Certified Ethical Hacker – CEH – 312-50 – Question100

Pentest results indicate that voice over IP traffic is traversing a network. Which of the following tools will decode a packet capture and extract the voice conversations?


A.
Cain
B. John the Ripper
C. Nikto
D. Hping

Correct Answer: A