You have been contracted to determine if network activity spikes are related to an attempt by an attacker to breach the network. The customer wants you to identify when the activity occurs and what type of traffic causes the activity. Which type of tool should you use?
A. Network mapper
B. Protocol analyzer
C. System Monitor
D. Performance Monitor
Answer: B. Protocol analyzer