A security administrator suspects that an employee in the IT department is utilizing a reverse proxy to bypass
the company’s content filter and browse unapproved and non-work related sites while at work. Which of the
following tools could BEST be used to determine how the employee is connecting to the reverse proxy?
![PrepAway - Latest Free Exam Questions & Answers](https://www.briefmenow.org/img/pa5.jpg)
A.
Port scanner
B.
Vulnerability scanner
C.
Honeypot
D.
Protocol analyzer