ECCouncil 312-49v11 Question Answer
Arnold, a forensic investigator, was tasked with analyzing a corporate network that was suspected of having unauthorized access points. He was particularly concerned about the possibility of rogue access points that might have been introduced by an attacker. To gain full visibility into the network and its components, Arnold employed a forensic tool that allowed him to analyze network traffic, monitor various access points for anomalies, and detect suspicious behaviors indicative of rogue devices. Arnold examined the log data provided by the tool, which gave him insights into the network's activities and helped him confirm whether any unauthorized devices were operating on the network. Which tool did Arnold employ in the above scenario?

