After a breach, a company has decided to implement a solution to better understand the technique used by the attackers.
Which of the following is the BEST solution to be deployed?
A . Network analyzer
B . Protocol analyzer
C . Honeypot network
D . Configuration compliance scanner
Answer: B