A server technician is investigating a potential data breach. It is believed that the breach occurred via telnet access.
Which of the following could validate this hypothesis?
A . Port scanner
B . Cipher tools
C . Checksum analyzer
D . TDR
Answer: A