A network technician is trying to determine the source of an ongoing network based attack.Which of the following should the technician use to view IPv4 packet data on a particular internal network segment?

A. Proxy
B. Protocol analyzer
C. Switch
D. Firewall


Answer: B. Protocol analyzer

Computer Science & Information Technology

You might also like to view...

____________ arrays can only hold one set of data.

a. One-dimensional b. Two-dimensional c. Data bound d. Classical

Computer Science & Information Technology

In a reservation system, how does a controller form a list of stations that will transmit in a given round?

What will be an ideal response?

Computer Science & Information Technology

Why is string matching important?

a. String matching is used to find patterns in text b. String matching is used in data encryption c. String matching is used for data compression d. String matching is used for efficient hash tables

Computer Science & Information Technology

In order to use the fill handles to specify ages or years, you need to specify ________

A) only the first number B) the data type C) half of the data D) the interval

Computer Science & Information Technology