A server technician is investigating a potential data breach. It is believed that the breach occurred via telnet
access. Which of the following could validate this hypothesis?
A.
Port scanner
B.
Cipher tools
C.
Checksum analyzer
D.
TDR
A server technician is investigating a potential data breach. It is believed that the breach occurred via telnet
access. Which of the following could validate this hypothesis?
A server technician is investigating a potential data breach. It is believed that the breach occurred via telnet
access. Which of the following could validate this hypothesis?
A.
Port scanner
B.
Cipher tools
C.
Checksum analyzer
D.
TDR