Karen, an administrator, wants to verify which protocols are in use on the network. Which of the
following tools should she use?
A.
Intrusion detection software
B.
PoE
C.
Packet sniffer
D.
Intrusion prevention software
Karen, an administrator, wants to verify which protocols are in use on the network. Which of the
following tools should she use?
Karen, an administrator, wants to verify which protocols are in use on the network. Which of the
following tools should she use?
A.
Intrusion detection software
B.
PoE
C.
Packet sniffer
D.
Intrusion prevention software