Which of the following tools or methods would allow you to verify that a particular traffic type is encrypted?
A. port scanner
B. ping sweep
C. HTTP interceptor
D. protocol analyzer
D
Explanation: Protocol analyzers or sniffers collect raw packets from the network and are used by both legitimate security professionals and attackers. For example, let's say you have a security policy that says certain types of traffic should be encrypted. But you are not sure that everyone is compliant. By capturing and viewing the raw packets on the network, you would be able to determine this.
You might also like to view...
A trigger object can be a graphic or text, and it can be clicked or moused over in order for the animation to occur
Indicate whether the statement is true or false
Calculate current out
What will be an ideal response?
Explain what an IM is, and what the technology shown in the accompanying figure is.
What will be an ideal response?
The essence of software engineering practice might be described as: understand the problem, plan a solution, carry out the plan, and examine the result for accuracy.
Answer the following statement true (T) or false (F)