An administrator wants to verify which protocols are in use on the network. Which of the following tools should be used?
A.
Intrusion detection software
B.
PoE
C.
Packet sniffer
D.
Intrusion prevention software
An administrator wants to verify which protocols are in use on the network. Which of the following tools should be used?
An administrator wants to verify which protocols are in use on the network. Which of the following tools should be used?
A.
Intrusion detection software
B.
PoE
C.
Packet sniffer
D.
Intrusion prevention software
Hi there friends, good article and good arguments commented here, I am actually enjoying by these.