Which of the following tools should she use?

Karen, an administrator, wants to verify which protocols are in use on the network. Which of the
following tools should she use?

Karen, an administrator, wants to verify which protocols are in use on the network. Which of the
following tools should she use?

A.
Intrusion detection software

B.
PoE

C.
Packet sniffer

D.
Intrusion prevention software



Leave a Reply 0

Your email address will not be published. Required fields are marked *