Ann a security analyst is monitoring the IDS console and noticed multiple connections from an internal host to a suspicious call back domain. Which of the following tools would aid her to decipher the network traffic?
A. Vulnerability Scanner
B. NMAP
C. NETSTAT
D. Packet Analyzer
D is the answer, how come NETSTAT decipher the network traffic.