What type of information can be gathered from encrypted network traffic?

A. No information can be gathered
B. Information transmitted during an SSL session
C. The sender’s IP address, receiver’s IP address, the DNS request to resolve the host name and the port numbers used
D. Private encryption keys


C. The sender’s IP address, receiver’s IP address, the DNS request to resolve the host name and the port numbers used

Computer Science & Information Technology

You might also like to view...

What is the best way to keep from contributing to DDoS attacks?

What will be an ideal response?

Computer Science & Information Technology

The default file extension for an Excel 2016 workbook is ____.

A. .xltx B. .xslx C. .xlsx D. .xlts

Computer Science & Information Technology

Setting a system restore point should be done ________

A) only after you have determined that you no longer need any of the files that you have deleted B) when you need to free up hard drive space C) prior to installing new hardware or software D) when your computer has run out of RAM or ROM

Computer Science & Information Technology

If you click the wrong tag, how can you turn it off?

A) Click the one you wanted B) Right-click the tag C) Click it again to turn it off D) Scroll through the list and click one

Computer Science & Information Technology