Which of the following tool can the investigator use to analyze the network to detect Trojan activities?
Regshot
TRIPWIRE
RAM Computer
Capsa
Submit