Which of the following tools could BEST be used to dete…

A security administrator suspects that an employee in the IT department is utilizing a reverse proxy to bypass
the company’s content filter and browse unapproved and non-work related sites while at work. Which of the
following tools could BEST be used to determine how the employee is connecting to the reverse proxy?

A security administrator suspects that an employee in the IT department is utilizing a reverse proxy to bypass
the company’s content filter and browse unapproved and non-work related sites while at work. Which of the
following tools could BEST be used to determine how the employee is connecting to the reverse proxy?

A.
Port scanner

B.
Vulnerability scanner

C.
Honeypot

D.
Protocol analyzer



Leave a Reply 0

Your email address will not be published. Required fields are marked *