Potential Data Breach via Telnet Access: Validating the Hypothesis | Exam SK0-004

Investigating a Potential Data Breach via Telnet Access

Prev Question Next Question

Question

A server technician is investigating a potential data breach.

It is believed that the breach occurred via telnet access.

Which of the following could validate this hypothesis?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

A.

In this scenario, a server technician is investigating a potential data breach that may have occurred via telnet access. To validate this hypothesis, one needs to identify whether telnet is still enabled and accessible from outside the network.

Among the given options, the tool that can help in validating this hypothesis is a port scanner (Option A). A port scanner is a software tool used to identify open ports on a network device. It can be used to scan for open telnet ports on the server and validate if it is accessible from outside the network.

A cipher tool (Option B) is used to encrypt or decrypt data, and it cannot be used to validate whether a data breach occurred via telnet access. Similarly, a checksum analyzer (Option C) is used to validate the integrity of data and cannot help in identifying whether a data breach occurred via telnet access.

A TDR (Option D) is a Time Domain Reflectometer, used to detect faults in the physical layer of a network cable, and cannot help in identifying whether a data breach occurred via telnet access.

Therefore, among the given options, a port scanner (Option A) is the most appropriate tool to validate the hypothesis that the data breach occurred via telnet access.