All nodes on a subnet are experiencing network slowness. The administrator suspects an infected computer is on the network and checks if a node is saturating the network. Which of the following tools should be utilized in this situation?

A. Multimeter
B. Port scanner
C. Protocol analyzer
D. IGMP


Answer: C. Protocol analyzer

Computer Science & Information Technology

You might also like to view...

The methods in an object that are used to initialize an object's fields with starting values are called _________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

MUMIMO is found in what technology?

A) 802.11ac B) 802.11a C) 802.11b D) 802.11g

Computer Science & Information Technology

Explain the type of validation rule you would add to a Salary field with a Number data type.

What will be an ideal response?

Computer Science & Information Technology

Computers that are placed inside other pieces of equipment to control their operation are called ____ systems.

integrated virtual baseline embedded

Computer Science & Information Technology