CompTIA Exam Questions

Which of the following tools could BEST be used to determine how the employee is connecting to the r

A security administrator suspects that an employee in the IT department is utilizing a reverse
proxy to bypass the company’s content filter and browse unapproved and non-work related sites
while at work. Which of the following tools could BEST be used to determine how the employee is
connecting to the reverse proxy?

A.
Port scanner

B.
Vulnerability scanner

C.
Honeypot

D.
Protocol analyzer