also like to view...

Identifiers that represent local variables in a function ________.

a) are globally accessible to the script b) exist while the function in which they are declared is still active c) exist while the function in which they are declared is no longer active d) are not automatically destroyed when the function in which they are declared is exited.

Computer Science & Information Technology

On a form, record selectors are located on the ________

A) Navigation bar B) Navigation pane C) form header D) form footer

Computer Science & Information Technology

The Windows 8 SkyDrive app and the SkyDrive for Windows app perform the same functions

Indicate whether the statement is true or false

Computer Science & Information Technology

A _____ is a modified version of a virus that is produced by the virus's author or another person by amending the original virus code.

a. rootkit b. variant c. Trojan horse d. worm

Computer Science & Information Technology