Which of the following tools would allow Ann, the security administrator, to be able to BEST quantify all traffic on her network?
Which of the following BEST allows Pete, a security administrator, to determine the type, source, and flags of the packet traversing a network for troubleshooting purposes?
Which of the following would a security administrator implement in order to discover comprehensive security threats on a network?
Which of the following would be used to identify the security posture of a network without actually exploiting any weaknesses?