In planning for a firewall implementation, Pete, a security administrator, needs a tool to help him understand what traffic patterns are normal on his network. Which of the following tools would help Pete determine traffic patterns?
A.
Syslog
B.
Protocol analyzer
C.
Proxy server
D.
Firewall