Jane, a security analyst, is reviewing logs from hosts across the Internet which her company uses
to gather data on new malware. Which of the following is being implemented by Janes company?
A.
Vulnerability scanner
B.
Honeynet
C.
Protocol analyzer
D.
Port scanner