Which of the following tools would aid her to decipher …

Ann a security analyst is monitoring the IDS console and noticed multiple connections from an internal host to a suspicious call back domain \\. Which of the
following tools would aid her to decipher the network traffic?

Ann a security analyst is monitoring the IDS console and noticed multiple connections from an internal host to a suspicious call back domain \\. Which of the
following tools would aid her to decipher the network traffic?

A.
Vulnerability Scanner

B.
Nmap

C.
netstat

D.
Packet Analyzer



Leave a Reply 0

Your email address will not be published. Required fields are marked *