A systems administrator is monitoring an unusual amount of network traffic from a kiosk machine and needs to investigate to determine the source of the traffic. Which of the following tools can the administrator use to view which processes on the kiosk machine are connecting to the internet?
rocistuff
Highly Voted 1 year, 11 months agoNate_A
Most Recent 7 months, 2 weeks agoIykeokebata
1 year, 4 months agoLance711
1 year, 4 months agoRaffaelloo
1 year, 6 months agoMehsotopes
1 year, 10 months agodcv1337
1 year, 11 months ago