An unusual amount of activity is coming into one of the switches in an IDF. A malware attack is suspected. Which of the following tools would appropriately diagnose the problem?
A. Cable tester
B. Protocol analyzer
C. Load balancer
D. OTDR
Answer: B. Protocol analyzer
Computer Science & Information Technology
You might also like to view...
Formulas and functions begin with a(n) ________ sign
A) = B) # C) @ D) &
Computer Science & Information Technology
Which of the following commands should be used to force the use of username/password combinations stored on the local switch for both the console and Telnet?
A) line con 0 B) username name secret password C) login local D) no password
Computer Science & Information Technology