Which one of the following tools may be used to directly violate the confidentiality of communications on an unencrypted VoIP network?
A. Nmap
B. Nessus
C. Wireshark
D. Nikto
Answer: C. Wireshark
Computer Science & Information Technology
You might also like to view...
_____ refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser.
A. Grid computing B. Distributed computing C. Utility computing D. Cloud computing
Computer Science & Information Technology
Digital certificates use a standard format called ____________.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology