An administrator wants to verify which protocols are in use on the network. Which of the
following tools should be used?
A.
Intrusion detection software
B.
PoE
C.
Packet sniffer
D.
Intrusion prevention software
An administrator wants to verify which protocols are in use on the network. Which of the
following tools should be used?
An administrator wants to verify which protocols are in use on the network. Which of the
following tools should be used?
A.
Intrusion detection software
B.
PoE
C.
Packet sniffer
D.
Intrusion prevention software