A security manager believes that too many services are running on a mission critical database server. Which of the following tools might a security analyst use to determine services that are running on the server, without logging into the machine?
A.
OVAL
B.
Port scanner
C.
Protocol analyzer
D.
NIDS