Ann, a security analyst, is monitoring the IDS console and noticed multiple connections from an internal host to
a suspicious call back domain.
Which of the following tools would aid her to decipher the network traffic?

A.
Vulnerability Scanner
B.
NMAP
C.
NETSTAT
D.
Packet Analyzer
I beleive it is D.
How can netstat help to determine which content or type of network traffic is generated from internal host?
1
0
D For sure.
1
0
i agree, D makes sense
1
0