A server technician is investigating a potential data breach. It is believed that the breach occurred
via telnet access. Which of the following could validate this hypothesis?
A.
Port scanner
B.
Cipher tools
C.
Checksum analyzer
D.
TDR
A server technician is investigating a potential data breach. It is believed that the breach occurred
via telnet access. Which of the following could validate this hypothesis?
A server technician is investigating a potential data breach. It is believed that the breach occurred
via telnet access. Which of the following could validate this hypothesis?
A.
Port scanner
B.
Cipher tools
C.
Checksum analyzer
D.
TDR