The network administrator suspects that packet sniffing is being used to capture data packets in the network. The network administrator is using an SSH connection for all critical applications, and switches are being used on all network connections. Should the network administrator be concerned?
A) Yes, the SSH connection is not very strong and parts are in plain text.
B) No, the time required to decode the SSH is too lengthy to be a threat.
C) No, the SSH connection is fully encrypted and this cannot be decoded.
D) Yes, the network administrator should be concerned if someone is suspected of having internal access.
D
You might also like to view...
struct type addressBook has a component people which is an array of elements of struct type person. person has a component phoneNumbers which is an array. What is the correct reference for the second phone number of the second person in myFriends (type addressBook)?
a) myFriends.person[1].phoneNumber[1] b) myFriends.person.phoneNumber[1] c) addressBook.people[1].phoneNumber[1] d) myFriends.people[1].phoneNumber[1]
Susan wants to prepare a presentation that will calculate the total cost of ownership for the system. What financial analysis tools are available to her, and what are the advantages (and possible disadvantages) of each tool?
What will be an ideal response?
Key-sequenced lists require that no key be duplicated.
Answer the following statement true (T) or false (F)
The ____ server is usually a high-powered workstation that maintains a large file system of data sets, user profiles, and access information about all the network peripherals.?
A. ?network B. ?file C. ?print D. ?operating system