A network technician needs to monitor the network to find a user that is browsing inappropriate websites. Which of the following would the technician use to view the website and find the user browsing it?
A. An SNMP GET
B. A top listener tool
C. An intrusion detection system
D. A packet sniffer
Answer: D. A packet sniffer
Computer Science & Information Technology
You might also like to view...
Which of the following complexity measures is the most efficient?
a) O() b) O() c) O(n log n) d) O(n) e) O(1)
Computer Science & Information Technology
Text content is the:
a. Information about the content. b. Meaning of the content. c. Bare text that appears on the page. d. Link to other HTML pages and assets.
Computer Science & Information Technology
Which key value data type is limited to exactly 64 bits?
A. QWORD B. DWORD C. Binary D. String
Computer Science & Information Technology
?To ensure data validation, concepts must be clearly defined and ranges of acceptable values for representing these concepts must be established.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology