A security administrator needs to determine if an assistant's workstation is sending out corporate information. Which of the following could be used to review the assistant's network traffic?
A. Systems monitoring
B. Performance monitoring
C. Performancebaselining
D. Protocol analysis
Answer: D