Karen, an administrator, would like to inspect all traffic flowing over the SMTP protocol on a given
network. Which of the following tools would accomplish this? (Select TWO).
A.
Packet sniffer
B.
Honeypot
C.
Port mirroring
D.
IPS
E.
Port scanner
F.
IDS