An administrator would like to monitor the network to evaluate which employees are using an excessive amount of bandwidth on peer to peer sharing services. Which of the following monitoring techniques would BEST be used?
A.
Stateful packet inspection
B.
Load balancing
C.
Packet sniffing
D.
Throughput testing