Recently, you have seen an increase in intrusion attempts and in network traffic. You decide to
use Snort to run a packet capture and analyze the traffic that is present. Looking at the example, what
type of traffic did Snort capture in this log file?

A.
Nmap SYN/FIN Scan
B.
Nmap NULL Scan
C.
Nmap ACK Scan
D.
Nmap SYN Scan
E.
Nmap XMAS Scan