Describe the purpose of a protocol analyzer and how an attacker could use one to compromise your network.

What will be an ideal response?


Protocol analyzers can capture packets, including the data contained in them. They can be used to discover available resources on a network and even capture authentication information such as user names and passwords that are not encrypted.

Computer Science & Information Technology

You might also like to view...

A worksheet is defined as

A) a single spreadsheet that often contains formulas, functions, values, text, and visual aids. B) the background color of a cell. C) the current cell location of the insertion point as indicated by a dark border. D) an unfinished project.

Computer Science & Information Technology

Which of the following wrapping options in the Table Properties dialog box allows you to display text on the side of a table?

A) Center B) Left C) None D) Around

Computer Science & Information Technology

Briefly describe an IP address.

What will be an ideal response?

Computer Science & Information Technology

What are the three types of countermeasures

A. Detective, selective, corrective B. Safeguards, controls, protections C. Detective, adaptive, safeguards D. Preventative, detective, corrective

Computer Science & Information Technology