A system administrator wants to verify external IP addresses are unable to collect software versioning from servers on the network. Which of the following should system administrator do to confirm the network is protected?
A. Analyze packet captures.
B. Utilize netstat to locate active connections.
C. Use nmap to query known ports.
D. Review the ID3 logs on the network.