The university you work for allows students to purchase items over the intranet using student ID cards that can be loaded with credits. Recently some students got the system to put unearned credits on their cards. The security team wants to use a protocol analyzer to address this issue. How could such software be useful in this scenario?
A. to fuzz the application for errors
B. to reverse engineer the transaction systems protocol
C. to block transactions from specific students
D. to create a honeypot to lure and identify the guilty students
B
Explanation: Protocol analyzers can be used to capture raw packets from the network and analyze those packets offline. By studying the operation of the transaction protocol, the flaw that allows this to occur could be identified.
You might also like to view...
Why is microprogramming so unpopular today?
What will be an ideal response?
The ________ language, which was used in the first web page ever created, is still in use today.
A. C++ B. TCP/IP C. HTML D. Java
This is an important network tool for helping to secure an external connection to a network.
What will be an ideal response?
Which of the following types of objects can you add to a document page when working with InDesign?
A. shapes B. text boxes C. Microsoft Excel charts D. all of the above