A new vendor has asked your permission to use a protocol analyzer on your network. Which of the following would NOT be a potential use of this software?
A. Verify that a specific traffic type is encrypted on the network.
B. Identify the computers currently connected to the network,
C. Identify the potential for a web application to suffer a buffer overflow.
D. Identify the manufacturer of the wireless devices on the network.
C
Explanation: Protocol analyzers can only capture raw packets from the network. They cannot examine the inner workings of an application, web or otherwise.
You might also like to view...
For a basic mathematical expression it is best to use
A) functions such as SUM (B4:C4). B) the midpoint value in a set of values. C) the arithmetic mean or average of values. D) formulas such as =B4+C4.
After you create and run a query, you can run it again whenever you like.
Answer the following statement true (T) or false (F)