An unusual amount of activity is coming into one of the switches in an IDF. A malware attack is suspected. Which of the following tools would appropriately diagnose the problem?

A. Cable tester
B. Protocol analyzer
C. Load balancer
D. OTDR

Answer: B. Protocol analyzer

Computer Science & Information Technology

You might also like to view...

Formulas and functions begin with a(n) ________ sign

A) = B) # C) @ D) &

Computer Science & Information Technology

Which of the following commands should be used to force the use of username/password combinations stored on the local switch for both the console and Telnet?

A) line con 0 B) username name secret password C) login local D) no password

Computer Science & Information Technology