Ann a security analyst is monitoring the IDS console and noticed multiple connections from an
internal host to a suspicious call back domain \. Which of the following tools would aid her to
decipher the network traffic?
A.
Vulnerability Scanner
B.
NMAP
C.
NETSTAT
D.
Packet Analyzer
D.
Decipher network traffic is a sniffer or protocol analyzer. D