A network technician is reviewing the following output from a router:
Which of the following is this an example of?
A.
A vulnerability scan B.
A port scan C.
A traffic log D.
A packet capture.
C.
A network technician is reviewing the following output from a router:
Which of the following is this an example of?
A.
A vulnerability scan
B.
A port scan
C.
A traffic log
D.
A packet capture.
C.