× Didn't find what you were looking for? Ask a question
Top Posters
Since Sunday
e
4
h
4
h
4
m
3
d
3
B
3
o
3
w
3
H
3
a
3
c
3
k
3
New Topic  
brown_02 brown_02
wrote...
Posts: 200
5 years ago
Which of the following tools or methods would allow you to verify that a particular traffic type is encrypted?
Options:
Aport scanner
B. ping sweep
C.HTTP interceptor
D. protocol analyzer
Textbook 
CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide

CompTIA Advanced Security Practitioner (CASP) CAS-003 Cert Guide


Edition: 2nd
Authors:
Read 39 times
2 Replies

Related Topics

Replies
wrote...
5 years ago
 D
Explanation:  Protocol analyzers or sniffers collect raw packets from the network and are used by both legitimate security professionals and attackers. For example, lets say you have a security policy that says certain types of traffic should be encrypted. But you are not sure that everyone is compliant. By capturing and viewing the raw packets on the network, you would be able to determine this.
Chapter 10 Select the Appropriate Security Assessment Tool
brown_02 Author
wrote...
5 years ago
Exactly what I needed for my project, TYSM
New Topic      
Explore
Post your homework questions and get free online help from our incredible volunteers
  1118 People Browsing
Related Images
  
 357
  
 682
  
 251
Your Opinion
Which industry do you think artificial intelligence (AI) will impact the most?
Votes: 484