You suspect an employee of using the company's Internet connection to download illegal content. Which of the following can be used to inspect ongoing network traffic?
Networking Fundamentals | |
Network Implementations | |
Network Operations | |
Network Security | |
Network Troubleshooting |