A security administrator is investigating strange network behavior on a single VLAN that is used only by vendors. Which of the following tools would BEST allow the administrator to look at network traffic and investigate specific packets?

A. Port scanner
B. Cipher
C. Sniffer
D. Checksum


Answer: C. Sniffer

Computer Science & Information Technology

You might also like to view...

The most complex part of TLS is the __________ . ?

A) ?SSL Record Protocol ? B) ?Handshake Protocol C) ?Change Cipher Spec Protocol ? D) ?Alert Protocol

Computer Science & Information Technology

This is an encrypted alternative to telnet.

What will be an ideal response?

Computer Science & Information Technology

Cheryl Stake is concerned that too many forms are being filled out incorrectly. She feels that about 8 percent of all the forms have an error.

a. How large a sample size should Ms. Stake use to be 99-percent certain she will be within 0.02? b. Suppose Ms. Stake will accept a confidence level of 90 percent that she will be within 0.02. What will the sample size of forms be now? c. Explain the difference between parts a and b in words. d. Suppose Ms. Stake will accept a confidence level of 95 percent that she will be within 0.02. What will the sample size of forms be now?

Computer Science & Information Technology

What PowerShell cmdlets will allow you to set the correct time, date, and time zone settings?

a. Set-TimeZone b. Set-Time c. Get-Date d. Set-Date

Computer Science & Information Technology