To mitigate the risk of intrusion, an IT Manager is concerned with using secure versions of protocols and
services whenever possible. In addition, the security technician is required to monitor the types of traffic being
generated. Which of the following tools is the technician MOST likely to use?