Which of the following tools or methods would allow you to verify that a particular traffic type is encrypted?

A. port scanner
B. ping sweep
C. HTTP interceptor
D. protocol analyzer


D
Explanation: Protocol analyzers or sniffers collect raw packets from the network and are used by both legitimate security professionals and attackers. For example, let's say you have a security policy that says certain types of traffic should be encrypted. But you are not sure that everyone is compliant. By capturing and viewing the raw packets on the network, you would be able to determine this.

Computer Science & Information Technology

You might also like to view...

A trigger object can be a graphic or text, and it can be clicked or moused over in order for the animation to occur

Indicate whether the statement is true or false

Computer Science & Information Technology

Calculate current out

What will be an ideal response?

Computer Science & Information Technology

Explain what an IM is, and what the technology shown in the accompanying figure is.

What will be an ideal response?

Computer Science & Information Technology

The essence of software engineering practice might be described as: understand the problem, plan a solution, carry out the plan, and examine the result for accuracy. 

Answer the following statement true (T) or false (F)

Computer Science & Information Technology