Describe the purpose of a protocol analyzer and how an attacker could use one to compromise your network.
What will be an ideal response?
Protocol analyzers can capture packets, including the data contained in them. They can be used to discover available resources on a network and even capture authentication information such as user names and passwords that are not encrypted.
You might also like to view...
A worksheet is defined as
A) a single spreadsheet that often contains formulas, functions, values, text, and visual aids. B) the background color of a cell. C) the current cell location of the insertion point as indicated by a dark border. D) an unfinished project.
Which of the following wrapping options in the Table Properties dialog box allows you to display text on the side of a table?
A) Center B) Left C) None D) Around
Briefly describe an IP address.
What will be an ideal response?
What are the three types of countermeasures
A. Detective, selective, corrective B. Safeguards, controls, protections C. Detective, adaptive, safeguards D. Preventative, detective, corrective