Which of the following would be used to check whether a DoS attack is taking place from a
specific remote subnet?
A.
Syslog files
B.
Honeypot
C.
Network sniffer
D.
tracert
Explanation:
A network sniffers monitors data flowing over computer network links. It can be a
self-contained software program or a hardware device with the appropriate software or firmware
programming.