In planning for a firewall implementation, Pete, a security administrator, needs a tool to help him
understand what traffic patterns are normal on his network. Which of the following tools would help
Pete determine traffic patterns?
A.
Syslog
B.
Protocol analyzer
C.
Proxy server
D.
Firewall