Refer to the exhibit.
A security analyst needs to investigate a security incident involving several suspicious connections with a possible attacker.
Which tool should the analyst use to identify the source IP of the offender?
Click on the arrows to vote for the correct answer
A. B. C. D.A.