A security analyst suspects a remote server is running vulnerable network applications. The analyst does not have administrative credentials for the server. Which of the following would MOST likely help the analyst determine if the applications are running?
A. User account control
B. Anti-malware
C. A sniffer
D. A port scanner
A. User account control
B. Anti-malware
C. A sniffer
D. A port scanner