A security analyst who is concerned about sensitive data exfiltration reviews the following:
Which of the following tools would allow the analyst to confirm if data exfiltration is occurring?
A. Port scanner
B. SCAP tool
C. File integrity monitor
D. Protocol analyzer
Correct Answer: D