Which is a reliable network auditing methodology for discovering applications on the network and their usage characteristics?
A. Interview system administrators regarding the networked applications.
B. Conduct a network usage study over a given period of time.
C. Place a sniffer device on the network to grasp a snapshot of traffic on the network.
D. Conduct a network inventory of servers and applications installed on them.