Complete Question:
Different network scenarios require the use of different tools. The tools you may consider should EXCLUDE:
a. Port scanner
b. Banner grabbing tools
c. Vulnerability scanner
d. Honeypots
e. Protocol analyzer
f. Viruses
g. Honeynets
Answer:
f. Viruses
Step-by-step explanation:
Different network scenarios require the use of different tools. The tools you may consider should include:
a. Port scanner: this is a program used by network administrators to scan various application, transport, internet and network ports which may be exploited by hackers or attackers when found vulnerable.
b. Banner grabbing tools: it is used to gather informations of a computer residing on a network and various services running on its open ports using telnet, zmap, netcat and nmap.
c. Vulnerability scanner: used for the detection of vulnerabilities in a network or systems.
d. Honeypots: it is used to detect and redirect or prevent any unauthorized use of information of a network by mimicking the potential target systems.
e. Protocol analyzer: it is used to analyze traffic and packet captures in a network. Software programs such as wireshark, tshark can be used for protocol analysis.
f. Honeynets: is a combination of one or more honeypots used for attracting and trapping potential attackers.
However, a virus is a malicious program that can replicate and cause severe damage to a computer system.