Ann a security analyst is monitoring the IDS console and noticed multiple connections from an internal host to a suspicious call back domain.Which of the following tools would aid her to decipher the network traffic?

A. Vulnerability Scanner
B. NMAP
C. NETSTAT
D. Packet Analyzer

Answer: C. NETSTAT

Computer Science & Information Technology

You might also like to view...

Once you have a sound file in your document's library, you can use it as many times as you need in your document. But if you use it multiple times, multiple copies of the sound are stored in the document.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When you click the ____ button in the Resource Leveling dialog box, you have the choice of either leveling the Entire pool of resources or Selected resources.

A. Reallocate B. Level All C. Add Slack D. Fast Track

Computer Science & Information Technology