Which one of the following tools may be used to directly violate the confidentiality of communications on an unencrypted VoIP network?

A. Nmap
B. Nessus
C. Wireshark
D. Nikto

Answer: C. Wireshark

Computer Science & Information Technology

You might also like to view...

_____ refers to a computing environment where software and storage are provided as an Internet service and accessed with a Web browser.

A. Grid computing B. Distributed computing C. Utility computing D. Cloud computing

Computer Science & Information Technology

Digital certificates use a standard format called ____________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology