A new vendor has asked your permission to use a protocol analyzer on your network. Which of the following would NOT be a potential use of this software?

A. Verify that a specific traffic type is encrypted on the network.
B. Identify the computers currently connected to the network,
C. Identify the potential for a web application to suffer a buffer overflow.
D. Identify the manufacturer of the wireless devices on the network.

C
Explanation: Protocol analyzers can only capture raw packets from the network. They cannot examine the inner workings of an application, web or otherwise.

Computer Science & Information Technology

You might also like to view...

For a basic mathematical expression it is best to use

A) functions such as SUM (B4:C4). B) the midpoint value in a set of values. C) the arithmetic mean or average of values. D) formulas such as =B4+C4.

Computer Science & Information Technology

After you create and run a query, you can run it again whenever you like.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology