A server technician is investigating a potential data breach. It is believed that the breach
occurred via telnet access. Which of the following could validate this hypothesis?
A. Port scanner
B. Cipher tools
C. Checksum analyzer
D. TDR
A server technician is investigating a potential data breach. It is believed that the breach
occurred via telnet access. Which of the following could validate this hypothesis?
A. Port scanner
B. Cipher tools
C. Checksum analyzer
D. TDR