Which is a reliable network auditing methodology for discovering applications on the network and their usage characteristics?
Select the best response.
A.
Interview system administrators regarding the networked applications.
B.
Conduct a network usage study over a given period of time.
C.
Place a sniffer device on the network to grasp a snapshot of traffic on the network.
D.
Conduct a network inventory of servers and applications installed on them.