Which of the following tools could BEST be used to determine how the employee is connecting to the reverse proxy?

A security administrator suspects that an employee in the IT department is utilizing a reverse
proxy to bypass the company’s content filter and browse unapproved and non-work related sites
while at work. Which of the following tools could BEST be used to determine how the employee is
connecting to the reverse proxy?

A security administrator suspects that an employee in the IT department is utilizing a reverse
proxy to bypass the company’s content filter and browse unapproved and non-work related sites
while at work. Which of the following tools could BEST be used to determine how the employee is
connecting to the reverse proxy?

A.
Port scanner

B.
Vulnerability scanner

C.
Honeypot

D.
Protocol analyzer



Leave a Reply 4

Your email address will not be published. Required fields are marked *

eight − six =


David

David

Whoever answered these questions must have scored around a 200 on the exam. This is D – a protocol analyzer.

StalinistAyyapan

StalinistAyyapan

Exactly. Even basic questions were not answered correctly.

Lake

Lake

Hello David, I like your comment. LOL. The correct answer is D for sure.

Admin

Admin

D , David if you read some day this you think that he answer like that on exam.