A security administrator is investigating strange network behavior on a single VLAN that is used only by vendors. Which of the following tools would BEST allow the administrator to look at network traffic and investigate specific packets?
A. Port scanner
B. Cipher
C. Sniffer
D. Checksum
Answer: C. Sniffer
You might also like to view...
The most complex part of TLS is the __________ . ?
A) ?SSL Record Protocol ? B) ?Handshake Protocol C) ?Change Cipher Spec Protocol ? D) ?Alert Protocol
This is an encrypted alternative to telnet.
What will be an ideal response?
Cheryl Stake is concerned that too many forms are being filled out incorrectly. She feels that about 8 percent of all the forms have an error.
a. How large a sample size should Ms. Stake use to be 99-percent certain she will be within 0.02? b. Suppose Ms. Stake will accept a confidence level of 90 percent that she will be within 0.02. What will the sample size of forms be now? c. Explain the difference between parts a and b in words. d. Suppose Ms. Stake will accept a confidence level of 95 percent that she will be within 0.02. What will the sample size of forms be now?
What PowerShell cmdlets will allow you to set the correct time, date, and time zone settings?
a. Set-TimeZone b. Set-Time c. Get-Date d. Set-Date