Ann a security analyst is monitoring the IDS console and noticed multiple connections from an
internal host to a suspicious call back domain \. Which of the following tools would aid her to
decipher the network traffic?

A.
Vulnerability Scanner
B.
NMAP
C.
NETSTAT
D.
Packet Analyzer
D.
0
0
Decipher network traffic is a sniffer or protocol analyzer. D
0
0