William is a network administrator in an organization. to efficiently manage his organization's network, he has used an application that examines network traffic and generates a customized report. which of the following computer application has he used? a. demilitarized zone b. packet analyzer c. honeypot do proxy server