Which of the following tools or methods would allow you to verify that a particular traffic type is encrypted?

A. port scanner
B. ping sweep
C. HTTP interceptor
D. protocol analyzer

D
Explanation: Protocol analyzers or sniffers collect raw packets from the network and are used by both legitimate security professionals and attackers. For example, let's say you have a security policy that says certain types of traffic should be encrypted. But you are not sure that everyone is compliant. By capturing and viewing the raw packets on the network, you would be able to determine this.

Computer Science & Information Technology

You might also like to view...

The overriding variable that determines how many people the systems analyst should interview in depth is:

A) the number of analysts interviewing. B) the number of users in an organization. C) the number of departments and the number of users in an organization. D) the time an interview takes.

Computer Science & Information Technology

Enhance the Flag Quiz application by counting the number of questions that were answered correctly. After all the questions have been answered, display a message in a JTextField that describes how well the user performed (Fig. 16.39). The JTextField, called commentJTextField, has already been added in the exercise template. The following table (Fig. 16.40) shows which messages to display:


a) Copying the template to your working directory. Copy the C:Examples Tutorial16ExercisesEnhancedFlagQuiz directory to your C:SimplyJava directory.
b) Opening the template file. Open the FlagQuiz.java file in your text editor.
c) Adding a variable to count the number of correct answers. On line 24, add a com- ment indicating that the variable you are about to create will be used to store the number of correct answers from the user. On line 25, declare int variable correct and initialize it to 0.
d) Counting the correct answers. On line 196, increment correct. This statement causes correct to be incremented each time a correct answer is submitted.
e) Displaying the message. Add a switch statement on lines 209–227 that displays the proper message in commentJTextField depending on the value of correct.
f) Saving the application. Save your modified source code file.
g) Opening the Command Prompt window and changing directories. Open the Com- mand Pro

Computer Science & Information Technology