An unusual amount of activity is coming into one of the switches in an IDF. A malware attack is suspected. Which of the following tools would appropriately diagnose the problem?

A. Cable tester
B. Protocol analyzer
C. Load balancer
D. OTDR


Answer: B. Protocol analyzer

Computer Science & Information Technology

You might also like to view...

The term ____________________ refers to a set of Bluetooth security vulnerabilities published in late 2017 that can potentially affect more than 8 billion devices, from smartphones to tablets to cars.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The process of storing multiple values in a buffer in main memory to improve program performance is called ____.

A. buffering B. hashing C. registering D. polling

Computer Science & Information Technology

Answer the following statements true (T) or false (F)

1. You can specify specific values to be assigned to the enumerators in an enumerated data type. 2. When integer values are assigned to the enumerators in an enumerated type, then each value must be unique. 3. Assume the following declarations: enum Days { Mon, Tue, Wed, Thur, Fri, Sat }; Days day1 = Days.Tue; Days day2 = Days.Thur; The following Boolean expression is valid: day1 < day2 4. Assume the following declarations: enum Days { Mon, Tue, Wed, Thur, Fri, Sat }; Days day1 = Days.Tue; Days day2 = Days.Thur; The following Boolean expression is valid: day1 < Days.Mon 5. Assume the following declarations: enum Days { Mon, Tue, Wed, Thur, Fri, Sat }; Days day1 = Days.Tue; int n = 3; The following Boolean expression is valid: day1 < n

Computer Science & Information Technology

What is the danger of using an icon without supporting text?

What will be an ideal response?

Computer Science & Information Technology