John works as a network administrator for his company. He uses a tool to check SMTP, DNS,
POP3, and ICMP packets on the network. This is an example of which of the following?
A.
A vulnerability scan
B.
A protocol analyzer
C.
A penetration test
D.
A port scanner