This is a dedicated watch page for a single video.
A network administrator suspects that an internal employee is using a packet sniffer to collect sensitive data from within the network. What would be the first step to verify this suspicion and detect the sniffing tool?