You suspect an employee of using the company's Internet connection to download illegal content. Which of the following can be used to inspect ongoing network traffic?
Network Architecture | |
Network operations | |
Network security | |
Troubleshooting | |
Industry standards, practices, and network theory |