The university you work for allows students to purchase items over the intranet using student ID cards that can be loaded with credits. Recently some students got the system to put unearned credits on their cards. The security team wants to use a protocol analyzer to address this issue. How could such software be useful in this scenario?

A. to fuzz the application for errors
B. to reverse engineer the transaction systems protocol
C. to block transactions from specific students
D. to create a honeypot to lure and identify the guilty students

B
Explanation: Protocol analyzers can be used to capture raw packets from the network and analyze those packets offline. By studying the operation of the transaction protocol, the flaw that allows this to occur could be identified.

Computer Science & Information Technology

You might also like to view...

When getting external data from Microsoft Access, in the Select Table dialog box, select the Enable selection of multiple tables check box, and then click the ________ check box to select all of the tables in the database

A) Field B) Text C) List D) Name

Computer Science & Information Technology

Organizational team sites often serve as the ________ site in a SharePoint site collection

A) team-level B) top-level C) community D) blog

Computer Science & Information Technology