Which of the following BEST allows Pete, a security administrator, to determine the type, source, and flags of the packet traversing a network for troubleshooting purposes?
Which of the following would a security administrator implement in order to discover comprehensive security threats on a network?
Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?
Which of the following can Joe, a security administrator, implement on his network to capture attack details that are occurring while also protecting his production network?