Ann
a security analyst is monitoring the IDS console and noticed multiple connections from an internal host to a suspicious call back domain.
Which of the following tools would aid her to decipher the network traffic?
A. Vulnerability Scanner
B. NMAP
C. NET
STAT
D. Packet Analyzer