Ann a security analyst is monitoring the IDS console and noticed multiple connections from an internal host to a suspicious call back domain \\. Which of the
following tools would aid her to decipher the network traffic?
A.
Vulnerability Scanner
B.
Nmap
C.
netstat
D.
Packet Analyzer