All nodes on a subnet are experiencing network slowness. The administrator suspects an infected computer is on the network and checks if a node is saturating the network. Which of the following tools should be utilized in this situation?
A.
Multimeter
B.
Port scanner
C.
Protocol analyzer
D.
IGMP