Kim, a technician, needs to locate a cable in an unorganized wiring closet. Which of the following tools will help her locate the cable?
A. Protocol analyzer
B. Cable tester
C. Toner probe
D. Punch down tool
Which of the following is an example of two factor authentication?
A. Password, device certificate and PIN
B. SSL web server certificate and password
C. User password and administrator password
D. Password and hardware token OTP
Matt, an administrator, notices a flood fragmented packet and retransmits from an email server. After disabling the TCP offload setting on the NIC, Matt sees normal traffic with packets flowing in sequence again. Which of the following utilities was he MOST likely using to view this issue?
A. Spam filter
B. Protocol analyzer
C. Web application firewall
D. Load balancer