Which of the following commands can be used for the command line version of a popular GUI-based program that is used to examine network traffic passing to and from a network interface?

A. wshark
B. tshark
C. ushark
D. nshark


Answer: B

Computer Science & Information Technology

You might also like to view...

The table or query that supplies the underlying data for a form or report is called the ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

You can use the thesaurus to search for and replace a word with a different word

Indicate whether the statement is true or false

Computer Science & Information Technology

The principal that users have access to only network resources when an administrator explicitly grants them is called ___________

a. Implicit deny b. Least privilege c. Separation of duty d. Job rotation

Computer Science & Information Technology

Organizations classified as __________ may still be large enough to implement the multitier approach to security, though perhaps with fewer dedicated groups and more functions assigned to each group.

A. medium-sized B. small-sized C. large-sized D. super-sized

Computer Science & Information Technology