The network administrator suspects that packet sniffing is being used to capture data packets in the network. The network administrator is using an SSH connection for all critical applications, and switches are being used on all network connections. Should the network administrator be concerned?

A) Yes, the SSH connection is not very strong and parts are in plain text.
B) No, the time required to decode the SSH is too lengthy to be a threat.
C) No, the SSH connection is fully encrypted and this cannot be decoded.
D) Yes, the network administrator should be concerned if someone is suspected of having internal access.

D

Computer Science & Information Technology

You might also like to view...

In Excel, what happens to data that does not meet the filter criteria?

A) It is hidden. B) It is moved to the bottom. C) It is moved to a specified location. D) It is deleted.

Computer Science & Information Technology

Goal Seek is part of a suite of data tools used for ________

Fill in the blank(s) with correct word

Computer Science & Information Technology