An administrator believes a user is secretly transferring company information over the Internet. The network logs do not show any non-standard traffic going through the firewall. Which of the following tools would allow the administrator to better evaluate the contents of the network traffic?

An administrator believes a user is secretly transferring company information over the Internet. The network logs do not show any non-standard traffic going through the firewall. Which of the following tools would allow the administrator to better evaluate the contents of the network traffic?






A. Vulnerability scanner
B. Network anomaly detection
C. Protocol analyzer
D. Proxy server





Answer: C


Computer Science

Learn More Multiple Choice Question :