A systems administrator is monitoring an unusual amount of network traffic from a kiosk machine and needs to investigate to determine the source of the traffic. Which of the following tools can the administrator use to view which processes on the kiosk machine are connecting to the internet?
A. Resource Monitor
B. Performance Monitor
C. Command Prompt
D. System Information
A. Resource Monitor
B. Performance Monitor
C. Command Prompt
D. System Information