What tool can we use to determine if adversary is reaching


Problem

When we first arrived and established our connection to the internet, we noticed inbound connection requests. What tool can we use to determine if any adversary is reaching into our systems through a particular port or protocol?

1) Choose and restate one of the problems identified as you understand it and explain why it is a problem.

2) Describe how you would apply the steps in the Network+ troubleshooting model to this problem.Identify the problem.

a) Establish a theory of probable cause.
b) Test the theory to determine the cause.
c) Establish a plan of action to resolve the problem and identify potential effects.
d) Implement the solution or escalate as necessary.
e) Verify full system functionality, and if applicable, implement preventative measures.
f) Document findings, actions, and outcomes

3) Provide a detailed overview of the tool's functionality and options.

Request for Solution File

Ask an Expert for Answer!!
Computer Networking: What tool can we use to determine if adversary is reaching
Reference No:- TGS03226564

Expected delivery within 24 Hours